Debug TSO through ISPF panels installation
Hi List, I'm installing a product in a client and when I invoked the primary panel of the installation, one of the selections don't do anything when I select it with an 's'. I have test it in my systems and functions, so, I think there is something trhough their logon procedures that is causing the problem, but I cannot determine it. I want to debug the TSO navigation, I see once how to activate a trace online with a TSO command, do you know what is? If you have any other suggestions will be much appreciated. Thanks and regards, -- Un saludo. Álvaro Guirao -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Search in the archive
Hi Try to search in the archive/and got server errors for /http://bama.ua.edu//archives///ibm/-/main / -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Dedicated vs. Shared CPs
There WAS a corner case and at least one customer I knew of had it: With ICFs you could expand into shared engines - with the non expansion case being all dedicated. That went away some time ago. I think what you said about z10 corroborates my memory that Dynamic ICF Expansion was only supported on z9 and prior. (Fair mucked up my CPU reporting and as it was going anyway I deigned not to fix my code.) :-) Cheers, Martin Martin Packer, Mainframe Performance Consultant, zChampion Worldwide Banking Center of Excellence, IBM +44-7802-245-584 email: martin_pac...@uk.ibm.com Twitter / Facebook IDs: MartinPacker Blog: https://www.ibm.com/developerworks/mydeveloperworks/blogs/MartinPacker From: Skip Robinson jo.skip.robin...@sce.com To: IBM-MAIN@bama.ua.edu, Date: 16/02/2012 05:07 Subject: Re: Dedicated vs. Shared CPs Sent by: IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu I checked out an MVS Image profile on my (brand spanking new!) z196. It looks the choice is between dedicated or shared CPs. A CF LPAR offers more choices, but oddly fewer choices than the z10 it replaced. . . JO.Skip Robinson SCE Infrastructure Technology Services Electric Dragon Team Paddler SHARE MVS Program Co-Manager 626-302-7535 Office 323-715-0595 Mobile jo.skip.robin...@sce.com From: Barbara Nitz nitz-...@gmx.net To: IBM-MAIN@bama.ua.edu Date: 02/15/2012 08:58 PM Subject:Re: Dedicated vs. Shared CPs Sent by:IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu Is it possible to mix shared and dedicated CPs on the same LPAR? No. Not on a z9 and not the way you mean. The RMF report deals with what an lpar can look like when it uses Hiperdispatch. That is not available on a z9. Hiperdispatch semi-dedicates logical processors to physical processors depending on the workload. And most probably depending on the number of physical cps. (Which is why we asked for the number of your physical cps in the other thread - you haven't answered that!) Once hiperdispatch is on, a physical cp gets a weight, which can be low, medium or high. High amounts to being (semi-)dedicated. Does anyone run mixed like this, a dedicated number to cover the minimum expected MSU of an LPAR, then some logicals to float between LPARS? Everyone who uses hiperdipatch. Does anyone know what is needed in terms of outages/lpar resets to move from a completely logical CP environment to a mixed environment? An upgrade to a machine supporting hiperdispatch. Which means at least one IPL. But as you can see from my questions starting this thread, it is possible that you cannot use hiperdispatch - whenever your logical to physical cp ratio is so bad that 4 or more logical cps compete for one physical, due to the number of lpars you have, for instance. In the very first presentation I heard (by Bob Rogers) about hiperdispatch, he said that it will turn itself off if the ratio is really bad. I haven't heard that confirmed anywhere, though. And coming from a z9 presumably to a z196, chances are very good that you would loose physical cps to keep money down. Try making your bosses understand that they cannot use the same number of logicals when the number of physicals decreases Barbara Nitz -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN Unless stated otherwise above: IBM United Kingdom Limited - Registered in England and Wales with number 741598. Registered office: PO Box 41, North Harbour, Portsmouth, Hampshire PO6 3AU -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Debug TSO through ISPF panels installation
Hi Wit the ISPF Dialog Test you can trace/debug the dialogs On 2/16/2012 9:00 AM, Alvaro Guirao Lopez wrote: Hi List, I'm installing a product in a client and when I invoked the primary panel of the installation, one of the selections don't do anything when I select it with an 's'. I have test it in my systems and functions, so, I think there is something trhough their logon procedures that is causing the problem, but I cannot determine it. I want to debug the TSO navigation, I see once how to activate a trace online with a TSO command, do you know what is? If you have any other suggestions will be much appreciated. Thanks and regards, -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: sadump (and autoipl)
My sadump program is coded with DDSPROMPT=NO (to enable sadump autoipl) and a dump data set name that is NOT SYS1.SADMP (since something needed to get done in SMS for dsntype=large, and sys1 is not sms-managed - don't ask me about particulars). When we migrated to 1.12, we were on old DASD hardware, and the sadmp data set got reallocated using the old volser. I noticed that the volser was wrong in the amdsaosg job, and *that* got redone to use the new addresses on the new controller (the old one is gone). This morning I needed to take an sadump for the RSM/ASM/Supervisor problems that we have. I failed spectacularly: - sadump gave me AMD092I with a reason code of 8 indicating a device number mismatch. I went and reallocated the sadump output data set on the same volume (s), but with the new device numbers (from a different system in the plex) - now sadump bitterly complained via amd001A and wanted the device address. I specified that. - Unfortunately, due to ddsprompt=no, sadump now *expects* the data set name to be sys1.sadmp. Of course, it couldn't find it on that volume. Am I correct in assuming that simply giving a null reply to amd001a would have taken the original values as described in the amdsosg job and would have essentially redriven sadump from the beginning? (Since I have reallocated all sadump output datasets, I cannot really test anymore). The book says: DDSPROMPT={YES|NO} DDSPROMPT=YES allows the stand-alone dump program to prompt the operator for an output dump data set when dumping to a DASD device. When DDSPROMPT=YES is specified, after replying to message AMD001A with a DASD device number, message AMD002A is also issued to prompt the operator for a dump data set name. DDSPROMPT=NO indicates that the stand-alone dump program should not prompt for a dump data set name when dumping to a DASD device. When DDSPROMPT=NO is specified, after replying to message AMD001A with a DASD device number, the stand-alone dump program uses data set SYS1.SADMP. DDSPROMPT=NO is the default. Note that regardless of the DDSPROMPT= keyword value, you can always use a default device and dump data set name by specifying the OUTPUT=(Dunit,ddsname) keyword. The stand-alone dump program uses the default values specified on the OUTPUT= keyword when the operator uses the EXTERNAL INTERRUPT key to bypass console communication, or if the operator provides a null response to message AMD001A. *** So, yes, a null reply to AMD100A would use the the OUTPUT= specification from your AMDSADMP macro. But you shouldn't need DDSPROMPT=NO to allow for AutoIPL of SADMP. If the first character of your SADMP IPL (or AutoIPL) load parameter is S, and the second character is N, O, or M (N or O would be typical for AutoIPL), SADMP will use the OUTPUT= specification from your AMDSADMP macro. The only reason that these is a DDSPROMPT keyword is that the original dump to DASD support in SP4.3.0 was very low budget, and did not allow a data set name to be specified. The data set name had to be SYS1.SADMP. When support was added in a later release for more flexible data set naming, we had to maintain (for compatibility's sake) a mode of operation where a name of SYS1.SADMP was assumed. Hence, the DDSPROMPT keyword, and its compatible default of NO. But I don't recommend using that. Also, when you get in a pickle with SADMP, you can usually do a PSW Restart of the SADMP IPL CPU (usually, CPU 0 unless IPLed via AutoIPL) to get back to the beginning of SADMPm processing. PSW Restart is a bit inconvenient on the HMC (I think you may need to get into single object operation (or whatever that is called), and then bring up a CPU list for your LPAR, then select the one CPU that is in the operating state, and then select PSW Restart. Or something like that. The HMC and I are not the best of friends. It is easy to do a PSW Restart of SADMP under VM. Why it seems so clumsy on the HMC, I don't know. I suppose it is because I don't comprehend the beauty of its object-oriented design. Or so I have been told. If all else fails, you can Re-IPL SADMP. It used to be that you would not get any paged out storage dumped if you did that, but I fixed that in z/OS 1.9. All you lose when you Re-IPL is 4MB of the z/OS read-only nucleus (in the dump, you will see 4MB of SADMP code and storage at those addresses). But unless the problem you are trying to diagnose is one of the rare cases where some read-only nucleus storage was overlaid using a real address, a channel program, or a coupling operation, then you can just take an SDUMP with the DUMP command after you re-IPL z/OS, specifying SDATA=ALLNUC, and look at the read only nucleus storage in that dump (as long as your nucleus was not relinked before the Re-IPL of z/OS). I recommend reading section 4.4 Running the stand-alone dump program in the z/OS 1.13 level of MVS Diagnosis: Tools and Service
Re: Debug TSO through ISPF panels installation
Stefan, This newsgroup is a mirror of a list-server and that is where the majority of the IBM-MAIN people read the posts. To subscribe, see the info attached below. This reply will send your answer to the group. Kees. stefan stefan.br...@gmail.com wrote in message news:4850d309-da79-4d96-a1eb-2d7a4c99e...@k40g2000yqf.googlegroups.com ... The procedural logic that's causing this strange behavior could be buried in 3 different kind of sources which need different tactics: 1. Logic is in an ISPF panel: Type panelid on in the command line to see the name of the current menu panel in the upper left corner. Then enter tso isrddn m panelname in the command line. Replace panelname with the name of the current menu panel. ISRDDN will show you the DD name to which the dataset containing the menu panel is allocated. Enter v as a line command to view the panel source member. When you scroll to the )PROC section you might get an idea of the included logic. If you really want to debug the panel's logic, issue ispdptrc on the command line to start the ISPF panel trace. Then select your desired menu option and enter ispdptrc again. The panel trace utility will unload the panel trace to a temporary dataset and will show it to you in edit mode. It might take a while to understand the output. 2. Logic is in a REXX program (not compiled): You can trace any REXX program by typing tso executil ts in the command line. Then invoke your desired menu option. If there is any REXX program involved in the processing chain it will automatically run in trace mode. You can find out the name of the running REXX program by typing parse source . . pgm .;say pgm while you are in trace mode of an active module. This will display the member name of this program. 3. Logic is in a compiled program: No easy way to see what happens. You need some mature debugger such as Xpediter. Try to find out the name of the called program and the dataset from where it is loaded. Maybe this helps to find out who is responsible for this logic and could probably help you. For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
SV: Debug TSO through ISPF panels installation
A simple beginning: - Enter ISPF option 7, Dialog Test - Select: 1 Functions - Enter the actual name of the ISPF Primary Option menu panel at: Invoke selection panel: PANEL . . panelname (If You don't know, enter PANELID ON at the primary menu which shows the name near the left upper corner) - Press ENTER and the go to the application You want to debug - After execution (e g after the unsuccessful S selection), go to: 5 Log Browse ISPF log (still under ISPF option 7, Dialog Test) - You may see interesting logdata near the bottom YMMV Regards, Thomas Berg _ Thomas Berg Specialist A M SWEDBANK -Ursprungligt meddelande- Från: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] För Alvaro Guirao Lopez Skickat: den 16 februari 2012 09:00 Till: IBM-MAIN@bama.ua.edu Ämne: Debug TSO through ISPF panels installation Hi List, I'm installing a product in a client and when I invoked the primary panel of the installation, one of the selections don't do anything when I select it with an 's'. I have test it in my systems and functions, so, I think there is something trhough their logon procedures that is causing the problem, but I cannot determine it. I want to debug the TSO navigation, I see once how to activate a trace online with a TSO command, do you know what is? If you have any other suggestions will be much appreciated. Thanks and regards, -- Un saludo. Álvaro Guirao -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Subject: SV: REXX IEBCOPY Continuation?
On Thu, 16 Feb 2012 08:14:03 +0200 Mark Jones markj...@za.ibm.com wrote: :Hi :I havent had a problem with this :/* REXX */ :FREE F(INDD1) :FREE F(OUTDD1) :FREE F(SYSIN) :ALLOC FI(INDD1) DSN('x..aaa') SHR :ALLOC FI(OUTDD1) DSN('x..bbb') SHR :ALLOC FI(SYSIN) DSN('x..ccc') SHR :NEWSTACK :V1 = C I=((INDD1,R)),O=OUTDD1 :V2 = SELECT MEMBER=((MSJT,,R)) :V3 = SELECT MEMBER=((MSJTST1,,R)) :V4 = SELECT MEMBER=((MSJTST2,,R)) :V5 = SELECT MEMBER=((MSJTST7,,R)) :QUEUE V1 :QUEUE V2 :QUEUE V3 :QUEUE V4 :QUEUE V5 :EXECIO QUEUED() DISKW SYSIN (FINIS :TSOEXEC IEBCOPY Could lead to trouble if IEBCOPY looks at the parms. :DELSTACK :FREE F(INDD1) :FREE F(OUTDD1) :FREE F(SYSIN) -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: 5 Byte Device Addresses?
W dniu 2012-02-16 01:55, Dan pisze: Thanks Radoslaw Bob. I figured there must be some explanation for the additional byte other than some new extended device ranges. This is still a DOC problem as the manual simply states these are device addresses. Radoslaw, are you saying there is a way of creating an IPLable device with a 5 byte device address after z/OS 1.7? How is that possible when UCBCHAN only provides space for 4 byte addresses (which D U,... uses)? I have never tried it, but you can put PPRC secondary volumes to SS1 and then IPL from such device by providing in HMC dialogs 5-byte addresses. Last, but not least: it is quite new feature, it wasn't available at the time of z/OS 1.7 GA. -- Radoslaw Skorupka Lodz, Poland -- Tre tej wiadomoci moe zawiera informacje prawnie chronione Banku przeznaczone wycznie do uytku subowego adresata. Odbiorc moe by jedynie jej adresat z wyczeniem dostpu osób trzecich. Jeeli nie jeste adresatem niniejszej wiadomoci lub pracownikiem upowanionym do jej przekazania adresatowi, informujemy, e jej rozpowszechnianie, kopiowanie, rozprowadzanie lub inne dziaanie o podobnym charakterze jest prawnie zabronione i moe by karalne. Jeeli otrzymae t wiadomo omykowo, prosimy niezwocznie zawiadomi nadawc wysyajc odpowied oraz trwale usun t wiadomo wczajc w to wszelkie jej kopie wydrukowane lub zapisane na dysku. This e-mail may contain legally privileged information of the Bank and is intended solely for business use of the addressee. This e-mail may only be received by the addressee and may not be disclosed to any third parties. If you are not the intended addressee of this e-mail or the employee authorised to forward it to the addressee, be advised that any dissemination, copying, distribution or any other similar activity is legally prohibited and may be punishable. If you received this e-mail by mistake please advise the sender immediately by using the reply facility in your e-mail software and delete permanently this e-mail including any copies of it either printed or saved to hard drive. BRE Bank SA, 00-950 Warszawa, ul. Senatorska 18, tel. +48 (22) 829 00 00, fax +48 (22) 829 00 33, www.brebank.pl, e-mail: i...@brebank.pl Sd Rejonowy dla m. st. Warszawy XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, nr rejestru przedsibiorców KRS 025237, NIP: 526-021-50-88. Wedug stanu na dzie 01.01.2012 r. kapita zakadowy BRE Banku SA (w caoci wpacony) wynosi 168.410.984 zotych. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: [TSO-REXX] Debug TSO through ISPF panels installation
Cross Posting to IBM Main and TSO-REXX groups Hi List, I'm installing a product in a client and when I invoked the primary panel of the installation, one of the selections don't do anything when I select it with an 's'. I have test it in my systems and functions, so, I think there is something trhough their logon procedures that is causing the problem, but I cannot determine it. I want to debug the TSO navigation, I see once how to activate a trace online with a TSO command, do you know what is? If you have any other suggestions will be much appreciated. Thanks and regards, -- Un saludo. Álvaro Guirao Alvaro - First, I think the ISPF Newsgroup may be better. If you have not joined, you can go here ISPF discussion list isp...@listserv.nd.edu Internet ISPF Discussions Lively discussions of ISPF-related matters are held regularly on the Internet. Check into the ISPF-L discussion list to hear the latest questions and answers from customers around the world. (This is not an IBM-maintained forum, and IBM participates in the discussion list on an informal basis.) Subscribe to the ISPF discussion list To subscribe to the discussion list, create a file where the subject and the first line of the text are: SUBSCRIBE ISPF-L yourname Send the file to the discussion list administration server: lists...@listserv.nd.edu This will enable your subscription to the ISPF-L discussion list. For further information about the discussion list, send a file with the HELP command, and listserv will return all kinds of other administrative information. You will soon start getting e-mail from the discussion list. To append your note to the list, direct your response to: isp...@listserv.nd.edu Second - TSO is a native interface also indicated by word READY prompt. I think you mean trace in ISPF for an ISPF application. To trace ISPF there are a couple of options 1) Use the ISPF Trace function. If you do not have a customized primary panel then look for an option on the main panel option 7. Here you can setup tracing functions. The ISPF USER'S GUIDE Vol II will be helpful. 2) Startup ISPF with TRACE - this removes many trap functions. If there is an abend, you will get a dump. 3) Try using ISPVCALL (Enter TSO ISPVCALL on the command line to activate. Go into your application. When done, issue it again to unload the TRACE data) I use the ISPF Option 7 for most of my debugging requirements when diagnosing ISPF applications. Hope this helps. I am not aware of a manual dedicated to how to debug ISPF applications. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: [TSO-REXX] Debug TSO through ISPF panels installation
Cross Posting to IBM Main and TSO-REXX groups Hi List, I'm installing a product in a client and when I invoked the primary panel of the installation, one of the selections don't do anything when I select it with an 's'. I have test it in my systems and functions, so, I think there is something trhough their logon procedures that is causing the problem, but I cannot determine it. I want to debug the TSO navigation, I see once how to activate a trace online with a TSO command, do you know what is? If you have any other suggestions will be much appreciated. Thanks and regards, -- Un saludo. Álvaro Guirao Alvaro - First, I think the ISPF Newsgroup may be better. If you have not joined, you can go here ISPF discussion list isp...@listserv.nd.edu Internet ISPF Discussions Lively discussions of ISPF-related matters are held regularly on the Internet. Check into the ISPF-L discussion list to hear the latest questions and answers from customers around the world. (This is not an IBM-maintained forum, and IBM participates in the discussion list on an informal basis.) Subscribe to the ISPF discussion list To subscribe to the discussion list, create a file where the subject and the first line of the text are: SUBSCRIBE ISPF-L yourname Send the file to the discussion list administration server: lists...@listserv.nd.edu This will enable your subscription to the ISPF-L discussion list. For further information about the discussion list, send a file with the HELP command, and listserv will return all kinds of other administrative information. You will soon start getting e-mail from the discussion list. To append your note to the list, direct your response to: isp...@listserv.nd.edu Second - TSO is a native interface also indicated by word READY prompt. I think you mean trace in ISPF for an ISPF application. To trace ISPF there are a couple of options 1) Use the ISPF Trace function. If you do not have a customized primary panel then look for an option on the main panel option 7. Here you can setup tracing functions. The ISPF USER'S GUIDE Vol II will be helpful. 2) Startup ISPF with TRACE - this removes many trap functions. If there is an abend, you will get a dump. 3) Try using ISPVCALL (Enter TSO ISPVCALL on the command line to activate. Go into your application. When done, issue it again to unload the TRACE data) I use the ISPF Option 7 for most of my debugging requirements when diagnosing ISPF applications. Hope this helps. I am not aware of a manual dedicated to how to debug ISPF applications. Lizette Also, this link may help - http://home.roadrunner.com/~pinncons/ISPF%20Tips%20and%20Free-for-All.pdf This is a Share Presentation on ISPF Debugging. Also, you could try removing the ISPF Profile member for that user. The one specific to that application. If you do not know what it is, then 1) Have the user logoff 2) Rename the user's PROFILE datasets. Allocate for the user a new PROFILE dataset. 3) Have the user Logon. If the problem goes away, then it was in their Profile dataset. If you know the application name used by this process, just rename that member. ISPF will create a new default when either the PROFILE is new, or the application does not find its Profile member. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: CICS vs IMS
With the current CICS and COBOL, you must compile your COBOL with NODYNAM, as I'm sure you know. static CALLs in CICS are still not supported. However, with LE, it is now supported to do dynamic CALLs in COBOL. The dynamically CALLed subroutine still needs to be defined to CICS. The CICS Language Environment run-time does a CICS LOAD of the program, then the usual BALR/BASR to actually invoke the subroutine. The problem that I have with it is that this is not the equivalent of EXEC CICS LINK. CICS does not know that you've transferred control to a different program. And so any CICS messages, such as abends, in the CALL'd program have the name of the last program that was invoked via the EXEC CICS LINK type interface, instead of the real program name. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Fred Hoffman Sent: Wednesday, February 15, 2012 9:35 PM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS They both have their +s and -s, The logging for IMS is very good. Easy to use in recovery. I thought that CICS was quicker and also had a pretty good log system. Some of it depends upon the application you are using. I'm a CICS bigot but, I'm also an IMS DBA. It's you pick and how experienced your staff is. BTW, calls in cics are frowned upon, the last time I checked. HTH, Fred From: IBM Mainframe Discussion List on behalf of Roberts, John J Sent: Wed 2/15/2012 6:30 PM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS We are a CICS shop with IMS DB (DBCTL), but I've been curious for a while about the differences between how CICS works and how IMS TM works. I couldn't find anything on the web. Anyone have a link to a good reference? Try Google for IMS DC. The IMS Transaction Manager used to be called IMS/DC (for Data Communication). It has been a long time since I touched it, but my recollection is that it was a cleaner implementation within the Operating System. It used CALL level API's (no EXEC IMS precompiler) and exploited all the OS capabilities for multitasking and multiprocessing. CICS on the other hand tried to isolate apps from the OS, becoming its own mini-OS within a single OS address space. This was an advantage for CICS back in the 70's. But I suspect the table has turned under z/OS. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: sadump (and autoipl)
Vacation? Not likely. I just don't know all the answers off the top of my head, Impossible. :-) You're destroying the image I have of you! Prior to DSNTYPE=LARGE in z/OS 1.7, the only way to use an extent size larger than 64k tracks was to use an extended format data set, and extended format data sets must be on SMS-managed volumes. I believe that our setup dates to that time before dsntype=large. That explains the SMS-managed HLQ. And since it is not exactly easy to test, if something works, don't change it. Testing time has to be fought for. I didn't mean for you to go read the book. Once I had the time (and no pressure to get finished anymore), that's what I found. Hence my question. My original question was also meant as heads-up for everyone else not to forget sadump in all its glory when changing DASD. Now I have to get the 1.13 book to see the revised text. But you shouldn't need DDSPROMPT=NO to allow for AutoIPL of SADMP. If the first character of your SADMP IPL (or AutoIPL) load parameter is S, and the second character is N, O, or M (N or O would be typical for AutoIPL), SADMP will use the OUTPUT= specification from your AMDSADMP macro. Well, I did specify SMSYSC as loadparm, both for this attempt and in the autoipl setting. I have to say that I always feel stupid when I look up this stuff, because I cannot really get a clear answer what is what and what I should specify. I used the 1.12 books and hope that your 1.13 revision makes it clearer. I'll let you know. :-) After all, you must be tired of me always asking about this stuff. I took ddsprompt=YES to mean that prompts would show up on the HMC, regardless of the loadparm. And given that I have to fight to test sadump even in the sysprog sandplex, I have to get it right first time. :-( Talking of AUTOIPL and sadump, when I tested this, the only way to see that sadump had finished was when the NIP messages came up on the real console, indicating sadump was done. That's fine and dandy when I am expecting an sadump, but what about when the sadump is taken due to a real problem (and not me just v xcf,sadump,reipl)? How can I see (without interrupting sadump) how far it had come? Just open the operating system messages window on the HMC? Also, when you get in a pickle with SADMP, you can usually do a PSW Restart of the SADMP IPL CPU (usually, CPU 0 unless IPLed via AutoIPL) to get back to the beginning of SADMPm processing. PSW Restart is a bit inconvenient on the HMC. Especially on a z196 HMC, where the click-yes click-no requires concentrated reading to do the correct clicking, interspersed with typing in passwords for just about anything. I don't even know how I get to single object operations on the z196 HMC. The HMC and I are not the best of friends. ... I suppose it is because I don't comprehend the beauty of its object-oriented design. Or so I have been told. Same here. First thing we did was get it back to the old view - almost none of us was able to find anything anymore, and certainly not in a pinch when the manager wants things done yesterday. It is easy to do a PSW Restart of SADMP under VM. No slur on you, but I have gotten the impression that IBM development thinks that the rest of the world works under VM, too, and hence cannot comprehend what goes on with a 'real' console in 'real' lpar mode. That is often worlds apart and makes some development responses seem extremely arrogant to a customer - they have no clue how the world works, other than when running under VM, and just cannot comprehend why there is a problem. If all else fails, you can Re-IPL SADMP. It used to be that you would not get any paged out storage dumped if you did that, but I fixed that in z/OS 1.9. Now he tells me! I had been standing there and thinking to just reload sadump. The last time I did this I ended up with a nice system trace of what sadump had done :-(. What's the point of no return? In other words, when shouldn't I reload sadump in order to get a dump with meaningful content for the problem I am sadumping for? (I think I understand the 4K pages in nucleus.) But I don't consider manual writing to be one of my better-developed skills. Don't know why. You manage splendidly when you explain things, in my opinion. Skip, I had a good laugh at the joke! Barbara -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: [TSO-REXX] Debug TSO through ISPF panels installation
Lizzette, Thank you for the info, I have requested to join ISPF list, I didn't know it. And thanks for the presentation. I have deleted in the past a few times ISPF profiles from the users avoding some problems related with ISPF, in this case was the logon procedure of the client. I have resolved the problem Cheers. 2012/2/16 Lizette Koehler stars...@mindspring.com Cross Posting to IBM Main and TSO-REXX groups Hi List, I'm installing a product in a client and when I invoked the primary panel of the installation, one of the selections don't do anything when I select it with an 's'. I have test it in my systems and functions, so, I think there is something trhough their logon procedures that is causing the problem, but I cannot determine it. I want to debug the TSO navigation, I see once how to activate a trace online with a TSO command, do you know what is? If you have any other suggestions will be much appreciated. Thanks and regards, -- Un saludo. Álvaro Guirao Alvaro - First, I think the ISPF Newsgroup may be better. If you have not joined, you can go here ISPF discussion list isp...@listserv.nd.edu Internet ISPF Discussions Lively discussions of ISPF-related matters are held regularly on the Internet. Check into the ISPF-L discussion list to hear the latest questions and answers from customers around the world. (This is not an IBM-maintained forum, and IBM participates in the discussion list on an informal basis.) Subscribe to the ISPF discussion list To subscribe to the discussion list, create a file where the subject and the first line of the text are: SUBSCRIBE ISPF-L yourname Send the file to the discussion list administration server: lists...@listserv.nd.edu This will enable your subscription to the ISPF-L discussion list. For further information about the discussion list, send a file with the HELP command, and listserv will return all kinds of other administrative information. You will soon start getting e-mail from the discussion list. To append your note to the list, direct your response to: isp...@listserv.nd.edu Second - TSO is a native interface also indicated by word READY prompt. I think you mean trace in ISPF for an ISPF application. To trace ISPF there are a couple of options 1) Use the ISPF Trace function. If you do not have a customized primary panel then look for an option on the main panel option 7. Here you can setup tracing functions. The ISPF USER'S GUIDE Vol II will be helpful. 2) Startup ISPF with TRACE - this removes many trap functions. If there is an abend, you will get a dump. 3) Try using ISPVCALL (Enter TSO ISPVCALL on the command line to activate. Go into your application. When done, issue it again to unload the TRACE data) I use the ISPF Option 7 for most of my debugging requirements when diagnosing ISPF applications. Hope this helps. I am not aware of a manual dedicated to how to debug ISPF applications. Lizette Also, this link may help - http://home.roadrunner.com/~pinncons/ISPF%20Tips%20and%20Free-for-All.pdf This is a Share Presentation on ISPF Debugging. Also, you could try removing the ISPF Profile member for that user. The one specific to that application. If you do not know what it is, then 1) Have the user logoff 2) Rename the user's PROFILE datasets. Allocate for the user a new PROFILE dataset. 3) Have the user Logon. If the problem goes away, then it was in their Profile dataset. If you know the application name used by this process, just rename that member. ISPF will create a new default when either the PROFILE is new, or the application does not find its Profile member. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- Un saludo. Álvaro Guirao -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Dedicated vs. Shared CPs
Thanks Barbera, that explains 'mixed' perfectly. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Change of Ownership for a Job
Hello, Recently we have installed a IMS system. We have a requirement of changing all the started task userid for which I was able to do it easily, but there are some Jobs which generates automatically when the IMS region starts up for which the OWNER for the JOB is IBMUSER. Is it possible to change the Ownership of the IMS batch Jobs which starts automatically when IMS region is Bounced. Regards, Jags -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorised functions (related to bpxwdyn rc = 4294967263)
Hi Scott, From experience I have found that BPXWDYN is not the easiest beast to control. Whilst I do program in Assembler, it has to be acknowledged that not everybody does and hence more prolific languages with calls to existing functionality should be favoured. I personally think that BPXWDYN is the route to take in preference to calling TSO from within COBOL, and hopefully the code below may be of use. I am not sure why there was an issue with FREE as one test I conducted was creating the TEMPFLE data set as a temporary using default DISP processing, and the FREE caused the data set to be deleted prior to the STEP WAS EXECITE COND CODE message line. Note that I ensured that BPXWDYN was invoked dynamically, not statically liked via IEWL. Good luck - IDENTIFICATION DIVISION. PROGRAM-ID. BPXWDYNT. AUTHOR. T.R.SAMBROOKS. INSTALLATION. DATE-WRITTEN.16TH FEB 2012. ENVIRONMENT DIVISION. CONFIGURATION SECTION. SKIP1 ** *ROUTINE TO DEMONSTARTE THE USE OF BPXWDYN. * ** SKIP3 INPUT-OUTPUT SECTION. FILE-CONTROL. SELECT TEST-OUT ASSIGN TEMPFLE. DATA DIVISION. FILE SECTION. FD TEST-OUT RECORDING MODE IS F LABEL RECORDS ARE STANDARD BLOCK CONTAINS 0 RECORDS RECORD CONTAINS 80 CHARACTERS DATA RECORD IS TEST-REC. 01 TEST-REC PIC X(80). EJECT WORKING-STORAGE SECTION. SKIP1 01 EXTERNAL-ROUTINES. 03 WS-BPXWDYN PIC X(8) VALUE 'BPXWDYN '. 01 ALLOC-FILE. 03 PIC S9(4) COMP VALUE +108. 03 PIC X(45) VALUE 'ALLOC FI(TEMPFLE) DA(PIONEER.TEST.SYSIN) NEW '. 03 PIC X(37) VALUE ' SPACE(1,1) TRACKS CATALOG LRECL(80) '. 03 PIC X(26) VALUE ' RECFM(F,B) BLKSIZE(3200) '. 01 FREE-FILE. 03 PIC S9(4) COMP VALUE +16. 03 PIC X(16) VALUE 'FREE FI(TEMPFLE)'. 01 WS-TESTREC. 03 PIC X(80) VALUE ' PRINT INFILE(TEMPLE) CHAR COUNT(10) '. EJECT PROCEDURE DIVISION. SKIP1 AA-MAIN-LINE SECTION. SKIP1 CALL WS-BPXWDYN USING ALLOC-FILE. DISPLAY 'ALLOC CODE' RETURN-CODE UPON SYSOUT. OPEN OUTPUT TEST-OUT. WRITE TEST-REC FROM WS-TESTREC. CLOSE TEST-OUT. CALL WS-BPXWDYN USING FREE-FILE. DISPLAY 'FREE CODE' RETURN-CODE UPON SYSOUT. SKIP1 AA-MAIN-LINE-EOJ. GOBACK.
Re: IEBCOPY with I/O error on SYSIN
Paul, IEBCOPY is documented (and functions) as generating a SYSIN if none exists, if it's dummied, or if it's an empty file. Not sure what category a 'bad' file fits into, but I would guess it's essentially 'omitted'. If you feel strongly about it you could open a Share requirement. From DFP Utilities: When the SYSIN DD statement is a DD DUMMY, points to an empty file, or is omitted, IEBCOPY will generate a COPY statement that allows you to run IEBCOPY without supplying a control statement data set for SYSIN. MA -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Change of Ownership for a Job
Hello, Recently we have installed a IMS system. We have a requirement of changing all the started task userid for which I was able to do it easily, but there are some Jobs which generates automatically when the IMS region starts up for which the OWNER for the JOB is IBMUSER. Is it possible to change the Ownership of the IMS batch Jobs which starts automatically when IMS region is Bounced. Regards, Jags Jags, What version of z/OS, IMS and what SAF (ACF2, RACF, or Top Secret)? Could you provide a sample of a generated job? What Owner is it getting when it is submitted? You SAF product should be able to assign and owner. If not, then you may need to code an exit. I think that the owner is assigned at submission, so there are a couple of places this could be done. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Change of Ownership for a Job
Hello Lizette, Z/OS : 1.13 IMS : 11.1 SECURITY product : RACF 1.13 IMS11M41 JOB07743 IBMUSER 9 EXECUTION A DEV1 = Needs to be changed to other Owner IMS11F41 JOB07744 IBMUSER 9 EXECUTION A DEV1 = Needs to be changed to other Owner IMS11CR4 STC07738 IMSUSER15 EXECUTION DEV1 DEV1 IMS11RC4 STC07739 IMSUSER15 EXECUTION DEV1 DEV1 IMS11SCI STC07740 IMSUSER15 EXECUTION DEV1 DEV1 IMS11OM1 STC07741 IMSUSER15 EXECUTION DEV1 DEV1 IMS11M41 JESMSGLG: IMS11M41 17.43.21 JOB07224 WEDNESDAY, 15 FEB 2012 17.43.21 JOB07224 IRR010I USERID IBMUSER IS ASSIGNED TO THIS JOB. 17.43.21 JOB07224 IRR011I SECLABEL SYSHIGH IS ASSIGNED TO THIS JOB. 17.43.22 JOB07224 ICH70001I IBMUSER LAST ACCESS AT 17:43:21 ON WEDNESDAY, FEBR 17.43.22 JOB07224 $HASP373 IMS11M41 STARTED - INIT 2- CLASS A - SYS DEV1 17.43.23 JOB07224 +DFS0578I - READ SUCCESSFUL FOR DDNAME PROCLIB MEMBER = DFSI 11.12.45 JOB07224 THURSDAY, 16 FEB 2012 11.12.45 JOB07224 $HASP395 IMS11M41 ENDED -- JES2 JOB STATISTICS -- 15 FEB 2012 JOB EXECUTION DATE 59 CARDS READ 127 SYSOUT PRINT RECORDS 0 SYSOUT PUNCH RECORDS 8 SYSOUT SPOOL KBYTES JESJCL : IMS11M41 17.43.21 JOB07224 WEDNESDAY, 15 FEB 2012 17.43.21 JOB07224 IRR010I USERID IBMUSER IS ASSIGNED TO THIS JOB. 17.43.21 JOB07224 IRR011I SECLABEL SYSHIGH IS ASSIGNED TO THIS JOB. 17.43.22 JOB07224 ICH70001I IBMUSER LAST ACCESS AT 17:43:21 ON WEDNESDAY, FEBR 17.43.22 JOB07224 $HASP373 IMS11M41 STARTED - INIT 2- CLASS A - SYS DEV1 17.43.23 JOB07224 +DFS0578I - READ SUCCESSFUL FOR DDNAME PROCLIB MEMBER = DFSI 11.12.45 JOB07224 THURSDAY, 16 FEB 2012 11.12.45 JOB07224 $HASP395 IMS11M41 ENDED -- JES2 JOB STATISTICS -- 15 FEB 2012 JOB EXECUTION DATE 59 CARDS READ 127 SYSOUT PRINT RECORDS 0 SYSOUT PUNCH RECORDS 8 SYSOUT SPOOL KBYTES 1 //IMS11M41 JOB ACCT#, // 'SAGAR', // CLASS=A, // MSGCLASS=H,MSGLEVEL=(1,1), // NOTIFY=IBMUSER, // REGION=64M //* /*JOBPARM PROCLIB=PROC99 //* //* // //* IVP IMS 11.1 //* //* SKELETON: DFSIXS92 //* //* FUNCTION: IMBED - EXECUTION JOB FOR MPP #1 - IVP4 2 //IMS11M41 EXEC PROC=DFSMPR,TIME=(1440), // NBA=6, // OBA=5, // SOUT='*', SYSOUT CLASS // CL1=001, TRANSACTION CLASS 1 // CL2=000, TRANSACTION CLASS 2 // CL3=000, TRANSACTION CLASS 3 // CL4=000, TRANSACTION CLASS 4 // TLIM=10, MPR TERMINATION LIMIT // SOD=, SPIN-OFF DUMP CLASS // IMSID=IMS1, IMSID OF IMS CONTROL REGION // PREINIT=DC,PROCLIB DFSINTXX MEMBER // PWFI=Y PSEUDO=WFI 3 XX PROC SOUT=A,RGN=512K,SYS2=, XXCL1=001,CL2=000,CL3=000,CL4=000, XXOPT=N,OVLA=0,SPIE=0,VALCK=0,TLIM=00, XXPCB=000,PRLD=,STIMER=,SOD=,DBLDL=, XXNBA=,OBA=,IMSID=,AGN=,VSFX=,VFREE=, XXSSM=,PREINIT=,ALTID=,PWFI=N, XXAPARM=,LOCKMAX=,APPLFE=, XXENVIRON=,JVMOPMAS= XX* 4 XXREGION EXEC PGM=DFSRRC00,REGION=RGN, XXTIME=1440,DPRTY=(12,0), XXPARM=(MSG,CL1CL2CL3CL4, XXOPTOVLASPIEVALCKTLIMPCB, XXPRLD,STIMER,SOD,DBLDL,NBA, XXOBA,IMSID,AGN,VSFX,VFREE, XXSSM,PREINIT,ALTID,PWFI, XX'APARM',LOCKMAX,APPLFE, XXENVIRON,JVMOPMAS) XX* IEFC653I SUBSTITUTION JCL - PGM=DFSRRC00,REGION=512K,TIME=1440,DPRTY=( ,,,6,5,IMS1,DC,,Y,'') 5 XXSTEPLIB DD DSN=IMSEXE11.SYS2.PGMLIB,DISP=SHR IEFC653I SUBSTITUTION JCL - DSN=IMSEXE11.PGMLIB,DISP=SHR 6 XX DD DSN=IMS1110.SYS2.SDFSRESL,DISP=SHR IEFC653I SUBSTITUTION JCL - DSN=IMS1110.SDFSRESL,DISP=SHR 7 XXPROCLIB DD DSN=IMS1110.SYS2.PROCLIB,DISP=SHR IEFC653I SUBSTITUTION JCL - DSN=IMS1110.PROCLIB,DISP=SHR 8 XXSYSUDUMP DD SYSOUT=SOUT, XX DCB=(LRECL=121,BLKSIZE=3129,RECFM=VBA), XX SPACE=(125,(2500,100),RLSE,,ROUND) //* //* OVERRIDE PROC DD STATEMENTS //* //* --NONE-- //* //* ADDITIONAL DD STATEMENTS //* IEFC653I SUBSTITUTION JCL - SYSOUT=*,DCB=(LRECL=121,BLKSIZE=3129,RECFM 9 //DFSSTAT DD SYSOUT=* //* JESSYSMSG : O. MESSAGE 2 IEFC001I PROCEDURE DFSMPR WAS EXPANDED USING SYSTEM LIBRARY IMS1110.PROCLIB One thing I found IBMUSER reads a proclib called MEMBER = DFSINTDC : Member DFSINTDC has just IEFBR14 coded. Jags On Thu, Feb 16, 2012 at 6:04 PM, Lizette Koehler stars...@mindspring.comwrote: Hello, Recently we have installed a IMS system. We have a requirement of changing all the started task userid for which I was able to do it
Re: Change of Ownership for a Job
Cross Posting to JES2 RACF and IBM-Main Jags, If you look - you have a JOBCARD. You can put the assignment of the owner in there 1 //IMS11M41 JOB ACCT#, // 'SAGAR', // CLASS=A, // MSGCLASS=H,MSGLEVEL=(1,1), // NOTIFY=IBMUSER, // REGION=64M Lizette -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of jagadishan perumal Sent: Thursday, February 16, 2012 7:41 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Change of Ownership for a Job Hello Lizette, Z/OS : 1.13 IMS : 11.1 SECURITY product : RACF 1.13 IMS11M41 JOB07743 IBMUSER 9 EXECUTION A DEV1 = Needs to be changed to other Owner IMS11F41 JOB07744 IBMUSER 9 EXECUTION A DEV1 = Needs to be changed to other Owner IMS11CR4 STC07738 IMSUSER15 EXECUTION DEV1 DEV1 IMS11RC4 STC07739 IMSUSER15 EXECUTION DEV1 DEV1 IMS11SCI STC07740 IMSUSER15 EXECUTION DEV1 DEV1 IMS11OM1 STC07741 IMSUSER15 EXECUTION DEV1 DEV1 IMS11M41 JESMSGLG: IMS11M41 17.43.21 JOB07224 WEDNESDAY, 15 FEB 2012 17.43.21 JOB07224 IRR010I USERID IBMUSER IS ASSIGNED TO THIS JOB. 17.43.21 JOB07224 IRR011I SECLABEL SYSHIGH IS ASSIGNED TO THIS JOB. 17.43.22 JOB07224 ICH70001I IBMUSER LAST ACCESS AT 17:43:21 ON WEDNESDAY, FEBR 17.43.22 JOB07224 $HASP373 IMS11M41 STARTED - INIT 2- CLASS A - SYS DEV1 17.43.23 JOB07224 +DFS0578I - READ SUCCESSFUL FOR DDNAME PROCLIB MEMBER = DFSI 11.12.45 JOB07224 THURSDAY, 16 FEB 2012 11.12.45 JOB07224 $HASP395 IMS11M41 ENDED -- JES2 JOB STATISTICS -- 15 FEB 2012 JOB EXECUTION DATE 59 CARDS READ 127 SYSOUT PRINT RECORDS 0 SYSOUT PUNCH RECORDS 8 SYSOUT SPOOL KBYTES JESJCL : IMS11M41 17.43.21 JOB07224 WEDNESDAY, 15 FEB 2012 17.43.21 JOB07224 IRR010I USERID IBMUSER IS ASSIGNED TO THIS JOB. 17.43.21 JOB07224 IRR011I SECLABEL SYSHIGH IS ASSIGNED TO THIS JOB. 17.43.22 JOB07224 ICH70001I IBMUSER LAST ACCESS AT 17:43:21 ON WEDNESDAY, FEBR 17.43.22 JOB07224 $HASP373 IMS11M41 STARTED - INIT 2- CLASS A - SYS DEV1 17.43.23 JOB07224 +DFS0578I - READ SUCCESSFUL FOR DDNAME PROCLIB MEMBER = DFSI 11.12.45 JOB07224 THURSDAY, 16 FEB 2012 11.12.45 JOB07224 $HASP395 IMS11M41 ENDED -- JES2 JOB STATISTICS -- 15 FEB 2012 JOB EXECUTION DATE 59 CARDS READ 127 SYSOUT PRINT RECORDS 0 SYSOUT PUNCH RECORDS 8 SYSOUT SPOOL KBYTES 1 //IMS11M41 JOB ACCT#, // 'SAGAR', // CLASS=A, // MSGCLASS=H,MSGLEVEL=(1,1), // NOTIFY=IBMUSER, // REGION=64M //* /*JOBPARM PROCLIB=PROC99 //* //* // //* IVP IMS 11.1 //* //* SKELETON: DFSIXS92 //* //* FUNCTION: IMBED - EXECUTION JOB FOR MPP #1 - IVP4 2 //IMS11M41 EXEC PROC=DFSMPR,TIME=(1440), // NBA=6, // OBA=5, // SOUT='*', SYSOUT CLASS // CL1=001, TRANSACTION CLASS 1 // CL2=000, TRANSACTION CLASS 2 // CL3=000, TRANSACTION CLASS 3 // CL4=000, TRANSACTION CLASS 4 // TLIM=10, MPR TERMINATION LIMIT // SOD=, SPIN-OFF DUMP CLASS // IMSID=IMS1, IMSID OF IMS CONTROL REGION // PREINIT=DC,PROCLIB DFSINTXX MEMBER // PWFI=Y PSEUDO=WFI 3 XX PROC SOUT=A,RGN=512K,SYS2=, XXCL1=001,CL2=000,CL3=000,CL4=000, XXOPT=N,OVLA=0,SPIE=0,VALCK=0,TLIM=00, XXPCB=000,PRLD=,STIMER=,SOD=,DBLDL=, XXNBA=,OBA=,IMSID=,AGN=,VSFX=,VFREE=, XXSSM=,PREINIT=,ALTID=,PWFI=N, XXAPARM=,LOCKMAX=,APPLFE=, XXENVIRON=,JVMOPMAS= XX* 4 XXREGION EXEC PGM=DFSRRC00,REGION=RGN, XXTIME=1440,DPRTY=(12,0), XXPARM=(MSG,CL1CL2CL3CL4, XXOPTOVLASPIEVALCKTLIMPCB, XXPRLD,STIMER,SOD,DBLDL,NBA, XXOBA,IMSID,AGN,VSFX,VFREE, XXSSM,PREINIT,ALTID,PWFI, XX'APARM',LOCKMAX,APPLFE, XXENVIRON,JVMOPMAS) XX* IEFC653I SUBSTITUTION JCL - PGM=DFSRRC00,REGION=512K,TIME=1440,DPRTY=( ,,,6,5,IMS1,DC,,Y,'') 5 XXSTEPLIB DD DSN=IMSEXE11.SYS2.PGMLIB,DISP=SHR IEFC653I SUBSTITUTION JCL - DSN=IMSEXE11.PGMLIB,DISP=SHR 6 XX DD DSN=IMS1110.SYS2.SDFSRESL,DISP=SHR IEFC653I SUBSTITUTION JCL - DSN=IMS1110.SDFSRESL,DISP=SHR 7 XXPROCLIB DD DSN=IMS1110.SYS2.PROCLIB,DISP=SHR IEFC653I SUBSTITUTION JCL - DSN=IMS1110.PROCLIB,DISP=SHR 8 XXSYSUDUMP DD SYSOUT=SOUT, XX DCB=(LRECL=121,BLKSIZE=3129,RECFM=VBA), XX SPACE=(125,(2500,100),RLSE,,ROUND) //* //*
Re: Change of Ownership for a Job
Hi Jags, snippet Recently we have installed a IMS system. We have a requirement of changing all the started task userid for which I was able to do it easily, but there are some Jobs which generates automatically when the IMS region starts up for which the OWNER for the JOB is IBMUSER. Is it possible to change the Ownership of the IMS batch Jobs which starts automatically when IMS region is Bounced. /snippet I may have misunderstood the above but hopefully this may help. If the Started Task Ownership has been changed, hopefully by using the RACF CLASS STARTED, then the ownership of any jobs submitted by the IMS STCs should automatically pick up the RACF profile of the submitting task via standard propagation. If the issue is with any residual NOTIFY= keywords on the submitted jobs JOB statements, then the relevant JCL in the IMS PROCLIB, ours is IMS1110.PROCLIB will need updating. If the issue is that the jobs need a different RACF profile than that of the submitting STC, then the batch job statements will need an appropriate USER= keyword, and the IMS STCs will need SURROGAT submit access within RACF. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
RES: Question about XDC BATCH and automation
Hello Mr. John. Thanks again. Best Regards, and have a Nice Day. Sergio -Mensagem original- De: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] Em nome de McKown, John Enviada em: quarta-feira, 15 de fevereiro de 2012 16:59 Para: IBM-MAIN@bama.ua.edu Assunto: Re: Question about XDC BATCH and automation My mistake. You cannot do what I was describing with the output in JESMSGLG. You'll need to use the others' suggestions to use SDSF. I do know some other ways, but they are even more non standard and require installing some other software. Specifically, you need Dovetailed Technologies Dataset Pipes software. It is freely licensed for the download. Personally, I use the SDSF/REXX interface and suck in all such SYSOUT using my own REXX program. It is 121 lines long. It can read SYSOUT and put it either to a sequential dataset or a z/OS UNIX file, depending on the options specified. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets® 9151 Boulevard 26 . N. Richland Hills . TX 76010 (817) 255-3225 phone . john.mck...@healthmarkets.com . www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets® is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company®, Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Sérgio Lima Costa Sent: Wednesday, February 15, 2012 10:08 AM To: IBM-MAIN@bama.ua.edu Subject: RES: Question about XDC BATCH and automation Hello Mr. John. Thanks very ,much for your help. Not a help, but really a lesson. I Will try do this here, but Mr. John, today, when look on CICS SYSOUT, the ABEND messagens was in another report, i.e. 10.17.35 STC03526 +DFHSR0001 CICSP1 An abend (code 0C4/AKEA) has occurred at offset X'183C' in program RENINTEG. 876 (Module:DFHMEME) CICS symptom string for message DFHSR0001 is 876 PIDS/5655S9700 LVLS/660 MS/DFHSR0001 RIDS/DFHSRP PTFS/UK53808 10.23.42 STC03526 +DFHSR0001 CICSP1 An abend (code 0C4/AKEA) has occurred at offset X'183C' in program RENINTEG. 010 (Module:DFHMEME) CICS symptom string for message DFHSR0001 is 010 PIDS/5655S9700 LVLS/660 MS/DFHSR0001 RIDS/DFHSRP PTFS/UK53808 10.28.54 STC03526 +DFHSR0001 CICSP1 An abend (code 0C4/AKEA) has occurred at offset X'183C' in program RENINTEG. 614 (Module:DFHMEME) CICS symptom string for message DFHSR0001 is 614 PIDS/5655S9700 LVLS/660 MS/DFHSR0001 RIDS/DFHSRP PTFS/UK53808 10.47.38 STC03526 +DFHSR0001 CICSP1 An abend (code 0C4/AKEA) has occurred at offset X'183C' in program RENINTEG. 145 (Module:DFHMEME) CICS symptom string for message DFHSR0001 is 145 PIDS/5655S9700 LVLS/660 MS/DFHSR0001 RIDS/DFHSRP PTFS/UK53808 10.47.52 STC03526 +DFHSR0001 CICSP1 An abend (code 0C4/AKEA) has occurred at offset X'183C' in program RENINTEG. 215 (Module:DFHMEME) CICS symptom string for message DFHSR0001 is 215 PIDS/5655S9700 LVLS/660 MS/DFHSR0001 RIDS/DFHSRP PTFS/UK53808 11.05.29 STC03526 +DFHSR0001 CICSP1 An abend (code 0C4/AKEA) has occurred at offset X'183C' in program RENINTEG. 981 (Module:DFHMEME) CICS symptom string for message DFHSR0001 is 981 PIDS/5655S9700 LVLS/660 MS/DFHSR0001 RIDS/DFHSRP PTFS/UK53808 11.24.25 STC03526 +DFHSR0001 CICSP1 An abend (code 0C4/AKEA) has occurred at offset X'183C' in program RENINTEG. 886 (Module:DFHMEME) CICS symptom string for message DFHSR0001 is 886 PIDS/5655S9700 LVLS/660 MS/DFHSR0001 RIDS/DFHSRP PTFS/UK53808 This is showed in JESMSGLG. Can i do the same for this ? Best Regards -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN Atenção: Esta mensagem foi enviada para uso exclusivo do(s) destinatários(s) acima identificado(s), podendo conter informações e/ou documentos confidencias/privilegiados e seu sigilo é protegido por lei. Caso você tenha recebido por engano, por favor, informe o remetente e apague-a de seu sistema. Notificamos que é proibido por lei a sua retenção, disseminação, distribuição, cópia ou uso sem expressa autorização do remetente. Opiniões pessoais do remetente não refletem, necessariamente, o ponto de vista da CETIP, o qual é divulgado somente por pessoas
Re: CICS vs IMS
Frank, From IMS/DC point of view, It works almost the same. CICS has DBCTL that perform as a limited DBRC as well as IMS/DC has the DLI DBRC address spaces. Same commands, traces etc. Is this what your question refer to ? ITschak On Thu, Feb 16, 2012 at 2:04 AM, Frank Swarbrick frank.swarbr...@yahoo.comwrote: We are a CICS shop with IMS DB (DBCTL), but I've been curious for a while about the differences between how CICS works and how IMS TM works. I couldn't find anything on the web. Anyone have a link to a good reference? Thanks, Frank -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: 5 Byte Device Addresses?
They haven't been device addresses since 1983 with the advent of MVS/XA, in spite of the fact that people who had been calling them device addresses since 1964, for the most part, still call them device addresses. They have been device numbers since XA's redesign of the I/O architecture. And developers and documenters still create screen displays and tech doc with the now 31-years-obsolete nomenclature. I complain now and then to deaf ears. But that's ok, since I still call z/OS by the name MVS. At least I don't still call it OS/VS2 Release 2. Lol Bill Fairchild -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Dan Sent: Wednesday, February 15, 2012 6:56 PM To: IBM-MAIN@bama.ua.edu Subject: Re: 5 Byte Device Addresses? This is still a DOC problem as the manual simply states these are device addresses. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: 5 Byte Device Addresses?
W dniu 2012-02-16 15:14, Bill Fairchild pisze: They haven't been device addresses since 1983 with the advent of MVS/XA, in spite of the fact that people who had been calling them device addresses since 1964, for the most part, still call them device addresses. They have been device numbers since XA's redesign of the I/O architecture. And developers and documenters still create screen displays and tech doc with the now 31-years-obsolete nomenclature. I complain now and then to deaf ears. But that's ok, since I still call z/OS by the name MVS. At least I don't still call it OS/VS2 Release 2. Lol Yes, in z/OS (OS/390,...) there are device numbers, not adresses. Device numbers replaced device addresses in some sense (like VARY command, etc.). However people still use device address in place of device number. We discussed about fifth byte of the device number, and nobody was harmed by usage of device address. Everyone knew what are we talking about. IMHO that's the most important. Similar problems: KiB vs kB (1024 vs 1000) Unix System Services vs USS -- Radoslaw Skorupka Lodz, Poland -- Tre tej wiadomoci moe zawiera informacje prawnie chronione Banku przeznaczone wycznie do uytku subowego adresata. Odbiorc moe by jedynie jej adresat z wyczeniem dostpu osób trzecich. Jeeli nie jeste adresatem niniejszej wiadomoci lub pracownikiem upowanionym do jej przekazania adresatowi, informujemy, e jej rozpowszechnianie, kopiowanie, rozprowadzanie lub inne dziaanie o podobnym charakterze jest prawnie zabronione i moe by karalne. Jeeli otrzymae t wiadomo omykowo, prosimy niezwocznie zawiadomi nadawc wysyajc odpowied oraz trwale usun t wiadomo wczajc w to wszelkie jej kopie wydrukowane lub zapisane na dysku. This e-mail may contain legally privileged information of the Bank and is intended solely for business use of the addressee. This e-mail may only be received by the addressee and may not be disclosed to any third parties. If you are not the intended addressee of this e-mail or the employee authorised to forward it to the addressee, be advised that any dissemination, copying, distribution or any other similar activity is legally prohibited and may be punishable. If you received this e-mail by mistake please advise the sender immediately by using the reply facility in your e-mail software and delete permanently this e-mail including any copies of it either printed or saved to hard drive. BRE Bank SA, 00-950 Warszawa, ul. Senatorska 18, tel. +48 (22) 829 00 00, fax +48 (22) 829 00 33, www.brebank.pl, e-mail: i...@brebank.pl Sd Rejonowy dla m. st. Warszawy XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, nr rejestru przedsibiorców KRS 025237, NIP: 526-021-50-88. Wedug stanu na dzie 01.01.2012 r. kapita zakadowy BRE Banku SA (w caoci wpacony) wynosi 168.410.984 zotych. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
z-VM guest z-OS system diagnostics....
One of the first investigative tasks handed to me at my new job... ...and I don't know where to start. Got a z-OS 1.9 system, that runs as a guest under z/VM. (It's a long time since I last worked with such a combination. Last time it was VM/370(?) and MVS 1.3.0e, alongside a bunch of DOS/VSE/AF images, all on a 4381) Last night, at about 23:10 local time, the z-OS system apparently crashed (or was logged off of z-VM). Last console message(s) to appear show that an SMF dump job had been automatically started, but there's nothing unusual about that... disappeared. Any hints, tips, etc about where to look for other diagnostic info would be gratefully received... TIA -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: z-VM guest z-OS system diagnostics....
John, have a gander in the z/VM OPERATOR log at about the time the event happened. Would not be the first time that someone logged off instead of disconnecting a z/OS guest. There again, if the z/OS guest was disconnected in an unclean way that is a another thing altogether. In the z/VM OPERATOR log, also search for 'logged off by system'. Bon courage! = One of the first investigative tasks handed to me at my new job... = = ...and I don't know where to start. = = = = Got a z-OS 1.9 system, that runs as a guest under z/VM. (It's a long time = since I last worked with such a combination. Last time it was VM/370(?) = and MVS 1.3.0e, alongside a bunch of DOS/VSE/AF images, all on a 4381) = = = = Last night, at about 23:10 local time, the z-OS system apparently crashed = (or was logged off of z-VM). = = Last console message(s) to appear show that an SMF dump job had been = automatically started, but there's nothing unusual about that... = = disappeared. = = = = Any hints, tips, etc about where to look for other diagnostic info would = be gratefully received... = = = = TIA = = -- = For IBM-MAIN subscribe / signoff / archive access instructions, = send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN = John Cassidy (Dipl.-Ingr.) Kapellenstr. 21a D-65193 Wiesbaden EU Mobile: +49 (0) 170 794 3616 http://www.JDCassidy.net http://en.federaleurope.org/ http://sva-zhosting.com/en/index.php -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
On Wed, 15 Feb 2012 11:15:55 -0800, Scott Ford scott_j_f...@yahoo.com wrote: Walt, First , thanks for responding.. Let me explain: The STC is in LE Cobol..4.2 I want to call IKJEFTSR ...to call a rexx clist that will perform authorized functions , i.e.; alloc, free Alloc and free are not authorized commands as far as I know. But you mention using RACF commands later, and they of course are. You cannot invoke IKJEFTSR to run -authorized- commands using an environment that you create using IKJTSOEV. You can run unauthorized commands using an IKJTSOEV environment, but to run authorized commands using IKJEFTSR you actually need to run under the TSO TMP (IKJEFT01 or one of its alternate entry points). By the way, rather than running RACF commands, you should probably use the SAF IRRSEQ00 callable service to perform the RACF command functions you need, or for information retrieval the REXX-based IRRXUTIL function. -- Walt Farrell IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
On Wed, 15 Feb 2012 14:11:14 -0600, McKown, John john.mck...@healthmarkets.com wrote: Is this even possible? here: http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/ikj4b780/23.4.3.2 quote Table 122 shows the reason codes that are found in parameter 5 if IKJEFTSR completes with a return code of 20. ... 24(18) IKJEFTSR was invoked from a non-TSO/E environment. This service can only be used in a foreground or background TSO/E environment. /quote You can invoke IKJEFTSR under the TMP, or from within an environment created by IKJTSOEV (as Scott is doing). However, in order to use IKJEFTSR to invoke an APF-authorized command you need to run under the TMP. -- Walt Farrell IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: BPX.UNIQUE.USER APPLDATA model profile
On Wed, 15 Feb 2012 15:29:52 -0600, David Magee david.ma...@dillards.com wrote: I was wondering how some of you are handling the HOME field of the model userid profile specified in the APPLDATA field of the BPX.UNIQUE.USER porfile. The IBM examples I've seen all show /tmp for HOME. My current OEDFLTU userid in use with the BPX.DEFAULT.USER profile uses /tmp. Is there a way to have the generated OMVS segment have /u/userid show up in HOME maybe via a template similar to /u/sysuid (I know that SYSUID is unique to TSO/E). If possible, what are the pros and cons for one over the other? First, I would generally recommend using RACF-L for RACF questions, or MVS-OE for z/OS UNIX questions (such as this one). The relevant IBMers for those products generally do not follow IBM-MAIN, in my experience. But to answer your question, no, there's no way to do what you want. The intention for both BPX.DEFAULT.USER and BPX.UNIQUE.USER is that you're using those profiles to cover users who only incidentally happen to do something that needs access to UNIX functions. If you have users who are really acting as UNIX users (and thus might need to save data in their home directory) then you should manually assign an OMVS segment to them (possibly using the AUTOUID keyword) rather than relying on BPX.DEFAULT.USER or BPX.UNIQUE.USER. (Feel free to submit a requirement to IBM for z/OS UNIX to support some tag such as sysuid, though. It seems like a good idea that would simplify administration.) -- Walt Farrell IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Search in the archive
On Thu, 16 Feb 2012 09:20:55 +0100, Miklos Szigetvari miklos.szigetv...@isis-papyrus.com wrote: Hi Try to search in the archive/and got server errors for //http://bama.ua.edu//archives///ibm/-/main The proper address (as far as I know) is http://bama.ua.edu/archives/ibm-main.html -- Walt -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: IEBCOPY with I/O error on SYSIN
This behaviour gives a simple, and little known/used, method of running a compress without control cards. 1. Allocate SYSUT1 to your PDS 2. SYSUT2 DSN=*.SYSUT1 3. Omit SYSIN Runs a compress of SYSUT1 Regards, Mike Mike Wawiorko Global z Connectivity and Automation Engineering Global Technology Infrastructure and Services Barclays Bank Ground Floor (B4), Turing House, Radbroke Hall, WA16 9EU (Mail Van 49) Tel: +44(0)1565 615415 or internal 7-2000-5415 Mobile: 07824527120 Email: mailto:mike.wawio...@barclays.com P Please consider the environment before printing this e-mail -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Mary Anne Matyaz Sent: 16 February 2012 12:12 To: IBM-MAIN@bama.ua.edu Subject: Re: IEBCOPY with I/O error on SYSIN Paul, IEBCOPY is documented (and functions) as generating a SYSIN if none exists, if it's dummied, or if it's an empty file. Not sure what category a 'bad' file fits into, but I would guess it's essentially 'omitted'. If you feel strongly about it you could open a Share requirement. From DFP Utilities: When the SYSIN DD statement is a DD DUMMY, points to an empty file, or is omitted, IEBCOPY will generate a COPY statement that allows you to run IEBCOPY without supplying a control statement data set for SYSIN. MA -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN This e-mail and any attachments are confidential and intended solely for the addressee and may also be privileged or exempt from disclosure under applicable law. If you are not the addressee, or have received this e-mail in error, please notify the sender immediately, delete it from your system and do not copy, disclose or otherwise act upon any part of this e-mail or its attachments. Internet communications are not guaranteed to be secure or virus-free. The Barclays Group does not accept responsibility for any loss arising from unauthorised access to, or interference with, any Internet communications by any third party, or from the transmission of any viruses. Replies to this e-mail may be monitored by the Barclays Group for operational or business reasons. Any opinion or other information in this e-mail or its attachments that does not relate to the business of the Barclays Group is personal to the sender and is not given or endorsed by the Barclays Group. Barclays Bank PLC. Registered in England and Wales (registered no. 1026167). Registered Office: 1 Churchill Place, London, E14 5HP, United Kingdom. Barclays Bank PLC is authorised and regulated by the Financial Services Authority. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: 5 Byte Device Addresses?
Predictably--I am the pedant who insists on distinguishing KB and KiB--Bill Fairchild's point seems to me to be important. Quaint, long familiar terminology should be avoided where it is misleading. The original System/360 scheme was simple and in its way elegant. 01F---decodable unambiguously into (multiplexor) channel 0, control unit 1, and that control unit's device F or 15---was, for example, the usual device address of the card punch circa 1965, when punches were still real rather than virtual devices. Whatever its historical interest may be, this scheme and its progressively less elegant, patched together successors are now architecturally irrelevant; and it is time to 1) give the old terminology a decent burial and 2) talk about device numbers instead. On 2/16/12, R.S. r.skoru...@bremultibank.com.pl wrote: W dniu 2012-02-16 15:14, Bill Fairchild pisze: They haven't been device addresses since 1983 with the advent of MVS/XA, in spite of the fact that people who had been calling them device addresses since 1964, for the most part, still call them device addresses. They have been device numbers since XA's redesign of the I/O architecture. And developers and documenters still create screen displays and tech doc with the now 31-years-obsolete nomenclature. I complain now and then to deaf ears. But that's ok, since I still call z/OS by the name MVS. At least I don't still call it OS/VS2 Release 2. Lol Yes, in z/OS (OS/390,...) there are device numbers, not adresses. Device numbers replaced device addresses in some sense (like VARY command, etc.). However people still use device address in place of device number. We discussed about fifth byte of the device number, and nobody was harmed by usage of device address. Everyone knew what are we talking about. IMHO that's the most important. Similar problems: KiB vs kB (1024 vs 1000) Unix System Services vs USS Radoslaw Skorupka Lodz, Poland tej wiadomo ci mo e zawiera informacje prawnie chronione Banku przeznaczone wy cznie do u ytku s bowego adresata. Odbiorc e by jedynie jej adresat z wy czeniem dost pu os b trzecich. Je eli nie jeste adresatem niniejszej wiadomo ci lub pracownikiem upowa nionym do jej przekazania adresatowi, informujemy, e jej rozpowszechnianie, kopiowanie, rozprowadzanie lub inne dzia anie o podobnym charakterze jest prawnie zabronione i mo e by karalne. Je eli otrzyma wiadomo omy kowo, prosimy niezw ocznie zawiadomi nadawc wysy c odpowied oraz trwale usun wiadomo czaj c w to wszelkie jej kopie wydrukowane lub zapisane na dysku. This e-mail may contain legally privileged information of the Bank and is intended solely for business use of the addressee. This e-mail may only be received by the addressee and may not be disclosed to any third parties. If you are not the intended addressee of this e-mail or the employee authorised to forward it to the addressee, be advised that any dissemination, copying, distribution or any other similar activity is legally prohibited and may be punishable. If you received this e-mail by mistake please advise the sender immediately by using the reply facility in your e-mail software and delete permanently this e-mail including any copies of it either printed or saved to hard drive. BRE Bank SA, 00-950 Warszawa, ul. Senatorska 18, tel. +48 (22) 829 00 00, fax +48 (22) 829 00 33, www.brebank.pl, e-mail: i...@brebank.pl d Rejonowy dla m. st. Warszawy XII Wydzia Gospodarczy Krajowego Rejestru S dowego, nr rejestru przedsi biorc w KRS 025237, NIP: 526-021-50-88. ug stanu na dzie 01.01.2012 r. kapita zak adowy BRE Banku SA (w ca ci wp acony) wynosi 168.410.984 z otych. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- John Gilmore, Ashland, MA 01721 - USA -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: CICS vs IMS
I'm glad the DYNAM/NODYNAM has been brought up. I have a question about a CICS application. It contains sub modules using CALL. PGM1 (CALL 'PGM2') -- PGM2 (CALL 'PGM3') -- PGM3 Each module is translated/pre-processed and then compiled with DYNAM. If PGM3 is compiled/linked, then PGM1 and PGM2 must be re-linked. Can this be avoided? Thank you... John -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of McKown, John Sent: Thursday, February 16, 2012 2:01 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS With the current CICS and COBOL, you must compile your COBOL with NODYNAM, as I'm sure you know. static CALLs in CICS are still not supported. However, with LE, it is now supported to do dynamic CALLs in COBOL. The dynamically CALLed subroutine still needs to be defined to CICS. The CICS Language Environment run-time does a CICS LOAD of the program, then the usual BALR/BASR to actually invoke the subroutine. The problem that I have with it is that this is not the equivalent of EXEC CICS LINK. CICS does not know that you've transferred control to a different program. And so any CICS messages, such as abends, in the CALL'd program have the name of the last program that was invoked via the EXEC CICS LINK type interface, instead of the real program name. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Fred Hoffman Sent: Wednesday, February 15, 2012 9:35 PM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS They both have their +s and -s, The logging for IMS is very good. Easy to use in recovery. I thought that CICS was quicker and also had a pretty good log system. Some of it depends upon the application you are using. I'm a CICS bigot but, I'm also an IMS DBA. It's you pick and how experienced your staff is. BTW, calls in cics are frowned upon, the last time I checked. HTH, Fred From: IBM Mainframe Discussion List on behalf of Roberts, John J Sent: Wed 2/15/2012 6:30 PM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS We are a CICS shop with IMS DB (DBCTL), but I've been curious for a while about the differences between how CICS works and how IMS TM works. I couldn't find anything on the web. Anyone have a link to a good reference? Try Google for IMS DC. The IMS Transaction Manager used to be called IMS/DC (for Data Communication). It has been a long time since I touched it, but my recollection is that it was a cleaner implementation within the Operating System. It used CALL level API's (no EXEC IMS precompiler) and exploited all the OS capabilities for multitasking and multiprocessing. CICS on the other hand tried to isolate apps from the OS, becoming its own mini-OS within a single OS address space. This was an advantage for CICS back in the 70's. But I suspect the table has turned under z/OS. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: CICS vs IMS
The whole point of DYNAM is that you do NOT have to recompile calling programs when a subroutine is recompiled UNLESS the interface changes (E.G. if the arguments change format or order of position or new values are required, etc.). The reason that CICS requires NODYNAM is that the CALL's that result from EXEC CICS statements have to be statically invoked and thus linked into the load module. Using CALL variable-name invokes dynamic calls regardless of the DYNAM/NODYNAM setting, even if the value of variable name is never changed. HTH Peter -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of John Weber Sent: Thursday, February 16, 2012 11:48 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS I'm glad the DYNAM/NODYNAM has been brought up. I have a question about a CICS application. It contains sub modules using CALL. PGM1 (CALL 'PGM2') -- PGM2 (CALL 'PGM3') -- PGM3 Each module is translated/pre-processed and then compiled with DYNAM. If PGM3 is compiled/linked, then PGM1 and PGM2 must be re-linked. Can this be avoided? Thank you... -- This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail and delete the message and any attachments from your system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: CICS vs IMS
I do think I need to be more specific, since the answers so far aren't quite what I was looking for (though interesting). Probably because I am on the applications side, rather than the systems side, I have different concerns than most here. Anyway, here are some specific questions... 1) How does BMS compare to MFS. Power, flexibility, ease of use. 2) Does IMS TM have an API for miscellaneous functions other than just sending and receiving data? Like, does it have (or need) things that transient data queues, temp storage queues, etc. 3) Does IMS TM support VSAM, or just IMS DB and DB2? 4) All CICS transactions run inside a single address space (assuming only once CICS region, of course). I believe this to not be the case for IMS TM, but to be honest I don't really understand how IMS TM works in this regard. Is there a control region that dispatches transactions to run each in their own message processing region? 4a) Is the IMS TM (DCCTL?) control region the same region as the IMS DB (DBCTL) region, assuming you have a DB/DC configuration? Frank From: Itschak Mugzach imugz...@gmail.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 7:02 AM Subject: Re: CICS vs IMS Frank, From IMS/DC point of view, It works almost the same. CICS has DBCTL that perform as a limited DBRC as well as IMS/DC has the DLI DBRC address spaces. Same commands, traces etc. Is this what your question refer to ? ITschak On Thu, Feb 16, 2012 at 2:04 AM, Frank Swarbrick frank.swarbr...@yahoo.comwrote: We are a CICS shop with IMS DB (DBCTL), but I've been curious for a while about the differences between how CICS works and how IMS TM works. I couldn't find anything on the web. Anyone have a link to a good reference? Thanks, Frank -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
Walt: Are we saying Cobol cant invoke TMP ?? If so, where do i find an example Scott J Ford Software Engineer http://www.identityforge.com From: Walt Farrell wfarr...@us.ibm.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 11:14 AM Subject: Re: Authorized functions On Wed, 15 Feb 2012 14:11:14 -0600, McKown, John john.mck...@healthmarkets.com wrote: Is this even possible? here: http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/ikj4b780/23.4.3.2 quote Table 122 shows the reason codes that are found in parameter 5 if IKJEFTSR completes with a return code of 20. ... 24(18) IKJEFTSR was invoked from a non-TSO/E environment. This service can only be used in a foreground or background TSO/E environment. /quote You can invoke IKJEFTSR under the TMP, or from within an environment created by IKJTSOEV (as Scott is doing). However, in order to use IKJEFTSR to invoke an APF-authorized command you need to run under the TMP. -- Walt Farrell IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: z-VM guest z-OS system diagnostics....
I agree i am an old VMer, especially is someone is running second level with privileges Scott J Ford Software Engineer http://www.identityforge.com From: J. Cassidy s...@jdcassidy.net To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 10:28 AM Subject: Re: z-VM guest z-OS system diagnostics John, have a gander in the z/VM OPERATOR log at about the time the event happened. Would not be the first time that someone logged off instead of disconnecting a z/OS guest. There again, if the z/OS guest was disconnected in an unclean way that is a another thing altogether. In the z/VM OPERATOR log, also search for 'logged off by system'. Bon courage! = One of the first investigative tasks handed to me at my new job... = = ...and I don't know where to start. = = = = Got a z-OS 1.9 system, that runs as a guest under z/VM. (It's a long time = since I last worked with such a combination. Last time it was VM/370(?) = and MVS 1.3.0e, alongside a bunch of DOS/VSE/AF images, all on a 4381) = = = = Last night, at about 23:10 local time, the z-OS system apparently crashed = (or was logged off of z-VM). = = Last console message(s) to appear show that an SMF dump job had been = automatically started, but there's nothing unusual about that... = = disappeared. = = = = Any hints, tips, etc about where to look for other diagnostic info would = be gratefully received... = = = = TIA = = -- = For IBM-MAIN subscribe / signoff / archive access instructions, = send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN = John Cassidy (Dipl.-Ingr.) Kapellenstr. 21a D-65193 Wiesbaden EU Mobile: +49 (0) 170 794 3616 http://www.JDCassidy.net http://en.federaleurope.org/ http://sva-zhosting.com/en/index.php -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: 5 Byte Device Addresses?
johnwgilmore0...@gmail.com (John Gilmore) writes: The original System/360 scheme was simple and in its way elegant. 01F---decodable unambiguously into (multiplexor) channel 0, control unit 1, and that control unit's device F or 15---was, for example, the usual device address of the card punch circa 1965, when punches were still real rather than virtual devices. trivia ... 009 was 1052-7 console 00C was 2540 reader 00D was 2540 punch 00E was 1403 printer some other configurations had 01F as 1052-7 console address (instead of 009) ... making the controller abstraction on the multiplexor channel slightly more consistent. tale of cp40 http://www.garlic.com/~lynn/cp40seas1982.txt done at the science center in the 60s some past posts http://www.garlic.com/~lynn/subtopic.html#545tech cms started out operating system being done on regular 360/40 with interactive commands on the 1052-7 operator's console cp40 was hardware modifications to 360/40 providing virtual memory, cp40 then implemented 360/40 virtual machines ... and cms ran on either bare-hardware or in cp40 virtual machine. when 360/67 became available standard with virtual memory, cp40 morphed into cp67. the default cms virtual machine configuration tended to stay the same that it started out from the real 360/40 configuration (256kbyte real memory configuration). additional history can be found in documents at Melinda's website http://web.me.com/melinda.varian/Site/Melinda_Varians_Home_Page.html this talks about 360/40 360/50 having integrated console at 01f (aka when it was not at 009): http://en.wikipedia.org/wiki/IBM_System/360 cp67 default configuration for cms virtual machine: http://www.bitsavers.org/pdf/ibm/360/cp67/ GH20-0859-0_CP67_Version_3_Users_Guide_Oct70.pdf pg. 5 ... shows the 009 configuration for 1052-7 console note the cp67 users guide also described 2741, 1052, and tty terminals when cp67 was originally delivered to the univ, it only has 2471 1052 terminal support ... but had dynamic terminal type identification support ... being able to use the SAD controller command to switch between the 2741 and 1052 line-scanner for each port/address. the univ. had a lot of tty terminals and so I had to add tty support (which was picked up and released with the product). I looked at the 2741/1052 and added the tty support so it also did dynamic terminal type identification ... being able to use SAD command to dynamically switch the different (2471, 1052, tty) line-scanners for each port. I then wanted to do a single dial-up hunt-group for dial-up terminals ... aka a common pool of phone numbers/modems with a single dial-in number for all terminals. It turns out that dynamic worked for leased lines ... but wouldn't work for common pool for all dial-up terminals. The problem was that while it was possible to dynamically switch the type of line-scanner (with SAD command) on per port basis ... the line speed was hard-wired for each port. This was somewhat the motivation for the univ. to start a clone controller project ... which could do both dynamic termainal type as well as dynamic line speed (i.e. 2741 1052 had the same line speed ... but different line-scanner ... tty had both a different line-scanner as well as different line speed). later four of us get written up as being responsible for (some part of) clone controller market. misc. past posts mentioning clone controller http://www.garlic.com/~lynn/subtopic.html#360pcm This reference has clone controller competition a primary motivation for the Future System effort: http://www.ecole.org/Crisis_and_change_1995_1.htm Then Ferguson Morris, Computer Wars: The Post-IBM World, Times Books, 1993 ... describe the distraction of the Future System (and internal politics killing 370 efforts) allowed clone processors to gain market foothold ... misc. past posts mentioning Future System http://www.garlic.com/~lynn/submain.html#futuresys -- virtualization experience starting Jan1968, online at home since Mar1970 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: CICS vs IMS
Frank, IMS DC does the same thing as CICS, but completely different. An IMS control region with its message region function basically like CICSPlex with AOR's and TOR's. Transactions in IMS can be tied to specific message regions and you can have several message regions tied to a control region. Transactions can be balanced across the message regions, and on misbehaving message region will not affect any of the other message regions in the same control region. IMS was designed from the start to process transaction this way whereas CICS was build to handle all transaction in one region. The TOR, AOR concept was added on to CICS afterwards. IMS is a beast to administer and is, in my opinion, less flexible than CICS. CICS is very easy to maintain. IE: CEDA DEFINE PROG(XXX_ compared to running gens etc. but one bad behaving transaction can bring everything to a halt in CICS. Ian http://www.cicsworld.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
HSMLOG file format
I found the below information in the archives, but I did not see an answer, where can i obtain the format of HSMLOGX/Y ? using ARCPRLOG, the output shows a lot of ID=xx (where xx is numeric), but nowhere can i find the complete list. can i use my little utility (like SAS) to read HSMLOG directly ? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: CICS vs IMS
Can probably get a good answer from the IMS listserv that BMC Supports: im...@imslistserv.bmc.com -Original Message- From: Frank Swarbrick [mailto:frank.swarbr...@yahoo.com] Sent: Thursday, February 16, 2012 12:44 PM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS I do think I need to be more specific, since the answers so far aren't quite what I was looking for (though interesting). Probably because I am on the applications side, rather than the systems side, I have different concerns than most here. Anyway, here are some specific questions... 1) How does BMS compare to MFS. Power, flexibility, ease of use. 2) Does IMS TM have an API for miscellaneous functions other than just sending and receiving data? Like, does it have (or need) things that transient data queues, temp storage queues, etc. 3) Does IMS TM support VSAM, or just IMS DB and DB2? 4) All CICS transactions run inside a single address space (assuming only once CICS region, of course). I believe this to not be the case for IMS TM, but to be honest I don't really understand how IMS TM works in this regard. Is there a control region that dispatches transactions to run each in their own message processing region? 4a) Is the IMS TM (DCCTL?) control region the same region as the IMS DB (DBCTL) region, assuming you have a DB/DC configuration? Frank From: Itschak Mugzach imugz...@gmail.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 7:02 AM Subject: Re: CICS vs IMS Frank, From IMS/DC point of view, It works almost the same. CICS has DBCTL that perform as a limited DBRC as well as IMS/DC has the DLI DBRC address spaces. Same commands, traces etc. Is this what your question refer to ? ITschak On Thu, Feb 16, 2012 at 2:04 AM, Frank Swarbrick frank.swarbr...@yahoo.comwrote: We are a CICS shop with IMS DB (DBCTL), but I've been curious for a while about the differences between how CICS works and how IMS TM works. I couldn't find anything on the web. Anyone have a link to a good reference? Thanks, Frank -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: 5 Byte Device Addresses?
In 77142d37c0c3c34da0d7b1da7d7ca346c...@nwt-s-mbx1.rocketsoftware.com, on 02/16/2012 at 02:14 PM, Bill Fairchild bfairch...@rocketsoftware.com said: They haven't been device addresses since 1983 with the advent of MVS/XA, in spite of the fact that people who had been calling them device addresses since 1964, for the most part, still call them device addresses. They have been device numbers since XA's redesign of the I/O architecture. Make that Subchannel Number[1]. But that's ok, since I still call z/OS by the name MVS. Is that not the official name of the BCP in z/OS? At least I don't still call it OS/VS2 Release 2. Well, it isn't. Program product versions of MVS haven't installed on top of the free base for decades, and before then the release number had climbed to 3.8. [1] To complicate matters, the subchannel-set identifier (SSID) and the Subchannel Number in the subsystem-identification word (SID) are not contiguous but have an intervening 1. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: 5 Byte Device Addresses?
In 4f3d172f.9030...@bremultibank.com.pl, on 02/16/2012 at 03:48 PM, R.S. r.skoru...@bremultibank.com.pl said: Yes, in z/OS (OS/390,...) there are device numbers, not adresses. No. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: 5 Byte Device Addresses?
In 0156585592475057.wa.mvsjes2sympatico...@bama.ua.edu, on 02/14/2012 at 07:06 AM, Dan D mvs-j...@sympatico.ca said: Subject: 5 Byte Device Addresses? ITYM 5-digit device addresses[1], unless you're talking about 4-bit bytes. IAC, the subchannel-set identifier (SSID) is not formally part of the Subchannel Number. I'm wondering when 5 byte UCBs The UCB is not the device address, it's a control block. UCBCHAN in a z/OS 1.12 and 13 system's MODGEN still shows as 2 bytes. How do you get 5 hex characters represented out of 2 bytes? The last I heard, device addresses for base exposures were limited to CSS 0, so 4 digits is adequate. As for alias addresses, I assume that part of PAV was adding new fields to the UCB; check IEFUCBOB or the data areas manual (It's one of the diagnosis manuals, but I don't recall the exact title.) BTW. the description of IPL in PoOps only mentions the 4-digit device number, not the SSID. [1] More properly, 5-digit Subchannel Numbers -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
In 132955.66876.yahoomail...@web164511.mail.gq1.yahoo.com, on 02/15/2012 at 11:15 AM, Scott Ford scott_j_f...@yahoo.com said: I want to call IKJEFTSR ...to call a rexx clist that will perform authorized functions , i.e.; alloc, free Those aren't authorized functions, unless you need to mount a tape. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
In a6b9336cdb62bb46b9f8708e686a7ea00e924b3...@nrhmms8p02.uicnrh.dom, on 02/15/2012 at 02:55 PM, McKown, John john.mck...@healthmarkets.com said: //STC EXEC PGM=IKJEFT01, // REGION=0M,PARM='%REXXCMD' //SYSTSPRT DD SYSOUT=* //SYSTSIN DD DUMMY //SYSEXEC DD DISP=SHR,DSN=some.REXX.library.with.REXXCMD.in.it //* OTHER REQUIRED DDs //* REXXCMD would look something like: /* REXX */ address tso CALL 'some.loadlib(myapfpgm)' Why do you need REXXCMD? You can shorten it by putting the CALL in SYSTSIN or by specifying PARM='CALL ''some.loadlib(myapfpgm)'''. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
In 9c2b672b-1bb5-4a16-a2ba-560eaf26c...@yahoo.com, on 02/15/2012 at 01:34 PM, Scott Ford scott_j_f...@yahoo.com said: long running STC program is linked ac(1) It must come from an APF-authorized concatenation for that to take effect. Do i create an entry in ikjtso00 for the STC program No. Do I create an entry in ikjtso00 for the clist name No. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: CICS vs IMS
My suggestion is: Don't use DYNAM for compiling CICS COBOL programs. Change your coding standards from: CALL 'PGM1'. to MOVE 'PGM1' TO CALLED-PROGRAM. CALL CALLED-PROGRAM. With CALLED-PROGRAM being PIC X(8). -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of John Weber Sent: Thursday, February 16, 2012 10:48 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS I'm glad the DYNAM/NODYNAM has been brought up. I have a question about a CICS application. It contains sub modules using CALL. PGM1 (CALL 'PGM2') -- PGM2 (CALL 'PGM3') -- PGM3 Each module is translated/pre-processed and then compiled with DYNAM. If PGM3 is compiled/linked, then PGM1 and PGM2 must be re-linked. Can this be avoided? Thank you... John -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of McKown, John Sent: Thursday, February 16, 2012 2:01 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS With the current CICS and COBOL, you must compile your COBOL with NODYNAM, as I'm sure you know. static CALLs in CICS are still not supported. However, with LE, it is now supported to do dynamic CALLs in COBOL. The dynamically CALLed subroutine still needs to be defined to CICS. The CICS Language Environment run-time does a CICS LOAD of the program, then the usual BALR/BASR to actually invoke the subroutine. The problem that I have with it is that this is not the equivalent of EXEC CICS LINK. CICS does not know that you've transferred control to a different program. And so any CICS messages, such as abends, in the CALL'd program have the name of the last program that was invoked via the EXEC CICS LINK type interface, instead of the real program name. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Fred Hoffman Sent: Wednesday, February 15, 2012 9:35 PM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS They both have their +s and -s, The logging for IMS is very good. Easy to use in recovery. I thought that CICS was quicker and also had a pretty good log system. Some of it depends upon the application you are using. I'm a CICS bigot but, I'm also an IMS DBA. It's you pick and how experienced your staff is. BTW, calls in cics are frowned upon, the last time I checked. HTH, Fred From: IBM Mainframe Discussion List on behalf of Roberts, John J Sent: Wed 2/15/2012 6:30 PM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS We are a CICS shop with IMS DB (DBCTL), but I've been curious for a while about the differences between how CICS works and how IMS TM works. I couldn't find anything on the web. Anyone have a link to a good reference? Try Google for IMS DC. The IMS Transaction Manager used to be called IMS/DC (for Data Communication). It has been a long time since I touched it, but my recollection is that it was a cleaner implementation within the Operating System. It used CALL level API's (no EXEC IMS precompiler) and exploited all the OS capabilities for multitasking and multiprocessing. CICS on the other hand tried to isolate apps from the OS, becoming its own mini-OS within a single OS address space. This was an advantage for CICS back in the 70's. But I suspect the table has turned under
Re: CICS vs IMS
That's not just a suggestion. It's a requirement. If you compile a CICS COBOL program with DYNAM the compile and link (bind) may succeed, but the program will not execute properly under CICS. (Not sure I've actually ever tried it, but I can't imagine any other result based on the documentation.) Frank From: McKown, John john.mck...@healthmarkets.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 12:56 PM Subject: Re: CICS vs IMS My suggestion is: Don't use DYNAM for compiling CICS COBOL programs. Change your coding standards from: CALL 'PGM1'. to MOVE 'PGM1' TO CALLED-PROGRAM. CALL CALLED-PROGRAM. With CALLED-PROGRAM being PIC X(8). -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of John Weber Sent: Thursday, February 16, 2012 10:48 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS I'm glad the DYNAM/NODYNAM has been brought up. I have a question about a CICS application. It contains sub modules using CALL. PGM1 (CALL 'PGM2') -- PGM2 (CALL 'PGM3') -- PGM3 Each module is translated/pre-processed and then compiled with DYNAM. If PGM3 is compiled/linked, then PGM1 and PGM2 must be re-linked. Can this be avoided? Thank you... John -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of McKown, John Sent: Thursday, February 16, 2012 2:01 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS With the current CICS and COBOL, you must compile your COBOL with NODYNAM, as I'm sure you know. static CALLs in CICS are still not supported. However, with LE, it is now supported to do dynamic CALLs in COBOL. The dynamically CALLed subroutine still needs to be defined to CICS. The CICS Language Environment run-time does a CICS LOAD of the program, then the usual BALR/BASR to actually invoke the subroutine. The problem that I have with it is that this is not the equivalent of EXEC CICS LINK. CICS does not know that you've transferred control to a different program. And so any CICS messages, such as abends, in the CALL'd program have the name of the last program that was invoked via the EXEC CICS LINK type interface, instead of the real program name. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Fred Hoffman Sent: Wednesday, February 15, 2012 9:35 PM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS They both have their +s and -s, The logging for IMS is very good. Easy to use in recovery. I thought that CICS was quicker and also had a pretty good log system. Some of it depends upon the application you are using. I'm a CICS bigot but, I'm also an IMS DBA. It's you pick and how experienced your staff is. BTW, calls in cics are frowned upon, the last time I checked. HTH, Fred From: IBM Mainframe Discussion List on behalf of Roberts, John J Sent: Wed 2/15/2012 6:30 PM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS We are a CICS shop with IMS DB (DBCTL), but I've been curious for a while about the differences between how CICS works and how IMS TM works. I couldn't find anything on the web. Anyone have a link to a good reference? Try Google for IMS DC. The IMS Transaction Manager used to be called IMS/DC (for Data Communication). It
Re: HSMLOG file format
I found the below information in the archives, but I did not see an answer, where can i obtain the format of HSMLOGX/Y ? using ARCPRLOG, the output shows a lot of ID=xx (where xx is numeric), but nowhere can i find the complete list. can i use my little utility (like SAS) to read HSMLOG directly ? What information are you seeking in the HSMLOGX/Y? If you have sas and MXG at your shop, I think (I am not sure) that MXG might have a format. Though I could be wrong on that. I typically just use the tools that IBM provides to format the records. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: HSMLOG file format
Thanks. I have compared the two files SMF and HSMLOG, and if you line up the HSMLOG with the SMF 241 record then the data is the same . If you start at byte 29 of the HSMLOG record then this matches up correctly with the SMF TYPE 241 record. Thanks for this information. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Lizette Koehler Sent: Thursday, February 16, 2012 12:18 PM To: IBM-MAIN@bama.ua.edu Subject: Re: HSMLOG file format I found the below information in the archives, but I did not see an answer, where can i obtain the format of HSMLOGX/Y ? using ARCPRLOG, the output shows a lot of ID=xx (where xx is numeric), but nowhere can i find the complete list. can i use my little utility (like SAS) to read HSMLOG directly ? What information are you seeking in the HSMLOGX/Y? If you have sas and MXG at your shop, I think (I am not sure) that MXG might have a format. Though I could be wrong on that. I typically just use the tools that IBM provides to format the records. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: 5 Byte Device Addresses?
Seymour is right that we have had subchannel numbers since 1983 instead of device addresses, but we have also had device numbers since 1983. And we still have device addresses, but the device address is now only one byte long and the subchannel and device numbers are two bytes long. As John Gilmore explained in an earlier post, we used to have 12-bit device addresses composed of three parts, the channel number, control unit number within the channel, and device number within the control unit within the channel. Beginning in 1983 with MVS/XA, within the processor architecture, as described by the PoOps, we have had device numbers and subchannel numbers. Device address now refers to an 8-bit number that specifies one of 256 possible devices within a DASD logical control unit, one or more of which may be contained with a physical control unit, DASD subsystem, Storage processor, etc. The device address appears in the sense data within certain I/O error messages. The 2-byte field in the UCB common segment called UCBCHAN (even IBM has not seen fit to rename this field to align with XA's terminology) contains the device number). The comment on this statement is correct: Binary device number. The subchannel number is stored in UCBSCHNO within a dif! ferent UCB segment. A quick scan of the IEAx messages section of z/OS MVS System Messages Volume 6 (SA22-7636-14) reveals the following commonly used explanation for the device number field in the message text: device-numberThe physical device address. Message IEA851A is especially interesting, as it states the following: IEA851A REPLY DEVICE ADDRESSES OR U ... Operator response: If any of the volumes listed in message IEA851I are to be mounted, enter REPLY id,'dev,dev,dev,...' where each dev is a device number for a device on which you will mount a volume. This message calls the operator's reply both a device address and a device number. In IBM's DASD reference books (e.g., 2105 Command Reference, SC26-7298-01), there is a one-byte field, made visible in sense data, which is called the device address, and it is further defined as Unit Address, the address as seen by the Storage Director on the channel interface, physical device identification, unit address of the Base Volume, and, in the glossary, The ESA/390 term for the field of an ESCON device-level frame that selects a specific device on a control-unit image. The glossary of the 2105 book also defines device number as The ESA/390 term for a four-hexadecimal-character identifier (e.g. X'13A0') associated with a device to facilitate communication between the program and the host operator. The device number is associated with a subchannel. Before an I/O hardware configuration generation is performed, some person decides that he would like a group of 32 devices referred to as 13A0 through 13BF in messages to operators, programmers, etc. These are called the device numbers for that group of 32 devices. But when the processor complex is powered-on, subchannel numbers beginning with x'' and increasing monotonically are arbitrarily associated with each such device number found in the hardware configuration data. E.g., our good old device number 13A0 might have a subchannel number of X'0345' one week and a subchannel number of x'041B' the following week if a lot more I/O hardware is installed in between successive power-ons. The device number remains constant because it is the external identifier that humans use, and humans like their terminology and numbers to remain constant. [ I'm glad the telephone company doesn't give me a new 7-digit telephone number every time they install some more new telephone nu! mbers between 000- and whatever my number is.] The device number and subchannel number are both stored in the UCB, but are used for different purposes. The device number is used to identify a device externally to people, and the subchannel number is used internally within the computer's hardware to access the device electronically. Bottom line: in most messages visible to humans, a device is identified by its device number, but within the software and hardware a device might be uniquely identified by its address or its subchannel number. It seems to me that when software displays a device's identification externally, such as on a screen display, it should normally label the identifier as a device number and not a device address or a subchannel number. But this would really depend on who the humans are who have to deal with the message. Hardware CEs might want to know the one-byte device address, e.g. An operator would want to know the device number on which to mount a tape rather than its subchannel number. Bill Fairchild -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Shmuel Metz (Seymour J.) Sent: Thursday, February 16, 2012 12:13 PM To:
zSeries Manpower Sizing
I am trying to find out how much staff, numbers and titles, eg z/OS, z/VM, VTAM/TCPIP, CICS, etc, are needed to run a large zSeries mainframe shop. Would some of you be so kind as to share that information with me. -- George Henke (C) 845 401 5614 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
On 16 February 2012 13:31, Scott Ford scott_j_f...@yahoo.com wrote: Walt: Are we saying Cobol cant invoke TMP ?? If so, where do i find an example I'm not Walt, of course. But as far as I know, no one can invoke the TMP. Well, not quite true, obviously, but no normal program, even if APF authorized can invoke the TMP. It wants to run as the job step task, and that's difficult. In particular, while you can have more than one job step task in an address space, the TMP and REXX won't stand for it. Well, perhaps they will let it go if you don't try to invoke anything authorized, but I don't think even that. The only ways I know that you can invoke the TMP are 1) from EXEC PGM= 2) from UNIX exec(), which effectively creates a new job step in a BPX initiator address space. Tony H. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
Tony, I dont want to knock IBM but for us developers this is UGLY ... Maybe the problem is they never intended for it to be called that way ... FWIW,, Regards, Scott J Ford Software Engineer http://www.identityforge.com From: Tony Harminc t...@harminc.net To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 4:31 PM Subject: Re: Authorized functions On 16 February 2012 13:31, Scott Ford scott_j_f...@yahoo.com wrote: Walt: Are we saying Cobol cant invoke TMP ?? If so, where do i find an example I'm not Walt, of course. But as far as I know, no one can invoke the TMP. Well, not quite true, obviously, but no normal program, even if APF authorized can invoke the TMP. It wants to run as the job step task, and that's difficult. In particular, while you can have more than one job step task in an address space, the TMP and REXX won't stand for it. Well, perhaps they will let it go if you don't try to invoke anything authorized, but I don't think even that. The only ways I know that you can invoke the TMP are 1) from EXEC PGM= 2) from UNIX exec(), which effectively creates a new job step in a BPX initiator address space. Tony H. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
On Thu, Feb 16, 2012 at 3:33 PM, Scott Ford scott_j_f...@yahoo.com wrote: Tony, I dont want to knock IBM but for us developers this is UGLY ... Maybe the problem is they never intended for it to be called that way ... Yes, exactly right on both counts. Don't forget that TSO is older than dirt and all subsequent efforts to graft on functionality are limited by its original design assumptions. Modern it ain't. -- This email might be from the artist formerly known as CC (or not) You be the judge. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
On 2/16/2012 2:31 PM, Tony Harminc wrote: On 16 February 2012 13:31, Scott Fordscott_j_f...@yahoo.com wrote: Walt: Are we saying Cobol cant invoke TMP ?? If so, where do i find an example I'm not Walt, of course. But as far as I know, no one can invoke the TMP. Well, not quite true, obviously, but no normal program, even if APF authorized can invoke the TMP. It wants to run as the job step task, and that's difficult. In particular, while you can have more than one job step task in an address space, the TMP and REXX won't stand for it. Well, perhaps they will let it go if you don't try to invoke anything authorized, but I don't think even that. The only ways I know that you can invoke the TMP are 1) from EXEC PGM= 2) from UNIX exec(), which effectively creates a new job step in a BPX initiator address space. Tony H. OK, just being a little crazy, what about EXEC PGM=MYASMPGM which does some stuff and then does XCTL to the TMP? Would that work? -- Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-355-2752 http://www.trainersfriend.com * To get a good Return on your Investment, first make an investment! + Training your people is an excellent investment * Try our tool for calculating your Return On Investment for training dollars at http://www.trainersfriend.com/ROI/roi.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
Steve: I have tried this and it works well enough to be part of our product... Cobol - calls 'irxjcl' - linkmvs pgmname - performs authorized functions ( in this case RACF ) Works well and is fast...I was hoping to short my development time on another product we support.. I will probably convert to C..I didnt originally write the Cobol STC, just had to create enhancements etc. Regards, Scott J Ford Software Engineer http://www.identityforge.com From: Steve Comstock st...@trainersfriend.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 4:42 PM Subject: Re: Authorized functions On 2/16/2012 2:31 PM, Tony Harminc wrote: On 16 February 2012 13:31, Scott Fordscott_j_f...@yahoo.com wrote: Walt: Are we saying Cobol cant invoke TMP ?? If so, where do i find an example I'm not Walt, of course. But as far as I know, no one can invoke the TMP. Well, not quite true, obviously, but no normal program, even if APF authorized can invoke the TMP. It wants to run as the job step task, and that's difficult. In particular, while you can have more than one job step task in an address space, the TMP and REXX won't stand for it. Well, perhaps they will let it go if you don't try to invoke anything authorized, but I don't think even that. The only ways I know that you can invoke the TMP are 1) from EXEC PGM= 2) from UNIX exec(), which effectively creates a new job step in a BPX initiator address space. Tony H. OK, just being a little crazy, what about EXEC PGM=MYASMPGM which does some stuff and then does XCTL to the TMP? Would that work? -- Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-355-2752 http://www.trainersfriend.com * To get a good Return on your Investment, first make an investment! + Training your people is an excellent investment * Try our tool for calculating your Return On Investment for training dollars at http://www.trainersfriend.com/ROI/roi.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
Amen brother Chris, I am converted...lol...I am an ex-Vmer, CMS was so much easier at times.. Scott J Ford Software Engineer http://www.identityforge.com From: Chris Craddock crashlu...@gmail.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 4:40 PM Subject: Re: Authorized functions On Thu, Feb 16, 2012 at 3:33 PM, Scott Ford scott_j_f...@yahoo.com wrote: Tony, I dont want to knock IBM but for us developers this is UGLY ... Maybe the problem is they never intended for it to be called that way ... Yes, exactly right on both counts. Don't forget that TSO is older than dirt and all subsequent efforts to graft on functionality are limited by its original design assumptions. Modern it ain't. -- This email might be from the artist formerly known as CC (or not) You be the judge. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
TSO is archaic and was, IMO, not well designed. Well, it possibly was back in MVT days. But it has not advanced with the times along with the rest of z/OS. And it depends on why you want to use TSO in a batch program. I would guess it is just so that you don't have to re-invent the wheel. Depending on what you want to do, you could possible use BPXWUNIX to invoke a UNIX REXX program which did an ADDRESS TSO to run the APF authorized TSO command. This will work. I do it myself at times. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets® 9151 Boulevard 26 . N. Richland Hills . TX 76010 (817) 255-3225 phone . john.mck...@healthmarkets.com . www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets® is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company®, Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Scott Ford Sent: Thursday, February 16, 2012 3:34 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Authorized functions Tony, I dont want to knock IBM but for us developers this is UGLY ... Maybe the problem is they never intended for it to be called that way ... FWIW,, Regards, Scott J Ford Software Engineer -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
Thats a great idea John ! I like it and will have to try it Scott J Ford Software Engineer http://www.identityforge.com From: McKown, John john.mck...@healthmarkets.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 5:11 PM Subject: Re: Authorized functions TSO is archaic and was, IMO, not well designed. Well, it possibly was back in MVT days. But it has not advanced with the times along with the rest of z/OS. And it depends on why you want to use TSO in a batch program. I would guess it is just so that you don't have to re-invent the wheel. Depending on what you want to do, you could possible use BPXWUNIX to invoke a UNIX REXX program which did an ADDRESS TSO to run the APF authorized TSO command. This will work. I do it myself at times. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets® 9151 Boulevard 26 . N. Richland Hills . TX 76010 (817) 255-3225 phone . john.mck...@healthmarkets.com . www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets® is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company®, Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Scott Ford Sent: Thursday, February 16, 2012 3:34 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Authorized functions Tony, I dont want to knock IBM but for us developers this is UGLY ... Maybe the problem is they never intended for it to be called that way ... FWIW,, Regards, Scott J Ford Software Engineer -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
CMS and XEDIT can easily bury TSO/ISPF. The only thing better is Linux/gvim ducking. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets® 9151 Boulevard 26 . N. Richland Hills . TX 76010 (817) 255-3225 phone . john.mck...@healthmarkets.com . www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets® is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company®, Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Scott Ford Sent: Thursday, February 16, 2012 3:54 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Authorized functions Amen brother Chris, I am converted...lol...I am an ex-Vmer, CMS was so much easier at times.. Scott J Ford Software Engineer http://www.identityforge.com From: Chris Craddock crashlu...@gmail.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 4:40 PM Subject: Re: Authorized functions On Thu, Feb 16, 2012 at 3:33 PM, Scott Ford scott_j_f...@yahoo.com wrote: Tony, I dont want to knock IBM but for us developers this is UGLY ... Maybe the problem is they never intended for it to be called that way ... Yes, exactly right on both counts. Don't forget that TSO is older than dirt and all subsequent efforts to graft on functionality are limited by its original design assumptions. Modern it ain't. -- This email might be from the artist formerly known as CC (or not) You be the judge. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
John: I loved VM/CMS and like Linux really well, close my eyes they are kissing cousins Scott J Ford Software Engineer http://www.identityforge.com From: McKown, John john.mck...@healthmarkets.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 5:14 PM Subject: Re: Authorized functions CMS and XEDIT can easily bury TSO/ISPF. The only thing better is Linux/gvim ducking. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets® 9151 Boulevard 26 . N. Richland Hills . TX 76010 (817) 255-3225 phone . john.mck...@healthmarkets.com . www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets® is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company®, Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Scott Ford Sent: Thursday, February 16, 2012 3:54 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Authorized functions Amen brother Chris, I am converted...lol...I am an ex-Vmer, CMS was so much easier at times.. Scott J Ford Software Engineer http://www.identityforge.com From: Chris Craddock crashlu...@gmail.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 4:40 PM Subject: Re: Authorized functions On Thu, Feb 16, 2012 at 3:33 PM, Scott Ford scott_j_f...@yahoo.com wrote: Tony, I dont want to knock IBM but for us developers this is UGLY ... Maybe the problem is they never intended for it to be called that way ... Yes, exactly right on both counts. Don't forget that TSO is older than dirt and all subsequent efforts to graft on functionality are limited by its original design assumptions. Modern it ain't. -- This email might be from the artist formerly known as CC (or not) You be the judge. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: zSeries Manpower Sizing
I am trying to find out how much staff, numbers and titles, eg z/OS, z/VM, VTAM/TCPIP, CICS, etc, are needed to run a large zSeries mainframe shop. Would some of you be so kind as to share that information with me. -- George Henke (C) 845 401 5614 George the only answer I can give is - It Depends What is the hardware layout, how many mips, SLAs, software mix, external contacts (vendors, business partners), transmission types (NJE, MQ), and so on. You can find titles like z/OS System programmer, z/OS System Administrator, Security officer, Application developers, Network Security, Network Administrators, and so many more. I know of no concise list that would give you information for such a broad question. Could you narrow it down a bit? What is your definition of LARGE. From my vantage point, it is like asking some one what is a tall person. If you are 3ft tall, then 5ft is tall. If you are 6ft tall, then 5ft is small. All is relative. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
Sometimes I wonder if IBM took the 'blue pill or the red pill'...from the Matrix...lol Scott J Ford Software Engineer http://www.identityforge.com From: McKown, John john.mck...@healthmarkets.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 5:11 PM Subject: Re: Authorized functions TSO is archaic and was, IMO, not well designed. Well, it possibly was back in MVT days. But it has not advanced with the times along with the rest of z/OS. And it depends on why you want to use TSO in a batch program. I would guess it is just so that you don't have to re-invent the wheel. Depending on what you want to do, you could possible use BPXWUNIX to invoke a UNIX REXX program which did an ADDRESS TSO to run the APF authorized TSO command. This will work. I do it myself at times. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets® 9151 Boulevard 26 . N. Richland Hills . TX 76010 (817) 255-3225 phone . john.mck...@healthmarkets.com . www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets® is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company®, Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Scott Ford Sent: Thursday, February 16, 2012 3:34 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Authorized functions Tony, I dont want to knock IBM but for us developers this is UGLY ... Maybe the problem is they never intended for it to be called that way ... FWIW,, Regards, Scott J Ford Software Engineer -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
I never saw any of those movies, so the meaning is unknown to me. John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets® 9151 Boulevard 26 . N. Richland Hills . TX 76010 (817) 255-3225 phone . john.mck...@healthmarkets.com . www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets® is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company®, Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Scott Ford Sent: Thursday, February 16, 2012 4:22 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Authorized functions Sometimes I wonder if IBM took the 'blue pill or the red pill'...from the Matrix...lol Scott J Ford Software Engineer http://www.identityforge.com From: McKown, John john.mck...@healthmarkets.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 5:11 PM Subject: Re: Authorized functions TSO is archaic and was, IMO, not well designed. Well, it possibly was back in MVT days. But it has not advanced with the times along with the rest of z/OS. And it depends on why you want to use TSO in a batch program. I would guess it is just so that you don't have to re-invent the wheel. Depending on what you want to do, you could possible use BPXWUNIX to invoke a UNIX REXX program which did an ADDRESS TSO to run the APF authorized TSO command. This will work. I do it myself at times. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets® 9151 Boulevard 26 . N. Richland Hills . TX 76010 (817) 255-3225 phone . john.mck...@healthmarkets.com . www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets® is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company®, Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Scott Ford Sent: Thursday, February 16, 2012 3:34 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Authorized functions Tony, I dont want to knock IBM but for us developers this is UGLY ... Maybe the problem is they never intended for it to be called that way ... FWIW,, Regards, Scott J Ford Software Engineer -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
John, In a nutshell, the 'red pill' was a big change and the 'blue pill' back to the mundane world..nothing changed Scott J Ford Software Engineer http://www.identityforge.com From: McKown, John john.mck...@healthmarkets.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 5:23 PM Subject: Re: Authorized functions I never saw any of those movies, so the meaning is unknown to me. John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets® 9151 Boulevard 26 . N. Richland Hills . TX 76010 (817) 255-3225 phone . john.mck...@healthmarkets.com . www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets® is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company®, Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Scott Ford Sent: Thursday, February 16, 2012 4:22 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Authorized functions Sometimes I wonder if IBM took the 'blue pill or the red pill'...from the Matrix...lol Scott J Ford Software Engineer http://www.identityforge.com From: McKown, John john.mck...@healthmarkets.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 5:11 PM Subject: Re: Authorized functions TSO is archaic and was, IMO, not well designed. Well, it possibly was back in MVT days. But it has not advanced with the times along with the rest of z/OS. And it depends on why you want to use TSO in a batch program. I would guess it is just so that you don't have to re-invent the wheel. Depending on what you want to do, you could possible use BPXWUNIX to invoke a UNIX REXX program which did an ADDRESS TSO to run the APF authorized TSO command. This will work. I do it myself at times. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets® 9151 Boulevard 26 . N. Richland Hills . TX 76010 (817) 255-3225 phone . john.mck...@healthmarkets.com . www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets® is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company®, Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Scott Ford Sent: Thursday, February 16, 2012 3:34 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Authorized functions Tony, I dont want to knock IBM but for us developers this is UGLY ... Maybe the problem is they never intended for it to be called that way ... FWIW,, Regards, Scott J Ford Software Engineer -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: FW: zSeries Manpower Sizing
ty Lizette, I am just trying to get a general idea of how many people a typical large zSeries shop needs running whatever on whatever as long as it is *big* and *blue* and wears a *z*. IOW if you think you are a large zSeries shop how many other people like you are around and what do they do, what do they support. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Lizette Koehler Sent: Thursday, February 16, 2012 5:21 PM To: IBM-MAIN@bama.ua.edu Subject: Re: zSeries Manpower Sizing I am trying to find out how much staff, numbers and titles, eg z/OS, z/VM, VTAM/TCPIP, CICS, etc, are needed to run a large zSeries mainframe shop. Would some of you be so kind as to share that information with me. -- George Henke (C) 845 401 5614 George the only answer I can give is - It Depends What is the hardware layout, how many mips, SLAs, software mix, external contacts (vendors, business partners), transmission types (NJE, MQ), and so on. You can find titles like z/OS System programmer, z/OS System Administrator, Security officer, Application developers, Network Security, Network Administrators, and so many more. I know of no concise list that would give you information for such a broad question. Could you narrow it down a bit? What is your definition of LARGE. From my vantage point, it is like asking some one what is a tall person. If you are 3ft tall, then 5ft is tall. If you are 6ft tall, then 5ft is small. All is relative. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- George Henke (C) 845 401 5614 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
z/OS Feeding SolarWinds
One of our Cyber Security folks is putting up a NOC (Network Operations Center) and they purchased something called SolarWinds. Now they are on my doorstep saying they want to scan my system along with DB2 and Oracle data bases. This is COOL and then I asked how they intended to do this magic; hey we can accept SNMP traffic. He said we already knew how to do all of this (guess it was my age and grey hair).Besides asking for contacts within SolarWinds, I thought I might throw this out to the community and see if anything rings a bell. Appreciate any info one might offer as to what I can do to get some pretty displays on the wall of the NOC and inspire awe in people. jim -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: zSeries Manpower Sizing
Yep Lizette, and how much money is in the budget ... Sent from my iPad Scott Ford Senior Systems Engineer www.identityforge.com On Feb 16, 2012, at 5:21 PM, Lizette Koehler stars...@mindspring.com wrote: I am trying to find out how much staff, numbers and titles, eg z/OS, z/VM, VTAM/TCPIP, CICS, etc, are needed to run a large zSeries mainframe shop. Would some of you be so kind as to share that information with me. -- George Henke (C) 845 401 5614 George the only answer I can give is - It Depends What is the hardware layout, how many mips, SLAs, software mix, external contacts (vendors, business partners), transmission types (NJE, MQ), and so on. You can find titles like z/OS System programmer, z/OS System Administrator, Security officer, Application developers, Network Security, Network Administrators, and so many more. I know of no concise list that would give you information for such a broad question. Could you narrow it down a bit? What is your definition of LARGE. From my vantage point, it is like asking some one what is a tall person. If you are 3ft tall, then 5ft is tall. If you are 6ft tall, then 5ft is small. All is relative. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: zSeries Manpower Sizing
That is not my intent. Please do not divulge anything with which you do not feel comfortable. Where ignorance is bliss, 'tis folly to be wise. Thomas Gray I am just trying to get a sense, a reasonability check, on how labor-intensive a large zSeries shop is. On Thu, Feb 16, 2012 at 6:11 PM, Scott Ford scott_j_f...@yahoo.com wrote: Yep Lizette, and how much money is in the budget ... Sent from my iPad Scott Ford Senior Systems Engineer www.identityforge.com On Feb 16, 2012, at 5:21 PM, Lizette Koehler stars...@mindspring.com wrote: I am trying to find out how much staff, numbers and titles, eg z/OS, z/VM, VTAM/TCPIP, CICS, etc, are needed to run a large zSeries mainframe shop. Would some of you be so kind as to share that information with me. -- George Henke (C) 845 401 5614 George the only answer I can give is - It Depends What is the hardware layout, how many mips, SLAs, software mix, external contacts (vendors, business partners), transmission types (NJE, MQ), and so on. You can find titles like z/OS System programmer, z/OS System Administrator, Security officer, Application developers, Network Security, Network Administrators, and so many more. I know of no concise list that would give you information for such a broad question. Could you narrow it down a bit? What is your definition of LARGE. From my vantage point, it is like asking some one what is a tall person. If you are 3ft tall, then 5ft is tall. If you are 6ft tall, then 5ft is small. All is relative. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- George Henke (C) 845 401 5614 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: zSeries Manpower Sizing
George, I worked for a large American company aboard, one of the top 5 in the world, we has a staff including mgmt around 200, that was MVS , VM , Communications, and DR. Sent from my iPad Scott Ford Senior Systems Engineer www.identityforge.com On Feb 16, 2012, at 6:19 PM, George Henke gahe...@gmail.com wrote: That is not my intent. Please do not divulge anything with which you do not feel comfortable. Where ignorance is bliss, 'tis folly to be wise. Thomas Gray I am just trying to get a sense, a reasonability check, on how labor-intensive a large zSeries shop is. On Thu, Feb 16, 2012 at 6:11 PM, Scott Ford scott_j_f...@yahoo.com wrote: Yep Lizette, and how much money is in the budget ... Sent from my iPad Scott Ford Senior Systems Engineer www.identityforge.com On Feb 16, 2012, at 5:21 PM, Lizette Koehler stars...@mindspring.com wrote: I am trying to find out how much staff, numbers and titles, eg z/OS, z/VM, VTAM/TCPIP, CICS, etc, are needed to run a large zSeries mainframe shop. Would some of you be so kind as to share that information with me. -- George Henke (C) 845 401 5614 George the only answer I can give is - It Depends What is the hardware layout, how many mips, SLAs, software mix, external contacts (vendors, business partners), transmission types (NJE, MQ), and so on. You can find titles like z/OS System programmer, z/OS System Administrator, Security officer, Application developers, Network Security, Network Administrators, and so many more. I know of no concise list that would give you information for such a broad question. Could you narrow it down a bit? What is your definition of LARGE. From my vantage point, it is like asking some one what is a tall person. If you are 3ft tall, then 5ft is tall. If you are 6ft tall, then 5ft is small. All is relative. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- George Henke (C) 845 401 5614 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: zSeries Manpower Sizing
ty, Scott, but 200 people must have supported many data centers. The feedback I have gotten so far, based on a few private replies, is about 8 - 12 people per CEC. On Thu, Feb 16, 2012 at 6:29 PM, Scott Ford scott_j_f...@yahoo.com wrote: George, I worked for a large American company aboard, one of the top 5 in the world, we has a staff including mgmt around 200, that was MVS , VM , Communications, and DR. Sent from my iPad Scott Ford Senior Systems Engineer www.identityforge.com On Feb 16, 2012, at 6:19 PM, George Henke gahe...@gmail.com wrote: That is not my intent. Please do not divulge anything with which you do not feel comfortable. Where ignorance is bliss, 'tis folly to be wise. Thomas Gray I am just trying to get a sense, a reasonability check, on how labor-intensive a large zSeries shop is. On Thu, Feb 16, 2012 at 6:11 PM, Scott Ford scott_j_f...@yahoo.com wrote: Yep Lizette, and how much money is in the budget ... Sent from my iPad Scott Ford Senior Systems Engineer www.identityforge.com On Feb 16, 2012, at 5:21 PM, Lizette Koehler stars...@mindspring.com wrote: I am trying to find out how much staff, numbers and titles, eg z/OS, z/VM, VTAM/TCPIP, CICS, etc, are needed to run a large zSeries mainframe shop. Would some of you be so kind as to share that information with me. -- George Henke (C) 845 401 5614 George the only answer I can give is - It Depends What is the hardware layout, how many mips, SLAs, software mix, external contacts (vendors, business partners), transmission types (NJE, MQ), and so on. You can find titles like z/OS System programmer, z/OS System Administrator, Security officer, Application developers, Network Security, Network Administrators, and so many more. I know of no concise list that would give you information for such a broad question. Could you narrow it down a bit? What is your definition of LARGE. From my vantage point, it is like asking some one what is a tall person. If you are 3ft tall, then 5ft is tall. If you are 6ft tall, then 5ft is small. All is relative. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- George Henke (C) 845 401 5614 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- George Henke (C) 845 401 5614 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: zSeries Manpower Sizing
George, I have worked for 20+ shops consulting and full time, this one I referred to was European HQ. Most of the other places systems staffs were 20+ , I worked most of those shops in NYC, numbers are small also, because of this economy, cutbacks. Sent from my iPad Scott Ford Senior Systems Engineer www.identityforge.com On Feb 16, 2012, at 6:37 PM, George Henke gahe...@gmail.com wrote: ty, Scott, but 200 people must have supported many data centers. The feedback I have gotten so far, based on a few private replies, is about 8 - 12 people per CEC. On Thu, Feb 16, 2012 at 6:29 PM, Scott Ford scott_j_f...@yahoo.com wrote: George, I worked for a large American company aboard, one of the top 5 in the world, we has a staff including mgmt around 200, that was MVS , VM , Communications, and DR. Sent from my iPad Scott Ford Senior Systems Engineer www.identityforge.com On Feb 16, 2012, at 6:19 PM, George Henke gahe...@gmail.com wrote: That is not my intent. Please do not divulge anything with which you do not feel comfortable. Where ignorance is bliss, 'tis folly to be wise. Thomas Gray I am just trying to get a sense, a reasonability check, on how labor-intensive a large zSeries shop is. On Thu, Feb 16, 2012 at 6:11 PM, Scott Ford scott_j_f...@yahoo.com wrote: Yep Lizette, and how much money is in the budget ... Sent from my iPad Scott Ford Senior Systems Engineer www.identityforge.com On Feb 16, 2012, at 5:21 PM, Lizette Koehler stars...@mindspring.com wrote: I am trying to find out how much staff, numbers and titles, eg z/OS, z/VM, VTAM/TCPIP, CICS, etc, are needed to run a large zSeries mainframe shop. Would some of you be so kind as to share that information with me. -- George Henke (C) 845 401 5614 George the only answer I can give is - It Depends What is the hardware layout, how many mips, SLAs, software mix, external contacts (vendors, business partners), transmission types (NJE, MQ), and so on. You can find titles like z/OS System programmer, z/OS System Administrator, Security officer, Application developers, Network Security, Network Administrators, and so many more. I know of no concise list that would give you information for such a broad question. Could you narrow it down a bit? What is your definition of LARGE. From my vantage point, it is like asking some one what is a tall person. If you are 3ft tall, then 5ft is tall. If you are 6ft tall, then 5ft is small. All is relative. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- George Henke (C) 845 401 5614 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- George Henke (C) 845 401 5614 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: zSeries Manpower Sizing
Well, I can say that one is not really enough, but some of us try. I think I could keep z/OS current, plus a few other ISV products, if there wasn't day to day needs and the occasional urgent demand for special requests. Dave Gibney Information Technology Services Washington State University -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of George Henke Sent: Thursday, February 16, 2012 1:19 PM To: IBM-MAIN@bama.ua.edu Subject: zSeries Manpower Sizing I am trying to find out how much staff, numbers and titles, eg z/OS, z/VM, VTAM/TCPIP, CICS, etc, are needed to run a large zSeries mainframe shop. Would some of you be so kind as to share that information with me. -- George Henke (C) 845 401 5614 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: CICS vs IMS
On Thu, Feb 16, 2012 at 11:44 AM, Frank Swarbrick frank.swarbr...@yahoo.com wrote: deleted 1) How does BMS compare to MFS. Power, flexibility, ease of use. Pretty similar. One run to create a binary map, one run to create the copybook. 2) Does IMS TM have an API for miscellaneous functions other than just sending and receiving data? Like, does it have (or need) things that transient data queues, temp storage queues, etc. If you have a save area, the call to your program includes the area. Yes, you can write to a que file for larger data storage. 3) Does IMS TM support VSAM, or just IMS DB and DB2? I think you have to create a fake IMS DB definition that reads a native VSAM file. 4) All CICS transactions run inside a single address space (assuming only once CICS region, of course). I believe this to not be the case for IMS TM, but to be honest I don't really understand how IMS TM works in this regard. Is there a control region that dispatches transactions to run each in their own message processing region? 4a) Is the IMS TM (DCCTL?) control region the same region as the IMS DB (DBCTL) region, assuming you have a DB/DC configuration? Frank You can define a region to contain just databases, or just transactions, or both. In addition, you can have Batch message programs that can process a file and update your live database while online transactions continue. One problem I have run into is multiple online updates to one or more related records. We solved this by putting a timestamp in the record. When you did an inquiry with a potential to update, you put the timestamp in MDT hidden fields on the screen. Then when you went to update, if the time stamp does not match, reject the updated because database had been updated. Without the timestamp, you could open 2 TN3270 session on one PC, browse to the same record(s) in both session, then change the text on both screens. When you press enter on the first screen, those changes were applied, then the enter on the other screen would change the records (resulting in overlaid text and bad keys), after the time stamp it was rejected and the screen was refreshed with the new database records. -- Mike A Schwab, Springfield IL USA Where do Forest Rangers go to get away from it all? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
On Thu, 16 Feb 2012 10:31:50 -0800, Scott Ford scott_j_f...@yahoo.com wrote: Walt: Are we saying Cobol cant invoke TMP ?? If so, where do i find an example No, but nothing stops you from structuring your STC so it invokes the TMP, and the TMP invokes your Cobol program. Then it can use IKJEFTSR to invoke authorized commands. -- Walt Farrell IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: zSeries Manpower Sizing
My experience as a SYSPROG was a while back at a smallish insurance company in Vancouver. IIRC, this was a mid-size ES9000 running OS/390, CICS/ESA, and DB2. I think we had TCP/IP networking via Token-Ring attachment to a 3174 controller. I know we all ran DOS PC's running some 3270 emulator. The systems department consisted of five guys: (1) One guy who specialized in the OS. (2) Myself who did the DB2 systems programming and DBA work. I also helped with CICS. (3) Another who did mostly CICS. (4) A team lead who did a little of everything, but mostly took care of the network and storage management. (5) A junior guy would supported all the third party software. And there was a manager who also had responsibility for the small app support team. I would consider this about the bare minimum for any z/OS shop. Consider too that our users were mostly 9 to 5 weekdays people. So we did not need extra bodies to support 24x7 operations. During the summer we were a bit stretched, sometimes with 2 people absent on vacation. But four of the five were pretty senior and could cover other areas in a pinch. John -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
On Thu, 16 Feb 2012 14:42:01 -0700, Steve Comstock st...@trainersfriend.com wrote: OK, just being a little crazy, what about EXEC PGM=MYASMPGM which does some stuff and then does XCTL to the TMP? Would that work? The last time I tried it (28+ years ago before I joined IBM) it was possible to do that, if you were careful to pass all the proper data. I have no idea if it would still work, nor whether IBM would consider it supported. -- Walt -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: CICS vs IMS
I'm not really an expert on this topic. We're an IMS shop, but all the IMS topics are hidden behind a site specific application framework, so that most of IMS is not visible to the applications. In my earlier life, I worked at a company, which used CICS on VSE. So my impression is: - CICS is faster, easier to handle, all transactions in one address space, has lots of features like transient data queues and temp store queues that are maybe missing in IMS, but - CICS programs need to be reentrant, no static storage allowed - because different transactions used in the same address space share the same copy of the load module. This may be no problem any more with modern LE compilers and WSA (writable static and RENT option, although for example with PL/1 IBM recommends not to use it. We don't use it and tell our developers to make the modules naturally reentrant - although IMS doesn't require it) - IMS doesn't require the modules to be reentrant, because every transaction has it's own region. - even VSAM files for examples are opened by CICS (once per address space) and are used not by normal file operations (OPEN FILE(x) in PL/1, for example), but through EXEC CICS commands. This is different for IMS, AFAIK - normal file operations there. - as a consequence: one misbehaving module in CICS can crash the whole CICS address space (at least I think so). With IMS, individual regions can be recovered and restarted. But I may be wrong on some details. Kind regards Bernd Am 16.02.2012 19:56, schrieb Ian Steyn: Frank, IMS DC does the same thing as CICS, but completely different. An IMS control region with its message region function basically like CICSPlex with AOR's and TOR's. Transactions in IMS can be tied to specific message regions and you can have several message regions tied to a control region. Transactions can be balanced across the message regions, and on misbehaving message region will not affect any of the other message regions in the same control region. IMS was designed from the start to process transaction this way whereas CICS was build to handle all transaction in one region. The TOR, AOR concept was added on to CICS afterwards. IMS is a beast to administer and is, in my opinion, less flexible than CICS. CICS is very easy to maintain. IE: CEDA DEFINE PROG(XXX_ compared to running gens etc. but one bad behaving transaction can bring everything to a halt in CICS. Ian http://www.cicsworld.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Authorized functions
On Thu, 16 Feb 2012 15:40:40 -0600, Chris Craddock wrote: On Thu, Feb 16, 2012 at 3:33 PM, Scott Ford wrote: I dont want to knock IBM but for us developers this is UGLY ... Maybe the problem is they never intended for it to be called that way ... Yes, exactly right on both counts. Don't forget that TSO is older than dirt and all subsequent efforts to graft on functionality are limited by its original design assumptions. Modern it ain't. Actually, I suspect the roots go deeper than that. The original design assumptions of OS/360 never included the requirement to support TSO; TSO was designed within the resulting constraints, and so on ... John M's BPXWUNIX - address TSO is the seed of a good idea. If only each of several concurrent BPXWUNIces addressing TSO could run ISPF attached to its own (emulated) 3270. Ah, for something like the DIAL command in VM! -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: CICS vs IMS
Thanks for the information! It may be worth noting that the issue you bring up can happen as easily with CICS. Or really any situation where more than one person can read/update the same record. Frank From: Mike Schwab mike.a.sch...@gmail.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 5:28 PM Subject: Re: CICS vs IMS On Thu, Feb 16, 2012 at 11:44 AM, Frank Swarbrick frank.swarbr...@yahoo.com wrote: deleted 1) How does BMS compare to MFS. Power, flexibility, ease of use. Pretty similar. One run to create a binary map, one run to create the copybook. 2) Does IMS TM have an API for miscellaneous functions other than just sending and receiving data? Like, does it have (or need) things that transient data queues, temp storage queues, etc. If you have a save area, the call to your program includes the area. Yes, you can write to a que file for larger data storage. 3) Does IMS TM support VSAM, or just IMS DB and DB2? I think you have to create a fake IMS DB definition that reads a native VSAM file. 4) All CICS transactions run inside a single address space (assuming only once CICS region, of course). I believe this to not be the case for IMS TM, but to be honest I don't really understand how IMS TM works in this regard. Is there a control region that dispatches transactions to run each in their own message processing region? 4a) Is the IMS TM (DCCTL?) control region the same region as the IMS DB (DBCTL) region, assuming you have a DB/DC configuration? Frank You can define a region to contain just databases, or just transactions, or both. In addition, you can have Batch message programs that can process a file and update your live database while online transactions continue. One problem I have run into is multiple online updates to one or more related records. We solved this by putting a timestamp in the record. When you did an inquiry with a potential to update, you put the timestamp in MDT hidden fields on the screen. Then when you went to update, if the time stamp does not match, reject the updated because database had been updated. Without the timestamp, you could open 2 TN3270 session on one PC, browse to the same record(s) in both session, then change the text on both screens. When you press enter on the first screen, those changes were applied, then the enter on the other screen would change the records (resulting in overlaid text and bad keys), after the time stamp it was rejected and the screen was refreshed with the new database records. -- Mike A Schwab, Springfield IL USA Where do Forest Rangers go to get away from it all? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: zSeries Manpower Sizing
John, I worked a twin 4381 VM and VM/VSE shop for awhile and we had about the same amount of ppl Sent from my iPad Scott Ford Senior Systems Engineer www.identityforge.com On Feb 16, 2012, at 7:29 PM, Roberts, John J jrobe...@dhs.state.ia.us wrote: My experience as a SYSPROG was a while back at a smallish insurance company in Vancouver. IIRC, this was a mid-size ES9000 running OS/390, CICS/ESA, and DB2. I think we had TCP/IP networking via Token-Ring attachment to a 3174 controller. I know we all ran DOS PC's running some 3270 emulator. The systems department consisted of five guys: (1) One guy who specialized in the OS. (2) Myself who did the DB2 systems programming and DBA work. I also helped with CICS. (3) Another who did mostly CICS. (4) A team lead who did a little of everything, but mostly took care of the network and storage management. (5) A junior guy would supported all the third party software. And there was a manager who also had responsibility for the small app support team. I would consider this about the bare minimum for any z/OS shop. Consider too that our users were mostly 9 to 5 weekdays people. So we did not need extra bodies to support 24x7 operations. During the summer we were a bit stretched, sometimes with 2 people absent on vacation. But four of the five were pretty senior and could cover other areas in a pinch. John -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: CICS vs IMS
Thank you all for the valuable information. John -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Frank Swarbrick Sent: Thursday, February 16, 2012 12:17 PM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS That's not just a suggestion. It's a requirement. If you compile a CICS COBOL program with DYNAM the compile and link (bind) may succeed, but the program will not execute properly under CICS. (Not sure I've actually ever tried it, but I can't imagine any other result based on the documentation.) Frank From: McKown, John john.mck...@healthmarkets.com To: IBM-MAIN@bama.ua.edu Sent: Thursday, February 16, 2012 12:56 PM Subject: Re: CICS vs IMS My suggestion is: Don't use DYNAM for compiling CICS COBOL programs. Change your coding standards from: CALL 'PGM1'. to MOVE 'PGM1' TO CALLED-PROGRAM. CALL CALLED-PROGRAM. With CALLED-PROGRAM being PIC X(8). -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of John Weber Sent: Thursday, February 16, 2012 10:48 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS I'm glad the DYNAM/NODYNAM has been brought up. I have a question about a CICS application. It contains sub modules using CALL. PGM1 (CALL 'PGM2') -- PGM2 (CALL 'PGM3') -- PGM3 Each module is translated/pre-processed and then compiled with DYNAM. If PGM3 is compiled/linked, then PGM1 and PGM2 must be re-linked. Can this be avoided? Thank you... John -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of McKown, John Sent: Thursday, February 16, 2012 2:01 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS With the current CICS and COBOL, you must compile your COBOL with NODYNAM, as I'm sure you know. static CALLs in CICS are still not supported. However, with LE, it is now supported to do dynamic CALLs in COBOL. The dynamically CALLed subroutine still needs to be defined to CICS. The CICS Language Environment run-time does a CICS LOAD of the program, then the usual BALR/BASR to actually invoke the subroutine. The problem that I have with it is that this is not the equivalent of EXEC CICS LINK. CICS does not know that you've transferred control to a different program. And so any CICS messages, such as abends, in the CALL'd program have the name of the last program that was invoked via the EXEC CICS LINK type interface, instead of the real program name. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Fred Hoffman Sent: Wednesday, February 15, 2012 9:35 PM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS They both have their +s and -s, The logging for IMS is very good. Easy to use in recovery. I thought that CICS was quicker and also had a pretty good log system. Some of it depends upon the application you are using. I'm a CICS bigot but, I'm also an IMS DBA. It's you pick and how experienced your staff is. BTW, calls in cics are frowned upon, the last time I checked. HTH, Fred From: IBM Mainframe Discussion List on behalf of Roberts, John J Sent: Wed 2/15/2012 6:30 PM To: IBM-MAIN@bama.ua.edu Subject: Re: CICS vs IMS We are a CICS shop with IMS DB (DBCTL), but I've been curious for a while about the differences
Re: 5 Byte Device Addresses?
At 13:12 -0500 on 02/16/2012, Shmuel Metz (Seymour J.) wrote about Re: 5 Byte Device Addresses?: In 77142d37c0c3c34da0d7b1da7d7ca346c...@nwt-s-mbx1.rocketsoftware.com, on 02/16/2012 at 02:14 PM, Bill Fairchild bfairch...@rocketsoftware.com said: But that's ok, since I still call z/OS by the name MVS. Is that not the official name of the BCP in z/OS? At least I don't still call it OS/VS2 Release 2. Well, it isn't. Program product versions of MVS haven't installed on top of the free base for decades, and before then the release number had climbed to 3.8. No Bill is right. OS/VS2 Release 2 WAS MVS like OS/VS2 Release 1 was SVS. SVS was OS/360 MVT with Virtual Addresses (SVS was a single 16MB Address Space with which was divided into smaller areas for the programs to use, just like MVT). MVS made the program's area into duplicate address ranges which sat between and shared the low and high address ranges which belonged to the Operating System. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: 5 Byte Device Addresses?
hal9...@panix.com (Robert A. Rosenberg) writes: No Bill is right. OS/VS2 Release 2 WAS MVS like OS/VS2 Release 1 was SVS. SVS was OS/360 MVT with Virtual Addresses (SVS was a single 16MB Address Space with which was divided into smaller areas for the programs to use, just like MVT). MVS made the program's area into duplicate address ranges which sat between and shared the low and high address ranges which belonged to the Operating System. old post about os/vs2 release 1 (svs), release 2 (mvs), and glide path to release 3 ... operating system for future system http://www.galric.com/~lynn/2011d.html#73 past future system posts http://www.garlic.com/~lynn/submain.html#futuresys really long-winded post about the transition to MVS and pointer-passing API causing enormous problems ... involved image of MVS occupying 8mbytes of every application virtual address space ... in order for kernel code to access application data ... and common segment for passing data between applications and semi-priviledged subsystems now in separate virtual address spaces ... and there needing to be sufficient sized common segment to handle all applications subsystems ... larger installations were having common segment threatening to increase to 6mbyte ... leaving only 2mbytes for application in every private 16mbyte virtual address space. http://www.garlic.com/~lynn/2012b.html#66 3081 370xa with 31bit addressing was taking so long to get out after future system failure ... that dual-address space was retrofitted to 3033 in attempt to somewhat alleviate the common segment pressure on what little was left for application use out of 16mbytes. some discussion getting out 3081 (and eventually 31bit addressing) after future system failure http://www.jfsowa.com/computer/memo125.htm -- virtualization experience starting Jan1968, online at home since Mar1970 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: CICS vs IMS
In 1329350690.69346.yahoomail...@web122113.mail.ne1.yahoo.com, on 02/15/2012 at 04:04 PM, Frank Swarbrick frank.swarbr...@yahoo.com said: We are a CICS shop with IMS DB (DBCTL), but I've been curious for a while about the differences between how CICS works and how IMS TM works. CICS was designed to run multiple transactions concurrently in a single region; IMS was designed to run each transaction in a separate region. The consequence is that IMS protects transactions against each other but has higher overhead. -- Shmuel (Seymour J.) Metz, SysProg and JOAT ISO position; see http://patriot.net/~shmuel/resume/brief.html We don't care. We don't have to care, we're Congress. (S877: The Shut up and Eat Your spam act of 2003) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: z-VM guest z-OS system diagnostics....
On Thu, 16 Feb 2012 16:28:34 +0100, J. Cassidy s...@jdcassidy.net wrote: Would not be the first time that someone logged off instead of disconnecting a z/OS guest. There again, if the z/OS guest was disconnected in an unclean way that is a another thing altogether. In the z/VM OPERATOR log, also search for 'logged off by system'. I've never understood why z/OS doesn't provide a command interface to CP. z/VSE does. Some things to think about for production guests: 1) Remove harmful commands from their repertoire. E.g. CP MODIFY COMMAND LOGOFF IBMCLASS * PRIVCLASS ABCDE removes LOGOFF from class G. (A too-simplistic example.) 2) Prevent CP DISCONNECT from hanging in CP READ by placing COMMAND SET RUN ON in the guest's directory entry 3) Prevent any CP READ fwhen the guest is disconnected from being fatal by placing COMMAND SET TIMEBOMB OFF in the directory entry. Alan Altmark Senior Managing z/VM and Linux Consultant IBM Endicott -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: 5 Byte Device Addresses?
To stay young requires unceasing cultivation of the ability to unlearn old falsehoods (Robert A Heinlein) Some-how seemed appropriate. Must be time I went back and re-read some of his work. Shane ... -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: zSeries Manpower Sizing
George Henke observes: The feedback I have gotten so far, based on a few private replies, is about 8 - 12 people per CEC. Maybe, but that doesn't mean when you double the number of CECs you would double the number of people, or vice versa. That is, you can't extrapolate linearly in either direction, as our meat computers subconsciously often do. For example, let's suppose you were a big shop in the year 2002 and you were running 10 z900 machines, each configured as 213 models with a PCI of 2888 each. So you had 28880 PCIs total, plus some coupling facility engines. Then assume you experienced 8% per year compound growth in capacity (with transaction volume growth, etc. -- holding the application set constant for this example) so that after a decade you'd end up with approximately 62350 PCIs (28880*1.08^10). Well, that capacity would fit on a mere two CECs today: a pair of z196s, perhaps at capacity setting 742 each (31675 PCIs each). An ~80% reduction in floor space, which unfortunately probably got more than filled with more expensive and less reliable infrastructure. And actually, in practice, when you take 10 footprints down to 2 you tend to pick up some nice virtualization benefits, so that's probably too many PCIs, never mind possible zIIP and other benefits. So in that decade would you have also taken a staff of 100 people (10 per CEC) and reduced it to 20 people? That would be an order of magnitude jump in staff productivity per PCI over 10 years. That seems extreme. Perhaps you wouldn't have 100 people (if you started with 100), but I don't think you'd have as few as 20 either, ceteris paribus. I don't think there's any serious disagreement that the mainframe has led the way in providing huge productivity improvements just about any way you measure it. As a generalization, you mainframers are extraordinarily productive, both in comparison to your predecessors and in comparison to your non-mainframe peers. (Keep up the good work -- and more, please.) There are some analysts who have looked at this stuff and who concur with the sort of trends and characteristics I describe above. Mainframes are characterized by very strong scale economies. There are at least two ways to take advantage of that: be big(ger) -- more transactions, more volume, more batch with the same or similar application set -- and be broader -- more applications sharing the same mainframe infrastructure. That doesn't mean you can't do fine financially and otherwise running a single application at low volumes, but you can do even better bigger and/or broader. Timothy Sipples Resident Enterprise Architect (Based in Singapore) E-Mail: timothy.sipp...@us.ibm.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Re: Archaic allocation in JCL (Was: Physical record size query)
On 2/13/2012 9:38 AM, Joel C. Ewing wrote: Requiring application programmers to think in terms of tracks and cylinders and to understand interaction between physical block size and track capacity is indeed archaic, as are artificial restrictions on number of extents or volumes. TRKs and CYLs? Most of our allocations are in MEGs. Doesn't everyone do that these days? SPACE=(1,(5,1),RLSE),AVGREC=MAllocate in MEGs -- Edward E Jaffe Phoenix Software International, Inc 831 Parkview Drive North El Segundo, CA 90245 310-338-0400 x318 edja...@phoenixsoftware.com http://www.phoenixsoftware.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN