FW: Downgrade 9672

2005-06-21 Thread Hanif Yong Abdullah
Hi Listers,

>  We have an IBM 9672-R56 hardware. Is there any way we can 
> downsize it to a lower capacity so that we can use it for testing.
> We understand that IBM has dropped marketing support for this
> hardware. 
> 
> Regards,
> 
> 
> 
This message is intended only for the use of the person(s) to whom it is
addressed and may contain information that is privileged or otherwise
protected from disclosure.If you are not the intended recipient you are
hereby notified that any use, review, disclosure or copying of this message
and the information it contains is prohibited. If you receive the message in
error , please notify the sender by reply e-mail and discard all its
contents.  Thank You.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


IBM announces Enterprise COBOL V3R4

2005-06-21 Thread Bill Klein
to:  IBM-MAIN
 LNGC distribution list

For those who might be interested (and might have missed it), today (June
21),   IBM made an announcement for:

 "IBM Enterprise COBOL for z/OS V3.4 continues the integration of COBOL and
Web-oriented business processes"

 See:
http://www.ibm.com/isource/cgi-bin/goto?it=usa_annred&on=205-153
 
 This release includes enhanced XML support, National data support, and
increased  compiler limits (among other things).

   ***

I know that many in IBM-MAIN do get/see announcements, but I thought I would
mention this as the 16M individual data-item size limit has been an issue
discussed in the group before (and it is now SIGNIFICANTLY increased) -
especially as it caused problems with XML and DB2 BLOBs.

This note is also going to the LNGC distribution list as this announcement
WILL move (at least) one of our requirements from "Accepted" to "Available"
on July 1, 2005.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Aplications running on z/OS1.4 after implementation of Unicode Conversion services (UCS)

2005-06-21 Thread Cwi Jeret
Thanks for all Your replays !

Cwi Jeret - Bank Hapoalim - T.A.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Upgrading from z/900 to z/990 and Cisco CIP HCD Definitions

2005-06-21 Thread Bruce Hewson
Hello Mark,

I dont see why they say that.

I still have Cisco CIP routers connected to my boxes...

I haven't changed their definitions, even though we have upgraded from
9672's to z900's to z990s.

I have both 3172 and SCTC coded for different connections.

They work...so I cant justify changing them.

On Tue, 21 Jun 2005 03:54:32 -0700, Mark T. Regan, K8MTR  wrote:

>We will be upgrading from a z/900 to a z/990 next month and we still have
some Cisco CIP
>cards to support for one of our customers. I asked Cisco if their CIP
cards support the z/990, and
>they said yes, but they added:
>
>
>"However from the M/F point of view you may have to define the HCD CIP
definitions as 3172.
>Apparently with some of the new processors you can't define the CIP links
as CTC or RS6K only as
>3172."
>
>Currently we have them defined as "SCTC" and they are connected via ESCON
Director switches.
>Does anyone if we will have to change UNIT= setting or not?
>
>Thanks.

Regards
Bruce Hewson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: HALON et al

2005-06-21 Thread Paul Hanrahan
Hi,

I've taken an armature interest in computer security.  I just flipped
through the book, "Information Warfare," by Winn Schwartau. The book doesn't
appear to focus on mainframes per se but the material I've read so far could
apply to IBM machines.

The more the mainframe becomes a web server the more the books I've picked
up apply to the mainframe.

I always think of :

1. Storage Key protection.
2. Segment protection.
3. Low address protection.
4. Page protection.
5. RACF and other offerings.
6. Page 0 and Key 0
7. Supervisor vs. problem state.

The books I'm reading now about security are real eye openers when it comes
to security.

Paul Hanrahan

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Shane Ginnane
Sent: Tuesday, June 21, 2005 9:42 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: HALON et al


I can only own up to being in 2.
In neither case was I affected by the gas - I was out the door as soon as I
heard it drop.
*VERY* good incentive to get moving.

Shane 

IBM Mainframe Discussion List  wrote on 22/06/2005
11:23:25 AM:

> Not true, I've been in 3 HALON dumps back in the days it was THE 
> method
for
> computer room FS.  One must exit quickly as it will make you short of
breath
> at high enough concentrations since it displaces oxygen.
>
> I can best describe the experience as running at 10,000 feet 
> elevation.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the
archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: OXYMORON ?

2005-06-21 Thread Robert Justice
it's certainly a play on words. 

- Original Message - 
From: "Ed Gould" <[EMAIL PROTECTED]>

Newsgroups: bit.listserv.ibm-main
To: 
Sent: Tuesday, June 21, 2005 4:59 PM
Subject: OXYMORON ?


* Computer Associates announces it will create its first worldwide 
Mainframe Center of Excellence in Prague.

http://www.zjournal.com/News.asp?NewsID=1242

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: HALON et al

2005-06-21 Thread Shane Ginnane
I can only own up to being in 2.
In neither case was I affected by the gas - I was out the door as soon as I
heard it drop.
*VERY* good incentive to get moving.

Shane 

IBM Mainframe Discussion List  wrote on 22/06/2005
11:23:25 AM:

> Not true, I've been in 3 HALON dumps back in the days it was THE method
for
> computer room FS.  One must exit quickly as it will make you short of
breath
> at high enough concentrations since it displaces oxygen.
>
> I can best describe the experience as running at 10,000 feet elevation.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Washington Post: 40 Million Credit Card #s Hacked

2005-06-21 Thread Tony Babonas
Not true, I've been in 3 HALON dumps back in the days it was THE method for
computer room FS.  One must exit quickly as it will make you short of breath
at high enough concentrations since it displaces oxygen.

I can best describe the experience as running at 10,000 feet elevation.  

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Ed Gould
Sent: Monday, June 20, 2005 10:17 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Washington Post: 40 Million Credit Card #s Hacked

On Jun 20, 2005, at 12:46 PM, Paul Hanrahan wrote:

> Bill,
>
> I think security should be unobtrusive. Perhaps the mandatory 
> sprinkler systems could have a dual purpose like some sort of fast 
> acting gas that renders one unconscious but doesn't kill.
>
> I mean think about it.  Fire arms are very indiscriminate weapons no 
> matter the caliber.  In a cubicle environment, unless there's been 
> some sort of alarm and drill, innocent by standers could be injured.
>
> Just joking.
>
> Paul Hanrahan
>
>

Paul,

There is a system called HALON (sp?) that could kill if its used (I
believe) as a fire suppression . One of our data centers had union issues
with it and went out on strike about it, IIRC (its been 30+ years).

Ed

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Change control software

2005-06-21 Thread Skip Robinson
I'd like to put in a plug for ISPW. We installed it to replace a better
known product from a well known vendor. ISPW the company gives good service
and is very responsive to the occasional problem that we report. Best of
all, ISPW the product sits well on the operating system because its
developers strive to use standard interfaces and avoid tricky hooks and
low-level calls to murky services. Middleware that gets a lot of attention
from sysprogs usually spells trouble. ;-)

.
.
.
JO.Skip Robinson
Southern California Edison Company
SHARE MVS Program Co-Manager
626-302-7535 Office
323-715-0595 Mobile
[EMAIL PROTECTED]


> -Original Message-
> Hi,
>
> I would like to have opinions on Mainframe (OS/390 & z/OS) software
> packages for change control when putting applications into production,
> such as SCLM and Endevor.
> Could anyone give me any opinions on pros and cons of SCLM, Endevor, and
> any other product like these ones?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: OXYMORON ?

2005-06-21 Thread Fenner, Jim
Maybe it's a redundancy.

I suggest CA locate this center in a fortress ...

Jim

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Ed Gould
Sent: 22 Jun 2005 06:59
To: IBM-MAIN@BAMA.UA.EDU
Subject: OXYMORON ?

* Computer Associates announces it will create its first worldwide 
Mainframe Center of Excellence in Prague.
http://www.zjournal.com/News.asp?NewsID=1242

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



IMPORTANT

 The information transmitted is for the use of the intended recipient only and 
may contain confidential and/or legally privileged material. Any review, 
re-transmission, disclosure dissemination or other use of, or taking of any 
action in reliance upon, this information by persons or entities other than the 
intended recipient is prohibited and may result in severe penalties.  If you 
have received this e-mail in error please notify the Privacy Hotline of the 
Australian Taxation Office, telephone 13 28 69 and delete all copies of this 
transmission together with any attachments. 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z990 Compatibility for Selected Releases

2005-06-21 Thread Crispin Hugo
Sorry Shane,
You must have missed the first note. We use VM, I don't use HCD so no probs.
t

Crispin Hugo




This email has been scanned for all known viruses by the MessageLabs Email 
Security Service and the Macro 4 plc internal virus protection system.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Displaying Cache value for 3990-6

2005-06-21 Thread Ron and Jenny Hawkins
Carlos,

You can also look in ISMF...

Ron

> -Original Message-
> From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
> Behalf Of Carlos A Bodra
> Sent: Wednesday, 22 June 2005 1:10 AM
> To: IBM-MAIN@BAMA.UA.EDU
> Subject: Displaying Cache value for 3990-6
> 
> Hi,
> 
> What command can display cache size and Fast Write Status for a 3990-6 (or
> similar)
> in OS/390 console:
> 
> Thanks
> 
> Carlos
> Sao Paulo - Brasil
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DASD and Mirroring

2005-06-21 Thread Ron and Jenny Hawkins
Hal,

I'm not so certain that you are agreeing to the same point that Skip is
making. I take Skip's point as meaning that the success of any Remote Copy
design requires attention to the creation of IO consistency in the event of
a failure.

On the other hand your point to me applies to the ability of an application
to recover from an abrupt failure, independent of whether Remote Copy is
used or not. 

The ability to restart an application or a batch stream is not a delivered
by Remote Copy. If a site fails the Online and Batch must recover in the
same manner irrespective of whether the systems restart in the original
centre, or fails over to the DR Centre. The open files may be recovered,
deleted, rolled-back/forward, etc - whatever is required to get started. 

Disk Mirroring delivers a customer the same restart ability in both sites,
providing IO Consistency is also delivered by the Remote Copy architecture.
It doesn't matter whether restart is in the original copy or the mirrored
copy, open datasets should already be dealt with by the application.

Ron


> -Original Message-
> From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
> Behalf Of Hal Merritt
> Sent: Wednesday, 22 June 2005 4:28 AM
> To: IBM-MAIN@BAMA.UA.EDU
> Subject: Re: DASD and Mirroring
> 
> Dead on.
> 
> At point of failure, files that are closed are perfect, but the files
> that are open are unusable. How can you tell which is which?
> 
> The DASD Redbooks are very clear. There is no free lunch. Mirroring is
> an excellent solution for a number of potential problems. But not all.
> 
> HTH and good luck.
> 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z990 Compatibility for Selected Releases

2005-06-21 Thread Shane Ginnane
Maybe - maybe not.
Do you have any plans to Power-on the new machine  ???.
If so you'll need an IOCP/HCD deck. If you want to generate that in
advance, you'll need the maint.
HCD at 1.4 wouldn't recognise the new kit. The (separate) Compatibility
option is no longer offered - it's all been rolled up into the Exploitation
offering.

Shane ...

> Paul, that's a great help. The old systems we run to support our
customers
> Will be ok. We have no intention of exploiting any z900 features.
>
> -Original Message-
>
> z990 Compatibilty Support allowed a customer to define the new processor
> type 2084 (z990) or 2086 (z890) from an existing processor using HCD and
> then run z/OS on the new processor without taking advantage of new z900
> features.  The new z990 features would be available under Exploitation
> Support.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Name/Token Services in COBOL?

2005-06-21 Thread Ed Gould

On Jun 21, 2005, at 4:29 PM, Farley, Peter x23353 wrote:


Not to mention the other language copy members there (IEANTC, IEANTPAS,
IEANTPLI).

BTW, the "C" language sample in SYS1.SAMPLIB(IEANTC) has an error in 
the

#pragma's for the 64-bit IEANT functions:

They are each declared as "linkage(...,OS64_NOSTACK)", but 
OS64_NOSTACK is

not a supported option of "#pragma linkage" in the IBM C compiler.

To whom does a simple application programmer like myself complain 
about this
erroneous sample?  How do I get a corrected sample into SYS1.SAMPLIB 
the
next time my sysprogs refresh/update the system?  Not that I'm doing 
any

64-bit work in C yet, I just want the compiler warning eliminated.

Peter
---SNIP_



Open an apar.

Ed

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Emulating SELTAPE=NEXT on z/OS.

2005-06-21 Thread Hal Merritt
This is no longer a technical issue. It is political. 

RMF III has a degradation analyzer built it. By dataset IIRC. 

Meanwhile, keep pushing for some supporting doc from the programmer.
Insist that you can't take the problem to IBM without such.  

Use this as a justification to acquire a product such as STROBE. You
need hard numbers.  

HTH and good luck. 

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Tim Hare
Sent: Friday, June 17, 2005 4:14 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Emulating SELTAPE=NEXT on z/OS.

"The programmer is insisting that it is due to tape I/O contention
and that the allocation of tapes is favoring the low addressed drives."

One must ask: what measurements does he present to back up his opinion 
that it's I/O contention?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Supported interface to set/retrieve TCBUSER field NON-authorized?

2005-06-21 Thread mike.lamartina
Joel C. Ewing wrote: The concept of Name/Token pairs is aesthetically 
pleasing and obviously less likely to get you into trouble, but has 
anyone done any serious study on the cost of using this service?


I don't know if this constitutes serious study, but I just wrote a 
little test program.


I created a system level name/token pair, retrieved and deleted it 
1,000,000 times.
I know that TCBTTIME is not a programming interface, but after the loop 
completed

TCBTTIME =X'001B FD00B480.
This is roughly 27 seconds, for an average of .27 second per round trip.

Then I ran a test just doing 1,000,000 retrievals.  In this case
TCBTTIME = X' FFE0FC20.  This is less than 1 second for 1 
create, 1,000,000 retrievals and 1 delete.


These test runs suggest that named/tokens are not too resource intensive.

Mike




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Name/Token Services in COBOL?

2005-06-21 Thread Farley, Peter x23353
Not to mention the other language copy members there (IEANTC, IEANTPAS,
IEANTPLI).

BTW, the "C" language sample in SYS1.SAMPLIB(IEANTC) has an error in the
#pragma's for the 64-bit IEANT functions:

They are each declared as "linkage(...,OS64_NOSTACK)", but OS64_NOSTACK is
not a supported option of "#pragma linkage" in the IBM C compiler.

To whom does a simple application programmer like myself complain about this
erroneous sample?  How do I get a corrected sample into SYS1.SAMPLIB the
next time my sysprogs refresh/update the system?  Not that I'm doing any
64-bit work in C yet, I just want the compiler warning eliminated.

Peter

-Original Message-
From: Peter Relson [mailto:[EMAIL PROTECTED]
Sent: Tuesday, June 21, 2005 7:43 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Name/Token Services in COBOL?


I was surprised that no one mentioned that interface definition file
IEANTCOB is provided precisely for the purpose of allowing a COBOL program
to call the name/token services.

Peter Relson
z/OS Core Technology Design

_
This message and any attachments are intended only for the use of the addressee 
and
may contain information that is privileged and confidential. If the reader of 
the 
message is not the intended recipient or an authorized representative of the
intended recipient, you are hereby notified that any dissemination of this
communication is strictly prohibited. If you have received this communication in
error, please notify us immediately by e-mail and delete the message and any
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Supported interface to set/retrieve TCBUSER field NON-authorized?

2005-06-21 Thread Shmuel Metz (Seymour J.)
In <[EMAIL PROTECTED]>, on 06/20/2005
   at 09:15 PM, Bill Fairchild <[EMAIL PROTECTED]> said:

>The bottom line is that TCBUSER, which is theoretically reserved for
>the   user, is actually reserved for all time unless users want to
>write authorized code.

>From IBM's perspective the installation is the user. TCBUSER is
available to the installation[1]; it was never intended for end users.
Similarly for CVTUSER.

[1] Not 3rd party software vendors, treading on each other's heels.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see  
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Washington Post: 40 Million Credit Card #s Hacked

2005-06-21 Thread Shmuel Metz (Seymour J.)
In <[EMAIL PROTECTED]>, on 06/20/2005
   at 09:23 PM, Bill Fairchild <[EMAIL PROTECTED]> said:

>An unauthorized attempt to access data set X could simply be due to a 
>typo.

Sure, and the security officer is probably aware of that. It's his
responsibility to investigate and to make the determination.

>Questioning the attempter is called for, 

At many shops the user will be (BTDTGTS) automatically suspended after
a small number of incidents. Unfortunately, one user action can
trigger a lot of access attempts, so it's easy to hit the threshold.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see  
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Change control software

2005-06-21 Thread Natarajan Mohan
With respect to the same subject, I would like to know if anybody uses
any of these change management packages with NATURAL.

Thanks
Nat

>>> [EMAIL PROTECTED] 06/21 12:03 PM >>>
We use Change Man from Serena Software.   

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Larry Kraus
Sent: Tuesday, June 21, 2005 10:30 AM
To: IBM-MAIN@BAMA.UA.EDU 
Subject: Re: Change control software

We use Cybermation's Alchemist.

-Original Message-
Hi,

I would like to have opinions on Mainframe (OS/390 & z/OS) software
packages for change control when putting applications into production,
such as SCLM and Endevor.
Could anyone give me any opinions on pros and cons of SCLM, Endevor,
and
any other product like these ones?

Thanks in advance.

James
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


OXYMORON ?

2005-06-21 Thread Ed Gould
* Computer Associates announces it will create its first worldwide 
Mainframe Center of Excellence in Prague.

http://www.zjournal.com/News.asp?NewsID=1242

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z990 Compatibility for Selected Releases

2005-06-21 Thread Crispin Hugo
Paul, that's a great help. The old systems we run to support our customers
Will be ok. We have no intention of exploiting any z900 features.

Crispin Hugo
Systems Programmer, Macro 4

Macro 4 plc, The Orangery, Turners Hill Road, Worth, Crawley, RH10 4SS
Direct Line: +44 (0)1293 872121 Switchboard: +44 (0) 1293 872000
Fax: +44 (0) 1293 872001
This message contains confidential information and is intended only for the
individual named. If you are not the named addressee you should not
disseminate, distribute or copy this e-mail. Please notify the sender
immediately by e-mail if you have received this e-mail by mistake and delete
this e-mail from your system. E-mail transmission cannot be guaranteed to be
secure or error-free as information could be intercepted, corrupted, lost,
destroyed, arrive late or incomplete, or contain viruses. The sender
therefore does not accept liability for any errors or omissions in the
contents of this message which arise as a result of e-mail transmission. If
verification is required please request a hard-copy version. This message is
provided for informational purposes and should not be construed as a
solicitation, offer or acceptance of any offer.

-Original Message-
From: Paul Dineen [mailto:[EMAIL PROTECTED] 
Sent: 21 June 2005 21:37
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: z990 Compatibility for Selected Releases

z990 Compatibilty Support allowed a customer to define the new processor
type 2084 (z990) or 2086 (z890) from an existing processor using HCD and
then run z/OS on the new processor without taking advantage of new z900
features.  The new z990 features would be available under Exploitation
Support.

>From IBM:
Compatibility support by the different operating systems allows you to run
existing workloads while being able to immediately take advantage of the
increased computing capacity and improved performance of the z990 server.
Although determined by individual operating system, z990 Compatibility
support generally provides for the following:

Support for a single logical channel subsystem (LCSS)
Support for up to 15 LPARs


Hope this helps,
Paul

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


This email has been scanned for all known viruses by the MessageLabs Email
Security Service and the Macro 4 plc internal virus protection system.




This email has been scanned for all known viruses by the MessageLabs Email 
Security Service and the Macro 4 plc internal virus protection system.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z990 Compatibility for Selected Releases

2005-06-21 Thread Paul Dineen
z990 Compatibilty Support allowed a customer to define the new processor
type 2084 (z990) or 2086 (z890) from an existing processor using HCD and
then run z/OS on the new processor without taking advantage of new z900
features.  The new z990 features would be available under Exploitation
Support.

>From IBM:
Compatibility support by the different operating systems allows you to run
existing workloads while being able to immediately take advantage of the
increased computing capacity and improved performance of the z990 server.
Although determined by individual operating system, z990 Compatibility
support generally provides for the following:

Support for a single logical channel subsystem (LCSS)
Support for up to 15 LPARs


Hope this helps,
Paul

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ICSF

2005-06-21 Thread Mark Zelden
On Tue, 21 Jun 2005 13:49:22 -0500, Ward, Mike S <[EMAIL PROTECTED]> wrote:

>The usage domains do match the LPARs. That was a recommendation that I
>found in the Installation Redbook. One other thing. If I set up the keys
>in 1 LPAR can the other LPAR use them or do I have to go through the
>process for each LPAR?
>

Since the LPARs are on the same CEC (box), then you don't have to
do anything.  If they were on separate CECs, then you would go through
the same process to load the master keys, but you don't re-init
the CKDS (INIT CKDS ==> N).

Cheers,

Mark
--
Mark Zelden
Sr. Software and Systems Architect
mailto: [EMAIL PROTECTED]
Systems Programming expert at http://Search390.com/ateExperts/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DASD and Mirroring

2005-06-21 Thread Hal Merritt
Dead on. 

At point of failure, files that are closed are perfect, but the files
that are open are unusable. How can you tell which is which? 

The DASD Redbooks are very clear. There is no free lunch. Mirroring is
an excellent solution for a number of potential problems. But not all. 

HTH and good luck. 

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Skip Robinson
Sent: Thursday, June 16, 2005 11:17 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: DASD and Mirroring
...
My own view is that DASD-to-DASD solutions are all prone to data
inconsistency in the case of abrupt failure. Unless meticulous care is
taken to put all consistency-dependent data within the scope of a single
hardware realm, however that's defined by a particular architecture,
then
sudden and catastrophic loss of connection might well degenerate into
the
sort of haphazard chaotic recover-by-backup FUBAR that mirroring is
supposed to have rendered obsolete in the first place.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z/OS future needs was Re: USS in a "legacy" world

2005-06-21 Thread Shmuel Metz (Seymour J.)
In <[EMAIL PROTECTED]>, on 06/20/2005
   at 09:31 PM, Clark Morris <[EMAIL PROTECTED]> said:

>1.  There must be a path from EBCDIC to either Unicode or the full
>ISO 10646 character set for all scripting languages, compiler source,
>internal names, etc. 

Yes, preferably with transparent handling of UTF-8 and UTF-16
encoding/decoding of UCS-16 and UCS-32.

>2.  Given that 54 gigabytes is a relatively small disk drive in the
>Unix and PC worlds, it is time that IBM revisited access method and
>data storage strategy.  While count key data is with us for at least
>five more years, a move to FBA architecture and far more scalable
>volumes is long overdue.  There is no need to support BDAM, QSAM,
>BPAM, and ISAM on FBA since there are VSAM or VSAM like equivalents
>for all of these access methods. 

Yes on the first part, no on the second. There is too much legacy code
tied to BSAM and QSAM to simply abandon them; a switch to FBA would
require a compatibility interface, similar to that for ISAM, for JES
in OS/VS1 and for JES2/JES3 in MVS.

>3.  The limitation to eight characters for names and passwords (44
>characters for data set names) is making z/OS look obsolete compared
>to other environments.

Yes.

>5.  A graphic interface and support for one or more application
>development environments is needed. 

Yes. I'd like to see an integartion of SM, ISPF and WSA.

>Websphere and related products may be the way to go

Everything that I've seen get webified has gotten harder to use.

>6.  Record size limitations are going to have to change. 

Yes.

>Microsoft is looking at a terabyte on the desktop in the not far 
>distant future

I don't know what m$ is looking at, but I'd be very surprised if there
haven't already been TB desktops for a while.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see  
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Displaying Cache value for 3990-6

2005-06-21 Thread Bill Fairchild
 
In a message dated 6/21/2005 1:51:33 P.M. Central Daylight Time,  
[EMAIL PROTECTED] writes:

The  configured cache storage is in bytes 
10-13, available cache  14-17,  pinned cache 18-21, offline cache 22-25, 
configured NVS 28-31, pinned  NVS  32-35, etc


Forgot one little detail.  :-(
If bits 4-7 of byte 0 contain X'1', then all these storage totals are in  
units of 1KB rather than units of bytes.  In the example I gave, byte 0  
contained X'00', so the "math" I showed was correct.  This allows  storage 
capacities 
over 4GB to be reported on.  The max value for any of  the 6 fields would then 
be 4TB (or 4096 GB, where 1 GB = 2**30 bytes).
 
Bill Fairchild

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: OSA-ICC and JBB7727

2005-06-21 Thread Porowski, Ken
Thanks, one less thing to worry about  Ken

-Original Message-
Steve Arnett

We are using OSA-ICC on our Z/890 without JBB7727 installed.  Seems to 
work fine for us on z/OS 1.4.

Porowski, Ken wrote:

>I saw a reference on the list that JBB7727 (Console restructure/enhancements) 
>was required to run an OSA-ICC.
>
>Can anyone confirm or deny this?
>
>I'm running z/OS 1.4 with z990 exploitation support but do not have JBB7727 
>on.  We plan on testing our new z990 this weekend with OSA-ICC.
>
>Thanks all.
>
>Ken Porowski
>AVP Systems Software
>CIT Group 
>Email: [EMAIL PROTECTED]
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: OSA-ICC and JBB7727

2005-06-21 Thread Steve Arnett
We are using OSA-ICC on our Z/890 without JBB7727 installed.  Seems to 
work fine for us on z/OS 1.4.


Porowski, Ken wrote:


I saw a reference on the list that JBB7727 (Console restructure/enhancements) 
was required to run an OSA-ICC.

Can anyone confirm or deny this?

I'm running z/OS 1.4 with z990 exploitation support but do not have JBB7727 on. 
 We plan on testing our new z990 this weekend with OSA-ICC.

Thanks all.

Ken Porowski
AVP Systems Software
CIT Group 
Email:	[EMAIL PROTECTED]



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

 



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z990 Compatibility for Selected Releases

2005-06-21 Thread Crispin Hugo
The following xtract says what  z990 exploitation will give me. I have no
need for any of the following. Is there any other reason I might need it ?

Can anybody tell me what z/990 Compatability would have given me, if it was
still around.

"With z/OS(r) V1.4 z990 Exploitation Support feature, you will be able to
install more operating system images and up to a total of 512 CHPIDs (up to
256 CHPIDs maximum per operating system), allowing each z890 except the
smallest sub-uniprocessor equipped capacity setting to access more channels,
Coupling Links, and LANs - ESCON (up to 420 channels), FICON Express (up to
40 channels), ISC-3 (up to 48 links), and OSA-Express (up to 40 ports). 
The z990 exploitation support seems to be to allow more channels more lpars
more channels etc. for" 


Crispin Hugo
Systems Programmer, Macro 4




This email has been scanned for all known viruses by the MessageLabs Email 
Security Service and the Macro 4 plc internal virus protection system.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Washington Post: 40 Million Credit Card #s Hacked

2005-06-21 Thread Joel C. Ewing
If there are installations that have this problem, I can't help but feel 
this must be due to some inappropriate data set naming conventions.   We 
got started on MVS late enough (1985) that we were able to create data 
set naming conventions with RACF in mind and enforce data set naming 
conventions with RACF.  Naming conventions clearly distinguish which 
datasets are system datasets (IBM, 3rd-party vendor, or installation 
customization datasets),  application data sets, and user datasets.


The only data sets that non Technical Services people have UPDATE access 
to are application-related and user data sets, not system data sets  - 
period.  Only system data sets are allowed to be APF authorized, in link 
list, or in the LPA -  period. Because of naming conventions, a trivial 
eyeball inspection of appropriate PARMLIB members can easily verify no 
violation of that policy.  I established the procedures and guidelines 
used for routine RACF security changes, and periodically (say every six 
months), double check that the security administrators haven't done 
anything stupid. Because of naming conventions, they recognize data sets 
that aren't owned by applications areas or users, and know enough to ask 
questions of Technical Services before changing permissions on such data 
sets, so it would be unusual to find RACF "strangeness" with system data 
sets. Daily logs of RACF changes are also reviewed by our Director of 
Technical Services and by one other manager for earlier detection of 
potential problems or "unusual" changes.


I have upon occasion found RACF permissions that were inappropriate, but 
I cannot remember any case in the last 20 years where one of those 
involved inappropriate UPDATE access to an APF library.


Gil Peleg wrote:
No shop would really admit it... but is it really that rare to find users 
with access to APF authorized libraries when they should not have this 
access (at all, or any more...) ?
  I find it hard to believe that large shops with 20-25 years of legacy and 
with thousands of users dont have at least one of the problems i mentioned.
And new shops who only started 5 years ago are usually so stressed to make 
the project deadlines that they tend to ignore some "minor" security issues



--
Joel C. Ewing, Fort Smith, AR[EMAIL PROTECTED]

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Supported interface to set/retrieve TCBUSER field NON-authorized?

2005-06-21 Thread Edward E. Jaffe

Joel C. Ewing wrote:

The concept of Name/Token pairs is aesthetically pleasing and 
obviously less likely to get you into trouble, but has anyone done any 
serious study on the cost of using this service?


I will confess that we have used and continue to use TCBUSER field as 
an anchor for some persistent installation data that is potentially 
accessed a VERY LARGE number of times per day.  The cost of only a few 
load fullword instructions to chase pointers to locate data through a 
TCBUSER field has got to be impossible to beat from an efficiency 
standpoint, but just what kind of performance can one expect from 
Name/Token lookup?  It would be nice some day to get rid of the 
TCBUSER field dependencies, but if that were to impact transaction 
times adversely or force an earlier hardware upgrade it would be 
awfully hard to justify replacing something that is working effectively.



This particular poster is running unauthorized code. What is the cost to 
setup and invoke an authorized service to update TCBUSER? How much of an 
exposure might be created in doing so?


TCBUSER is intended for *installation* use. Not IBM use. Not ISV use. 
Not "shareware" product use. Not "freeware" product use. Speaking from 
an ISV standpoint, we have no choice but to use Name/Token or roll our 
own alternative. (In the old days, we used to use ENQ SCOPE=STEP to save 
a TCB-level "token" and GQSCAN to retrieve it.)


If your (already) authorized code is using TCBUSER for its intended 
purpose (for example to save data for use by installation exits or 
system modifications), then don't worry. There's no reason to change a 
thing. That's what it's for!


--
-
| Edward E. Jaffe||
| Mgr, Research & Development| [EMAIL PROTECTED]|
| Phoenix Software International | Tel: (310) 338-0400 x318   |
| 5200 W Century Blvd, Suite 800 | Fax: (310) 338-0801|
| Los Angeles, CA 90045  | http://www.phoenixsoftware.com |
-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Change control software

2005-06-21 Thread Powers, Carol A - CNF
We use Change Man from Serena Software.   

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Larry Kraus
Sent: Tuesday, June 21, 2005 10:30 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Change control software

We use Cybermation's Alchemist.

-Original Message-
Hi,

I would like to have opinions on Mainframe (OS/390 & z/OS) software
packages for change control when putting applications into production,
such as SCLM and Endevor.
Could anyone give me any opinions on pros and cons of SCLM, Endevor, and
any other product like these ones?

Thanks in advance.

James

__

Disclaimer: This e-mail message is intended only for the personal use of
the recipient(s) named above.  If you are not an intended recipient, you
may not review, copy or distribute this message. If you have received
this communication in error, please notify us immediately by e-mail and
delete the original message.
This e-mail expresses views only of the sender, which are not to be
attributed to Rite Aid Corporation and may not be copied or distributed
without this statement.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send
email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search
the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z990 Compatibility for Selected Releases

2005-06-21 Thread Porowski, Ken
AFAIK the z990 compatibility (no longer available) and z990 Exploitation 
support is required if you are going to run on a z990 (and I assume z890).  The 
Exploitation support is NOT a series of PTF's but is a separate orderable 
package from Shop zSeries (or however you order).  You will not have this 
support just from the PSP.

We had a note from our DR site that we had to have the support on as they were 
installing z990's.

Ken Porowski
AVP Systems Software
CIT Group 
Email:  [EMAIL PROTECTED]


-Original Message-
Crispin Hugo

Dear all,
Is Z990 Compatibility needed if we are running under VM on the Z/890 we are
migrating to ?.
Is it just a series of fixes for z/990 and z/890 processors such as are
listed in the PSP buckets ?.

Crispin Hugo
Systems Programmer, Macro 4


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: MISSING CHANNEL AND DEVICE END

2005-06-21 Thread Low, David
>   In our case, it seemed to be a 3480 vary timeout that 
> affected our OSA.  Our OSA is an OSA-Express FENET running 
> SNA only on z/OS 1.4.  We've had this happen twice now, and 
> each time it sets the XCA PU's IINOP.  So far, IBM refuses to 
> believe that the errors are related.
> 
>   Do you mind telling me what microcode you applied to 
> you OSA?  (that was one of IBM's reccommendations for us).  
> 
> Thanks!
> <*BobL*>

Bob, I don't know how to get to the microcode panel on the HMC.  I can ask our 
CE next chance I get.

Dave Low

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Displaying Cache value for 3990-6

2005-06-21 Thread Bill Fairchild
 
In a message dated 6/21/2005 1:11:26 P.M. Central Daylight Time,  
[EMAIL PROTECTED] writes:

The  command you are looking for is DEVSERV i believe. 
Try:
DEVSERV  QDASD,
Or:
DEVSERV  QDASD,?



DEVSERV (abbreviation DS) is indeed the command, but QDASD, 
will not reveal the cache size, CFW or DFW status.  PATHS  (abbrev. P) is the 
DS 
operand that reveals the CFW and DFW status.  To  see the cache size, do a DS 
QD,,SNSS to get a hex display  of the 44 bytes of Sense 
Subsystem Status info in groups of eight  bytes.  See any control unit 
reference 
book for the meaning of all 44  bytes.  The configured cache storage is in 
bytes 
10-13, available cache  14-17, pinned cache 18-21, offline cache 22-25, 
configured NVS 28-31, pinned NVS  32-35, etc.  I just did this command and got 
this 
display:
 
400100C0 60006000 etc. etc.  Bytes 10-13 (decimal  numbers 
here) contain X'6000', which is 1.61 GB (where 1 GB = 10 to the 9th  bytes) 
or 1.5 GB (where 1 GB = 2 to the 30th power).
 
Now you see why IDCAMS LISTDATA is easier, or an interactive ISP  like 
TMON/MVS is a lot easier.
 
Bill Fairchild

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


z990 Compatibility for Selected Releases

2005-06-21 Thread Crispin Hugo
Dear all,
Is Z990 Compatibility needed if we are running under VM on the Z/890 we are
migrating to ?.
Is it just a series of fixes for z/990 and z/890 processors such as are
listed in the PSP buckets ?.

Crispin Hugo
Systems Programmer, Macro 4

Macro 4 plc, The Orangery, Turners Hill Road, Worth, Crawley, RH10 4SS
Direct Line: +44 (0)1293 872121 Switchboard: +44 (0) 1293 872000
Fax: +44 (0) 1293 872001
This message contains confidential information and is intended only for the
individual named. If you are not the named addressee you should not
disseminate, distribute or copy this e-mail. Please notify the sender
immediately by e-mail if you have received this e-mail by mistake and delete
this e-mail from your system. E-mail transmission cannot be guaranteed to be
secure or error-free as information could be intercepted, corrupted, lost,
destroyed, arrive late or incomplete, or contain viruses. The sender
therefore does not accept liability for any errors or omissions in the
contents of this message which arise as a result of e-mail transmission. If
verification is required please request a hard-copy version. This message is
provided for informational purposes and should not be construed as a
solicitation, offer or acceptance of any offer.





This email has been scanned for all known viruses by the MessageLabs Email 
Security Service and the Macro 4 plc internal virus protection system.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ICSF

2005-06-21 Thread Ward, Mike S
The usage domains do match the LPARs. That was a recommendation that I
found in the Installation Redbook. One other thing. If I set up the keys
in 1 LPAR can the other LPAR use them or do I have to go through the
process for each LPAR? 

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Mark Zelden
Sent: Tuesday, June 21, 2005 11:59 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: ICSF

On Tue, 21 Jun 2005 09:33:36 -0500, Ward, Mike S <[EMAIL PROTECTED]>
wrote:

>On LPAR 1 CSF starts with domain 0. On LPAR 1 MQSeries will use the 
>cards for SSL encryption of the channels. In LPAR 2 the domain is 1 and

>MQSeries in that LPAR will use the cards for SSL channel encryption. 
>CSF starts on both LPARS using the same vsam datasets. CSF doesn't 
>complain about it at start up on either LPAR. We haven't formally 
>started using the crypto cards for MQ yet. MQ is currently using the 
>z/os(RACF) software for channel encryption.  Since I am just starting 
>this I want to ensure that I do it correctly. If what I'm reading below

>is correct you are suggesting that I use separate datasets.

Not really.  I just don't (didn't) know enough about your environment.
Sometimes LPARs in the same sysplex aren't really "related" at all and
then it might be desireable to have separate data sets and not share the
control domains.   This doesn't sound like the case in your environment
since you already set up shared control domains.  So even though you
will have separate MQs on separate LPARs using encryption, sharing the
CKDS/PKDS and what you have indicated below is fine.  The only thing I
do is make the usage domain numbers match the LPAR numbers (although
this is not a requirement). I can't tell if that is what you are doing
or not.

>I currently have the below defined:
>
>CONTROL   USAGE
>LPAR100,01 01
>LPAR200,01 00
>


Regards,

Mark
--
Mark Zelden
Sr. Software and Systems Architect
mailto: [EMAIL PROTECTED]
Systems Programming expert at http://Search390.com/ateExperts/ Mark's
MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions, send
email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search
the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


OSA-ICC and JBB7727

2005-06-21 Thread Porowski, Ken
I saw a reference on the list that JBB7727 (Console restructure/enhancements) 
was required to run an OSA-ICC.

Can anyone confirm or deny this?

I'm running z/OS 1.4 with z990 exploitation support but do not have JBB7727 on. 
 We plan on testing our new z990 this weekend with OSA-ICC.

Thanks all.

Ken Porowski
AVP Systems Software
CIT Group 
Email:  [EMAIL PROTECTED]


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Change control software

2005-06-21 Thread Brendan Friel

   
  Brendan Friel 
   
  312/557-1521 To:  IBM Mainframe 
Discussion List  
  
   
  06/21/2005 01:25 cc:  IBM-MAIN@BAMA.UA.EDU
   
  PM   Subject: Re: Change control 
software(Document link: Brendan 
   Friel)   
   

   






SCLM and Endevor are functionally equivalent - your developers will be able
to get up to speed from one to the other
in a couple of hours.  Endevor is a bit more sophisticated.

The one thing with both is that they have migration integrity features - so
if you are moving up a level they may flag the move and not do it.  Then
you have the options of A) Finding a guru in your shop (if he or she
exists)  B) Overriding the errors/warnings and forcing the move if you have
allowed for this  or C) Tinkering with and retrying the move until it
works.

In both products the error messages will be along the lines of  'MOVE
DIDN'T WORK - CORRECT AND TRY AGAIN'.
After a while your developers will get the feel of either product and be
able to get by.

By far your major concerns should be $$$,  vendor and local tech support
and licensing.  There is some work involved in conversion if you change
your mind after implementation. Also someone in house or a consultant who
has successfully compeleted a couple of implementations.  You may also need
some customization for your shop.

These two  are the dominant market players.

Thanks,
Brendan

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Supported interface to set/retrieve TCBUSER field NON-authorized?

2005-06-21 Thread Joel C. Ewing
The concept of Name/Token pairs is aesthetically pleasing and obviously 
less likely to get you into trouble, but has anyone done any serious 
study on the cost of using this service?


I will confess that we have used and continue to use TCBUSER field as an 
anchor for some persistent installation data that is potentially 
accessed a VERY LARGE number of times per day.  The cost of only a few 
load fullword instructions to chase pointers to locate data through a 
TCBUSER field has got to be impossible to beat from an efficiency 
standpoint, but just what kind of performance can one expect from 
Name/Token lookup?  It would be nice some day to get rid of the TCBUSER 
field dependencies, but if that were to impact transaction times 
adversely or force an earlier hardware upgrade it would be awfully hard 
to justify replacing something that is working effectively.


Edward E. Jaffe wrote:

Farley, Peter x23353 wrote:


Agreed, Bill.  An anchor for persistent data is the application, and
name/token services is the "right" answer.  For very small amounts of 
data,

though, it just seems like overkill.
 



Name/token works for both large and small amounts of data. For large 
amounts of data, the token is a pointer and maybe some flags. For small 
amounts of data, the token itself *is* the data (up to 16 bytes).





--
Joel C. Ewing, Fort Smith, AR[EMAIL PROTECTED]

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Applications running on z/OS1.4 after implementation of Unico de Conversion services (UCS)

2005-06-21 Thread Richard V. Bond
Hello,

We need Unicode services for DB2 V8.  We let DB2 load its table at DB2 start
up (SYS1.SAMPLIB(CUNSISM6)).  I have also assembled that same table and put
its (large ~10216 pages of real storage) image in SYS1.PARMLIB since DB2 has
been known to have problems loading the table.  Upon failure, we can issue
SET UNI=xx to load it.  I'd prefer just to load the darn thing at IPL time
but was out-voted.

The storage used is not much of an impact to our large systems.

Hope this helps.

Dick Bond
Verizon Wireless

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED]
Behalf Of Cwi Jeret
Sent: Sunday, June 19, 2005 3:04 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Aplications running on z/OS1.4 after implementation of Unicode
Conversion services (UCS)


Hello,

Due to some problems after installation of "EVENT PUBLISHER"
we got the request from IBM to implement "Unicode Conversion Services" on
our Production Site.

We want to be sure that this will not affect running Production
Applications !

Does anyone have experience with implementation of "Unicode Conversion
Services"
and the impact on working applications ?

Cwi Jeret, Bank Hapoalim  - T.A.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
___
The information contained in this message and any attachment may be
proprietary, confidential, and privileged or subject to the work
product doctrine and thus protected from disclosure.  If the reader
of this message is not the intended recipient, or an employee or
agent responsible for delivering this message to the intended
recipient, you are hereby notified that any dissemination,
distribution or copying of this communication is strictly prohibited.
If you have received this communication in error, please notify me
immediately by replying to this message and deleting it and all
copies and backups thereof.  Thank you.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Displaying Cache value for 3990-6

2005-06-21 Thread Gil Peleg
The command you are looking for is DEVSERV i believe. 
Try:
DEVSERV QDASD,
Or:
DEVSERV QDASD,?
to view online usage explanation...
 Gil.

 On 6/21/05, Carlos A Bodra <[EMAIL PROTECTED]> wrote: 
> 
> What command can display cache size and Fast Write Status for a 3990-6 (or
> similar) in OS/390 console:

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread Gray, Larry - Larry A
What is the definition of your logstream?  If the records have been
offloaded, they are not really deleted by the DELETE option.  The MVS
logger only deletes log records at a file level when a new offload
dataset is created.  You will only get offloaded records deleted when
every record in the offload file is available for deletion and the
entire file is deleted the next time a new offload file is allocated.

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of McKown, John
Sent: Tuesday, June 21, 2005 1:30 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: LOGR for Dummies?


I've been told that another sysprog was given a method by the ex-CICS
sysprog on how to ensure that no LOGR records were lost. Apparently he
has gone a round tuit yet. Below is the JCL which unloads the LOGR for
one of the regions. I will wait to see what the appropriate method to
ensure no loss of records is. He may suggest your method. However, I
wonder about it efficacy due to the fact that this job is running while
the CICS is up . I.e. the two steps may get different records because
more records could be added after the first, non-delete, copy is run.
No, we cannot take the region down. Not even at 02:30 hours. This is a
political decision, not a technical one. Hopefully nobody is doing
anything at 02:30, but I wouldn't guarantee it. 

//CPYDFH5A  EXEC PGM=FILESAVE
//STEPLIB  DD DISP=SHR,DSN=SYS3.FILESAVE.PROD.LOADLIB
// DD DISP=SHR,DSN=SYS3.FILESAVE.V4R0.LOADLIB
// DD DISP=SHR,DSN=SYS3.ICEAM1.SICELINK  ALLOW DYNALLOC=OFF
//DFSPARM DD *
   OPTION  DYNALLOC=OFF,ODMAXBF=2M
//SYSPRINT DD  SYSOUT=*
//SYSUDUMP DD  SYSOUT=*
//ARCHIVE  DD DSN=LOGR.PCICS3.DFHJ05,
//SUBSYS=(LOGR,DFHLGCNV,'FROM=OLDEST,TO=YOUNGEST',DELETE)
//NEWJRNAL DD DSN=TSSPG.FILESAVE.ARCHIVE.PCICS3(+1),
//DISP=(NEW,CATLG,CATLG),LABEL=EXPDT=99000,  HW20050405
//UNIT=CAVTAPE,
//DATACLAS=DCVTPDR1, VTAPE DUPLEXING FOR ONSITE/OFFSITE
//VOL=(,,,35),
//RECFM=U,BLKSIZE=32760,LRECL=0,DSORG=PS
//SYSINDD  *
  NEWJOURNAL DDNAME(NEWJRNAL) ALL -
RECORD(YES)
  COPY FROMJOURNAL(ARCHIVE)
//*


> --
> John McKown
> Senior Systems Programmer
> UICI Insurance Center
> Information Technology
> 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Displaying Cache value for 3990-6

2005-06-21 Thread Bruce Black



What command can display cache size and Fast Write Status for a 3990-6 (or
similar) 
in OS/390 console:


The console command:   DS P,   (DEVSERV PATH)  will display Cache 
Fast Write and Dasd Fast Write status (column headings CFW and DFW.   I 
don't know how to display cache size from the console but you can do it 
with IDCAMS


//  EXEC  PGM=IDCAMS,REGION=2M
//SYSPRINT  DD  SYSOUT=*
//SH20CF  DD  UNIT=SYSALLDA,VOL=SER=SH20CF,DISP=OLD 
   LISTDATA  STATUS FILE(SH20CF)  
   LISTDATA DSTATUS SUBSYSTEM FILE(SH20CF)


--
Bruce A. Black
Senior Software Developer for FDR
Innovation Data Processing 973-890-7300
personal: [EMAIL PROTECTED]
sales info: [EMAIL PROTECTED]
tech support: [EMAIL PROTECTED]
web: www.innovationdp.fdr.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Change control software

2005-06-21 Thread Larry Kraus
We use Cybermation's Alchemist.

-Original Message-
Hi,

I would like to have opinions on Mainframe (OS/390 & z/OS) software
packages for change control when putting applications into production,
such as SCLM and Endevor.
Could anyone give me any opinions on pros and cons of SCLM, Endevor, and
any other product like these ones?

Thanks in advance.

James

__

Disclaimer: This e-mail message is intended only for the personal use of
the recipient(s) named above.  If you are not an intended recipient, you
may not review, copy or distribute this message. If you have received this
communication in error, please notify us immediately by e-mail and delete
the original message.
This e-mail expresses views only of the sender, which are not to be
attributed to Rite Aid Corporation and may not be copied or distributed
without this statement.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread McKown, John
I've been told that another sysprog was given a method by the ex-CICS sysprog 
on how to ensure that no LOGR records were lost. Apparently he has gone a round 
tuit yet. Below is the JCL which unloads the LOGR for one of the regions. I 
will wait to see what the appropriate method to ensure no loss of records is. 
He may suggest your method. However, I wonder about it efficacy due to the fact 
that this job is running while the CICS is up . I.e. the two steps may get 
different records because more records could be added after the first, 
non-delete, copy is run. No, we cannot take the region down. Not even at 02:30 
hours. This is a political decision, not a technical one. Hopefully nobody is 
doing anything at 02:30, but I wouldn't guarantee it. 

//CPYDFH5A  EXEC PGM=FILESAVE
//STEPLIB  DD DISP=SHR,DSN=SYS3.FILESAVE.PROD.LOADLIB
// DD DISP=SHR,DSN=SYS3.FILESAVE.V4R0.LOADLIB
// DD DISP=SHR,DSN=SYS3.ICEAM1.SICELINK  ALLOW DYNALLOC=OFF
//DFSPARM DD *
   OPTION  DYNALLOC=OFF,ODMAXBF=2M
//SYSPRINT DD  SYSOUT=*
//SYSUDUMP DD  SYSOUT=*
//ARCHIVE  DD DSN=LOGR.PCICS3.DFHJ05,
//SUBSYS=(LOGR,DFHLGCNV,'FROM=OLDEST,TO=YOUNGEST',DELETE)
//NEWJRNAL DD DSN=TSSPG.FILESAVE.ARCHIVE.PCICS3(+1),
//DISP=(NEW,CATLG,CATLG),LABEL=EXPDT=99000,  HW20050405
//UNIT=CAVTAPE,
//DATACLAS=DCVTPDR1, VTAPE DUPLEXING FOR ONSITE/OFFSITE
//VOL=(,,,35),
//RECFM=U,BLKSIZE=32760,LRECL=0,DSORG=PS
//SYSINDD  *
  NEWJOURNAL DDNAME(NEWJRNAL) ALL -
RECORD(YES)
  COPY FROMJOURNAL(ARCHIVE)
//*


> --
> John McKown
> Senior Systems Programmer
> UICI Insurance Center
> Information Technology
> 
> This message (including any attachments) contains confidential information 
> intended for a specific individual and purpose, and its content is protected 
> by law.  If you are not the intended recipient, you should delete this 
> message and are hereby notified that any disclosure, copying, or distribution 
> of this transmission, or taking any action based on it, is strictly 
> prohibited.
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [SMTP:[EMAIL PROTECTED] On Behalf Of 
> Matthew Stitt
> Sent: Tuesday, June 21, 2005 12:11 PM
> To:   IBM-MAIN@BAMA.UA.EDU
> Subject:  Re: LOGR for Dummies?
> 
> Your original message implied that you have LOGGER up and running,
> especially for CICS, already.
> 
> I would like to see if your JCL that is being used is specifying the DELETE
> parameter in the unload step.  That could be troublesome in your
> circumstance.  If it's not there, then re-run the unload step, giving a
> larger allocation to the output dataset.
> 
> Usually I run an unload step, followed by a step with the DELETE parameter.
> 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Best HOD server platform

2005-06-21 Thread Timothy Sipples
>How did it out grow your RS/6000?

Same reaction here.  As long as you're using the "Cached Client," HOD 
doesn't impose much workload on the Web (HTTP) server that's delivering 
it.  In principle you can support a vast enterprise on a pair (for 
redundancy) of relatively tiny HTTP servers.

If the RS/6000 is also handling the TN3270 encryption, then I might 
understand.

>Do you perform you TN3270 server function on the HOD server or are you 
using
>your mainframe as the TN3270 server?
>The HOD server just is there to download the client, or are you doing
>sometype of server side function on the HOD server also?
>>What is the recommended server platform for Host On Demand given that I
>>can't use the mainframe?

>From a cold, hard architectural point of view, here's my recommended 
choices in terms of platform selection:

1. z/OS (assuming your HOD clients are connecting back to that system)
2. Linux on zSeries
3. The most robust distributed platforms (redundant pair) you can find

As mentioned above, HTTP HOD workload with HOD's caching (the default) is 
quite small.  This is not MIPS-intensive workload.  Your users will expect 
the mainframe to be up, and if HOD is down the mainframe is down.  This is 
workload that properly belongs right on the mainframe.  Failing that, at 
least put it on a Linux LPAR or guest (pair) on the zSeries.

Same principles apply if you're connecting to iSeries as the host system.

You may wish to consider having "baseline" ("business-critical") HOD 
service from a host-based HTTP server and then augmenting that with 
distributed HTTP servers, but frankly that seems like a lot of work. :-)

>>We originally had it on RS/6000 but outgrew that.  It was "assimilated"
>>by the Windows people and HOD V7 is still running on a Windows 2000
>>server.  However, new PC's and Java have conflicts with HOD V7.  The MS
>>people "hate" any IBM product and say they can't make V9 work.  They
>>will only look for web support and won't call IBM support.
>>I may have get HOD dumped back on me, and would like to be quickly
>>successful.

Note that HOD 8.04 and above and 9.01 and above -- I think those versions 
are correct -- now allow you to specify specific workstation Java levels. 
There are many cases where users have multiple JVMs installed, and they're 
worried about supporting particular applications that have specific JVM 
requirements.  HOD isn't so fussy, but now you can set HOD to look for a 
specific level and use that.  It should eliminate that "Java version 
clash" concern.

Making HOD V9 work is, well, not hard.  So I won't make any comment about 
the "MS people." :-)

Now, about TN3270 encryption.  There is a TN3270 SSL encryption "engine" 
called the HOD Redirector that ships with HOD.  If you're using SSL/TLS 
encryption for your TN3270 traffic, this will work, but only for (circa) a 
couple hundred users per server.  It's a "light duty" TN3270 redirector. 
If you need something with more performance you have a couple choices:

1.  The architecturally elegant solution is to turn on 3270 encryption 
right on the host -- and to make sure you are taking maximum advantage of 
the encryption coprocessor hardware on whatever host system you've got. 
There will be some MIPS consumed here, but if at all possible it's the way 
to go.  It's also the most likely to pass security audit.  (Many 
organizations require end-to-end encryption.)

2.  Second best would be to run Communications Server for Linux on zSeries 
as your TN3270 redirector.  Encrypt on the "front side" (to the client) 
from there.  This is also going to pass security audit because the final 
hop to the z/OS side can be via Hipersocket, and that's secure.

3.  Third best would be to install a Cisco CIP that supports TN3270 
encryption or comparable router-type hardware device.

4.  Fourth best would be to run Communications Server for AIX, Linux X86, 
or Windows.  You're adding another point of failure, though, so be aware 
of that.  (Again, I don't like the idea of adding "mainframe down" 
possibilities.  Let the mainframe be the mainframe, basically.)

With all due respect to my Hummingbird colleague, I don't see how there's 
going to be any CPU advantage to any other solution.  HOD is cached 
(minimizing HTTP work -- and the HTTP can/should be unencrypted) and SSL 
is SSL (i.e. industry-standard computation) if you turn on 3270 
encryption.  That's all HOD does (in terms of server resources), and you 
can put both those units of work wherever you want (cross-platform), 
separately or together.

Finally, I rarely see any good reason to leave the HOD Service Manager 
(a.k.a. Configuration Manager) running.  That's because I see no good 
reason to use anything other than the "HTML Model" (in the HOD Deployment 
Wizard).  If you knock out the License Use Manager (LUM) from HOD and add 
the Additional Parameter DISABLE = LUM in the Deployment Wizard, then you 
can take down the HOD Service Manager completely.  I know I went t

Re: LOGR for Dummies?

2005-06-21 Thread Matthew Stitt
Your original message implied that you have LOGGER up and running,
especially for CICS, already.

I would like to see if your JCL that is being used is specifying the DELETE
parameter in the unload step.  That could be troublesome in your
circumstance.  If it's not there, then re-run the unload step, giving a
larger allocation to the output dataset.

Usually I run an unload step, followed by a step with the DELETE parameter.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Displaying Cache value for 3990-6

2005-06-21 Thread Carlos A Bodra
Hi,

What command can display cache size and Fast Write Status for a 3990-6 (or
similar) 
in OS/390 console:

Thanks

Carlos 
Sao Paulo - Brasil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z/OS future needs was Re: USS in a "legacy" world

2005-06-21 Thread Ed Finnell
 
In a message dated 6/21/2005 11:34:22 A.M. Central Standard Time,  
[EMAIL PROTECTED] writes:

Not  through this forum.



>>
Yeah, too much fertilizer!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SA PB in CICC App ...

2005-06-21 Thread Matthew Stitt
Most likely the messages you are triggering on don't exist anymore.  I
believe TCPIP has new messages indicating successful startup.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ICSF

2005-06-21 Thread Mark Zelden
On Tue, 21 Jun 2005 09:33:36 -0500, Ward, Mike S <[EMAIL PROTECTED]> wrote:

>On LPAR 1 CSF starts with domain 0. On LPAR 1 MQSeries will use the
>cards for SSL encryption of the channels. In LPAR 2 the domain is 1 and
>MQSeries in that LPAR will use the cards for SSL channel encryption. CSF
>starts on both LPARS using the same vsam datasets. CSF doesn't complain
>about it at start up on either LPAR. We haven't formally started using
>the crypto cards for MQ yet. MQ is currently using the z/os(RACF)
>software for channel encryption.  Since I am just starting this I want
>to ensure that I do it correctly. If what I'm reading below is correct
>you are suggesting that I use separate datasets.

Not really.  I just don't (didn't) know enough about your environment.
Sometimes LPARs in the same sysplex aren't really "related" at all and
then it might be desireable to have separate data sets and not share the
control domains.   This doesn't sound like the case in your environment
since you already set up shared control domains.  So even though you
will have separate MQs on separate LPARs using encryption, sharing
the CKDS/PKDS and what you have indicated below is fine.  The only
thing I do is make the usage domain numbers match the LPAR numbers
(although this is not a requirement). I can't tell if that is what you
are doing or not.

>I currently have the below defined:
>
>CONTROL   USAGE
>LPAR100,01 01
>LPAR200,01 00
>


Regards,

Mark
--
Mark Zelden
Sr. Software and Systems Architect
mailto: [EMAIL PROTECTED]
Systems Programming expert at http://Search390.com/ateExperts/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Apply change of Management Class to Migrated Data Sets

2005-06-21 Thread Frank Alequin
Hello Bob,

Thank you very much, This question came up because we had some  Datasets
in our site that were being migrated for eternity (NOLIMIT) and verify
some of these datasets we decided to change it so they would stay for a
month.

I made the change and nothing happened during PSM or SSM. I thought that
something would have happened because we had data sets more than three
years old. I peformed a listcat on one of the datasets and found out that
these datasets had and expiration date assigned by DB2. I kept on looking
for an explination and found out that if I don't have the parameter
EXPIREDATASETS(SCRATCH) that hsm will not expire these datasets and less
delete then.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z/OS future needs was Re: USS in a "legacy" world

2005-06-21 Thread Ted MacNEIL
...
> A very nice summary of some of the most glaring problems.
>
> But will anyone at IBM listen...
...

Not through this forum.

Try SHARE, or other accepted means of asking for changes.

-teD
(The secret to success is sincerity.
If you can fake that,
you've got it made!)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DFHSM...Can it be controlled via RACF?

2005-06-21 Thread Ted MacNEIL
...
Is there any way of crippling DFHSM to be assured that we only handling
certain datasets without updating an exit or updating management class
attributes?
...

Data processing usually consists of picking the correct wrench to drive in the 
right screw.

Use the tools supplied.
IMO, management classes are the way to go.

-teD
(The secret to success is sincerity.
If you can fake that,
you've got it made!)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DFHSM...Can it be controlled via RACF?

2005-06-21 Thread Walt Farrell

On 6/21/2005 10:01 AM, John Giltner wrote:

You might try giving DFHSM access of NONE to the files you do not want it to
migrate.



I would not expect that to work.  When operating on its own behalf, I 
believe that DFHSM gives itself sufficient authority to do anything it 
needs to do.


Walt Farrell, CISSP
z/OS Security Design, IBM

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Name/Token Services in COBOL?

2005-06-21 Thread Walt Farrell

On 6/21/2005 7:39 AM, Peter Relson wrote:

I was surprised that no one mentioned that interface definition file
IEANTCOB is provided precisely for the purpose of allowing a COBOL program
to call the name/token services.


It would probably help if IEANTCOB (and the other samples) were 
mentioned in the documentation, rather than simply existing in 
SYS1.SAMPLIB where they might (or more likely, might not) be noticed.


Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Apply change of Management Class to Migrated Data Sets

2005-06-21 Thread Frank Alequin
Hello Lucy,

I was just wondering if changes to a management class apply to already
migrated datasets. I know that I could chage the management class but what
happens if that dataset is already migrated and you apply any king of
changes to that management class?

Take care

Frank

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Washington Post: 40 Million Credit Card #s Hacked

2005-06-21 Thread Bill Fairchild
Op-ed piece from today's New York Times titled "The Data Fleecing of  
America":  _http://www.nytimes.com/2005/06/21/opinion/21tue3.html_ 
(http://www.nytimes.com/2005/06/21/opinion/21tue3.html) 
 
Negligent CEO apologizes thus:  "We should not have been doing  that."
 
Now something will happen at last.  The New York Times is  concerned.  :-)
 
Bill Fairchild

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Supported interface to set/retrieve TCBUSER field NON-authorized?

2005-06-21 Thread Edward E. Jaffe

Farley, Peter x23353 wrote:


Agreed, Bill.  An anchor for persistent data is the application, and
name/token services is the "right" answer.  For very small amounts of data,
though, it just seems like overkill.
 



Name/token works for both large and small amounts of data. For large 
amounts of data, the token is a pointer and maybe some flags. For small 
amounts of data, the token itself *is* the data (up to 16 bytes).


--
.-.
| Edward E. Jaffe||
| Mgr, Research & Development| [EMAIL PROTECTED]|
| Phoenix Software International | Tel: (310) 338-0400 x318   |
| 5200 W Century Blvd, Suite 800 | Fax: (310) 338-0801|
| Los Angeles, CA 90045  | http://www.phoenixsoftware.com |
'-'

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread Kevin Cogley
John,

  If you are a member of SHARE there are many great past and present
presentations on the MVS Logger and CICS.  Jim Grauel and Ed Addison have
been presenting on this topic since the late 1990's  

   They have Logger 101, performance and tuning, common problems and so on.

   These are a great place to start. 

Kevin



-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of McKown, John
Sent: Tuesday, June 21, 2005 7:57 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: LOGR for Dummies?

As all are likely aware, CICS no longer uses its own journals. Instead it
use the z/OS system logger. I know zippo about this function. I have tried
reading the books. But, as far as my comprehension is concerned, they may
have well been translated from Sanskrit to British English by an Australian
sheep farmer from the outback or a Texan . (No offense meant to any
Australians. Since I'm from Texas, well ...)

Is there a simple overview of all of this stuff? The main reason that I ask
is because we use CA-FileSave to process the CICS journals for forward
recovery. Due to lack of a VOL parameter along with heavy CICS activity
yesterday, our job abended with a S837-08 after filling up 5 tape volumes. I
read what I could and simply restarted the job "from the top", hoping that
all was well.

Thanks for any pointers.

> --
> John McKown
> Senior Systems Programmer
> UICI Insurance Center
> Information Technology
> 
> This message (including any attachments) contains confidential information
intended for a specific individual and purpose, and its content is protected
by law.  If you are not the intended recipient, you should delete this
message and are hereby notified that any disclosure, copying, or
distribution of this transmission, or taking any action based on it, is
strictly prohibited.
> 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z/OS future needs was Re: USS in a "legacy" world

2005-06-21 Thread Ed Gould

On Jun 21, 2005, at 7:39 AM, Joe Zitzelberger wrote:


SNIP-



A very nice summary of some of the most glaring problems.

But will anyone at IBM listen...



Joe (or anyone):

Would you like to add to the list?

Ed

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Supported interface to set/retrieve TCBUSER field NON-authorized?

2005-06-21 Thread Shmuel Metz (Seymour J.)
In <[EMAIL PROTECTED]>,
on 06/20/2005
   at 05:33 PM, "Farley, Peter x23353" <[EMAIL PROTECTED]> said:

>The subject says it all, I am trying to find out if there is a
>supported+documented interface to set and retrieve the TCBUSER word
>from a NON-authorized program WITHOUT writing any authorized code.

You can read it with an L instruction. If you find a way for an
unauthorized program to set it, please report it as an integrity
violation.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see  
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ICSF

2005-06-21 Thread Ward, Mike S
On LPAR 1 CSF starts with domain 0. On LPAR 1 MQSeries will use the
cards for SSL encryption of the channels. In LPAR 2 the domain is 1 and
MQSeries in that LPAR will use the cards for SSL channel encryption. CSF
starts on both LPARS using the same vsam datasets. CSF doesn't complain
about it at start up on either LPAR. We haven't formally started using
the crypto cards for MQ yet. MQ is currently using the z/os(RACF)
software for channel encryption.  Since I am just starting this I want
to ensure that I do it correctly. If what I'm reading below is correct
you are suggesting that I use separate datasets. I currently have the
below defined:

CONTROL   USAGE
LPAR100,01 01
LPAR200,01 00



-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Mark Zelden
Sent: Tuesday, June 21, 2005 8:57 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: ICSF

On Tue, 21 Jun 2005 07:40:24 -0500, Ward, Mike S <[EMAIL PROTECTED]>
wrote:

>I searched the archives and found an ICSF thread there but it didn't 
>have what I was looking for. I have 2 LPARS on the same processor in a 
>sysplex. I can start ICSF from either LPAR. My question is should they 
>be sharing the same vsam datasets pks cks or should each LPAR have it's

>own set? The domains are 0 and 1.
>

Is there an application on each LPAR that shares the encrypted data? Or
does each LPAR "do its own thing"?  If #1, set up each LPAR with its own
usage domain but you can share the CKDS and PKDS and set the control
domains for both LPARs on both LPARs.  If #2, then set up separate CKDS
and PKDS, separate usage domains and don't share control domains.

Cheers,

Mark
--
Mark Zelden
Sr. Software and Systems Architect
mailto: [EMAIL PROTECTED]
Systems Programming expert at http://Search390.com/ateExperts/ Mark's
MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions, send
email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search
the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread Vernooy, C.P. - SPLXM
Ok, in that case I can still recommend: 
SA22-7625-xx  z/OS Vxxx MVS Setting Up a Sysplex

Kees.


"McKown, John" <[EMAIL PROTECTED]> wrote in message
news:<[EMAIL PROTECTED]>...
> I guess that I wasn't clear in my original message. I do have all the
logstreams set up and everything is running OK for the most part. But I did
everything in "cookbook" style without understanding why I did what I did.
One of my many problems is that I usually want to know "why" I'm supposed to
do things. One can never become a true chef if one can only cook from a
cookbook. Likewise with a sysprog. I know a fair amout of stuff (lots of
which is now outdated junk, like doing a esoteric-only gen in MVT), but I'm
"falling behind" in the newer stuff. Partially my fault, partially the fault
of where I work ("legacy"=="garbage", so why invest in it?)
> 
> > --
> > John McKown
> > Senior Systems Programmer
> > UICI Insurance Center
> > Information Technology
> > 
> > This message (including any attachments) contains confidential
information intended for a specific individual and purpose, and its content
is protected by law.  If you are not the intended recipient, you should
delete this message and are hereby notified that any disclosure, copying, or
distribution of this transmission, or taking any action based on it, is
strictly prohibited.
> > 
> > 
> > -Original Message-
> > From:   IBM Mainframe Discussion List [SMTP:[EMAIL PROTECTED] On
Behalf Of Vernooy, C.P. - SPLXM
> > Sent:   Tuesday, June 21, 2005 8:44 AM
> > To: IBM-MAIN@BAMA.UA.EDU
> > Subject:Re: LOGR for Dummies?
> > 
> > You have to set up the Logger subsystem, if not already done in your
> > system(s).
> > 
> > THE bible is: SA22-7625-xx  z/OS Vxxx MVS Setting Up a Sysplex
> > See: Chapter 9. Planning for System Logger Applications
> > 
> > You must decide if your CICS logs (and therefor the Logstreams) must be
> > shared by more than one system in a sysplex.
> > 
> > Then you can turn to the System Logger Redbook.
> > http://www.redbooks.ibm.com/redbooks/pdfs/sg246898.pdf
> > See: Chapter 5: CICS and System Logger
> > 
> > Good luck,
> > 
> > Kees.
> > 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
> 
> 


**
For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), 
its subsidiaries and/or its employees shall not be liable for the incorrect or 
incomplete transmission of this e-mail or any attachments, nor responsible for 
any delay in receipt.
**

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread Greg Shirey
John,

If it's understanding how CICS uses the logger that you're mostly interested
in, read anything you can find by Jim Grauel, like this:
http://www-03.ibm.com/support/techdocs/atsmastr.nsf/PubAllNum/PRS183

And of course, search the archives of CICS-L.  (But you already knew that) 

HTH,
Greg Shirey
Ben E. Keith Company

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED]
Behalf Of McKown, John
Sent: Tuesday, June 21, 2005 7:57 AM


As all are likely aware, CICS no longer uses its own journals. Instead it
use the z/OS system logger. I know zippo about this function. I have tried
reading the books. But, as far as my comprehension is concerned, they may
have well been translated from Sanskrit to British English by an Australian
sheep farmer from the outback or a Texan . (No offense meant to any
Australians. Since I'm from Texas, well ...)

Is there a simple overview of all of this stuff? The main reason that I ask
is because we use CA-FileSave to process the CICS journals for forward
recovery. Due to lack of a VOL parameter along with heavy CICS activity
yesterday, our job abended with a S837-08 after filling up 5 tape volumes. I
read what I could and simply restarted the job "from the top", hoping that
all was well.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread McKown, John
Yes, and I did download it. So, I guess I'll fire up Acrobat Reader and start. 
 Here I thought being at home would let me escape the naggers .

BTW - I am the main sysprog here. It is just that our CICS person decided to 
"take advantage" of an opening in the applications area. He was "bored" with 
being a CICS sysprog any more. So I got that added to my list as well. And I 
don't like CICS. Never have. First encountered in with CICS/VS 1.2 on OS/VS1. 
It's gotten much better, but I still don't like it. Perhaps because perfectly 
compentent batch COBOL people cannot program CICS for beans (and not Java 
Beans, either!). They don't have the mind set and they aren't given the 
training (around here). OLTP is significanlty different from batch. Just try to 
convince management of that.

> --
> John McKown
> Senior Systems Programmer
> UICI Insurance Center
> Information Technology
> 
> This message (including any attachments) contains confidential information 
> intended for a specific individual and purpose, and its content is protected 
> by law.  If you are not the intended recipient, you should delete this 
> message and are hereby notified that any disclosure, copying, or distribution 
> of this transmission, or taking any action based on it, is strictly 
> prohibited.
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [SMTP:[EMAIL PROTECTED] On Behalf Of 
> Vernooy, C.P. - SPLXM
> Sent: Tuesday, June 21, 2005 8:56 AM
> To:   IBM-MAIN@BAMA.UA.EDU
> Subject:  Re: LOGR for Dummies?
> 
> I don't intend to take away any excuse to escape to work tomorrow, but can't
> you access the manuals at the IBM site from your home?
> 
> Kees.
> 
> 
> 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DFHSM...Can it be controlled via RACF?

2005-06-21 Thread John Giltner
You might try giving DFHSM access of NONE to the files you do not want it to
migrate.

However, IMHO, this would be as much work as updating/maintaining management
classes.

Why do you not want to use management classes?

On Tue, 21 Jun 2005 08:26:43 -0500, Daniel Moshief <[EMAIL PROTECTED]> wrote:

>We are interested in testing our migration and recall DFSMS exits and wish
>for a "bullet proof" way to make sure that we are only migrating specific
>datasets.  Yes, we can alter the management classes to not migrate dataset
>other than the ones we want.  But we are seeking some way in which RACF
>would fail a migration because DFHSM is unable to catalog/uncatalog
>datasets that this DFHSM is not supposed to handle.
>We tried giving our DFHSM address space the attributes of a USERID that
>only had update access to one specific usercatalog, but that did not work.
>DFHSM was able to migrate datasets that the address space only had read
>access to that user catalog.
>Is there any way of crippling DFHSM to be assured that we only handling
>certain datasets without updating an exit or updating management class
>attributes?
>
>thanks,
>
>Dan Moshief
>EMC Corp.
>
>--
>For IBM-MAIN subscribe / signoff / archive access instructions,
>send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
>Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Name/Token Services in COBOL?

2005-06-21 Thread Steve Comstock

Peter Relson wrote:

I was surprised that no one mentioned that interface definition file
IEANTCOB is provided precisely for the purpose of allowing a COBOL program
to call the name/token services.

Peter Relson
z/OS Core Technology Design



Why would you be surprised no one mentioned it? I've been
following COBOL pretty closely for 30+ years and I've never
heard of it. How many other nuggets are out there that have
never been exposed to the light of day? How would one have
ever heard of this?

Kind regards,

-Steve Comstock

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ICSF

2005-06-21 Thread Mark Zelden
On Tue, 21 Jun 2005 07:40:24 -0500, Ward, Mike S <[EMAIL PROTECTED]> wrote:

>I searched the archives and found an ICSF thread there but it didn't
>have what I was looking for. I have 2 LPARS on the same processor in a
>sysplex. I can start ICSF from either LPAR. My question is should they
>be sharing the same vsam datasets pks cks or should each LPAR have it's
>own set? The domains are 0 and 1.
>

Is there an application on each LPAR that shares the encrypted data? Or
does each LPAR "do its own thing"?  If #1, set up each LPAR with its own
usage domain but you can share the CKDS and PKDS and set the control
domains for both LPARs on both LPARs.  If #2, then set up separate
CKDS and PKDS, separate usage domains and don't share control domains.

Cheers,

Mark
--
Mark Zelden
Sr. Software and Systems Architect
mailto: [EMAIL PROTECTED]
Systems Programming expert at http://Search390.com/ateExperts/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread Lester, Bob
Hi John,

  I've used "Performance Considerations and Measurements for CICS and 
System Logger" Redpaper.  It was written by Jim Grauel and Frank Kyne in 2003.  
www.ibm.com/redbooks  Good tuning info

<*BobL*>

|   -Original Message-
|   From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED]
|   Behalf Of McKown, John
|   Sent: Tuesday, June 21, 2005 7:48 AM
|   To: IBM-MAIN@BAMA.UA.EDU
|   Subject: Re: LOGR for Dummies?
|   
|   
|   I guess that I wasn't clear in my original message. I do 
|   have all the logstreams set up and everything is running OK 
|   for the most part. But I did everything in "cookbook" style 
|   without understanding why I did what I did. One of my many 
|   problems is that I usually want to know "why" I'm supposed 
|   to do things. One can never become a true chef if one can 
|   only cook from a cookbook. Likewise with a sysprog. I know 
|   a fair amout of stuff (lots of which is now outdated junk, 
|   like doing a esoteric-only gen in MVT), but I'm "falling 
|   behind" in the newer stuff. Partially my fault, partially 
|   the fault of where I work ("legacy"=="garbage", so why 
|   invest in it?)
|   
|   > --
|   > John McKown
|   > Senior Systems Programmer
|   > UICI Insurance Center
|   > Information Technology
|   > 
|   > This message (including any attachments) contains 
|   confidential information intended for a specific individual 
|   and purpose, and its content is protected by law.  If you 
|   are not the intended recipient, you should delete this 
|   message and are hereby notified that any disclosure, 
|   copying, or distribution of this transmission, or taking 
|   any action based on it, is strictly prohibited.
|   > 
|   > 
|   > -Original Message-
|   > From: IBM Mainframe Discussion List 
|   [SMTP:[EMAIL PROTECTED] On Behalf Of Vernooy, C.P. - SPLXM
|   > Sent: Tuesday, June 21, 2005 8:44 AM
|   > To:   IBM-MAIN@BAMA.UA.EDU
|   > Subject:  Re: LOGR for Dummies?
|   > 
|   > You have to set up the Logger subsystem, if not already 
|   done in your
|   > system(s).
|   > 
|   > THE bible is: SA22-7625-xx  z/OS Vxxx MVS Setting Up a Sysplex
|   > See: Chapter 9. Planning for System Logger Applications
|   > 
|   > You must decide if your CICS logs (and therefor the 
|   Logstreams) must be
|   > shared by more than one system in a sysplex.
|   > 
|   > Then you can turn to the System Logger Redbook.
|   > http://www.redbooks.ibm.com/redbooks/pdfs/sg246898.pdf
|   > See: Chapter 5: CICS and System Logger
|   > 
|   > Good luck,
|   > 
|   > Kees.
|   > 
|   
|   
|   --
|   For IBM-MAIN subscribe / signoff / archive access instructions,
|   send email to [EMAIL PROTECTED] with the message: GET 
|   IBM-MAIN INFO
|   Search the archives at http://bama.ua.edu/archives/ibm-main.html
|   
|   

--
This e-mail transmission may contain information that is proprietary, 
privileged and/or confidential and is intended exclusively for the person(s) to 
whom it is addressed. Any use, copying, retention or disclosure by any person 
other than the intended recipient or the intended recipient's designees is 
strictly prohibited. If you are not the intended recipient or their designee, 
please notify the sender immediately by return e-mail and delete all copies. 
OppenheimerFunds may, at its sole discretion, monitor, review, retain and/or 
disclose the content of all email communications.
==

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread Vernooy, C.P. - SPLXM
I don't intend to take away any excuse to escape to work tomorrow, but can't
you access the manuals at the IBM site from your home?

Kees.


"McKown, John" <[EMAIL PROTECTED]> wrote in message
news:<[EMAIL PROTECTED]>...
> Thanks - I'll pick them up tomorrow at work. I'm working from home today
due to some work on my house. That is definately one plus of all this
Internet stuff. Working from home on an ADSL link sure beats that 300 baud
acoustic modem that I had. OOPS, there I go back into nostolgia .
> 
> > --
> > John McKown
> > Senior Systems Programmer
> > UICI Insurance Center
> > Information Technology
> > 
> > This message (including any attachments) contains confidential
information intended for a specific individual and purpose, and its content
is protected by law.  If you are not the intended recipient, you should
delete this message and are hereby notified that any disclosure, copying, or
distribution of this transmission, or taking any action based on it, is
strictly prohibited.
> > 
> > 
> > -Original Message-
> > From:   IBM Mainframe Discussion List [SMTP:[EMAIL PROTECTED] On
Behalf Of Don Deese
> > Sent:   Tuesday, June 21, 2005 8:22 AM
> > To: IBM-MAIN@BAMA.UA.EDU
> > Subject:Re: LOGR for Dummies?
> > 
> > John,
> > 
> > Try the System Programmer's Guide to z/OS System Logger Redbook 
> > (SG24-6898).  The "Introduction to System Logger" and "System Logger 
> > fundamentals" should give you what you want.
> > 
> > Regards,
> > 
> > Don
> > 
> > **
> > Don Deese, Computer Management Sciences, Inc.
> > Voice: (703) 922-7027  Fax: (703) 922-7305
> > http://www.cpexpert.org
> > **
> > 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
> 
> 


**
For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), 
its subsidiaries and/or its employees shall not be liable for the incorrect or 
incomplete transmission of this e-mail or any attachments, nor responsible for 
any delay in receipt.
**

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread Gray, Larry - Larry A
For this discussion, it might be best on CICS-L, especially if you are
looking at using the CA product for you logstream management.  There is
a lot of knowledge over there concerning logstream management.  Are you
using the SUBSYS=LOGR parm?  You might be able to reduce the amount of
info you are accessing by reducing how much is returned.  Are you just
processing forward recovery logs?  If so, you might be able to reduce
the RETPD of the logs to reduce the amount of data.  

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of McKown, John
Sent: Tuesday, June 21, 2005 9:48 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: LOGR for Dummies?


I guess that I wasn't clear in my original message. I do have all the
logstreams set up and everything is running OK for the most part. But I
did everything in "cookbook" style without understanding why I did what
I did. One of my many problems is that I usually want to know "why" I'm
supposed to do things. One can never become a true chef if one can only
cook from a cookbook. Likewise with a sysprog. I know a fair amout of
stuff (lots of which is now outdated junk, like doing a esoteric-only
gen in MVT), but I'm "falling behind" in the newer stuff. Partially my
fault, partially the fault of where I work ("legacy"=="garbage", so why
invest in it?)

>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread Vernooy, C.P. - SPLXM
Richard,

I don't think this is what Richard is looking for: it will keep him as big a
dummy as he was before he asked the question. Besides his system programmer
does not like him to blindly submit this JCL into the system, without
knowing what it takes to create coupledatasets, update COUPLExx members,
define Logstreams etc. etc. without any knowlegde of the sysplex(es) and its
configuration(s).

Kees.

"Richard Pinion" <[EMAIL PROTECTED]> wrote in message
news:<[EMAIL PROTECTED]>...
> 1)  //STEP1EXEC PGM=IXCL1DSU   
>//ACCIGN   DD   DUMMY  
>//SYSPRINT DD   SYSOUT=*   
>   //SYSINDD   *  
>DEFINEDS SYSPLEX(BAPTPLEX)  
> DSN(SYS1.LOGRETB1.CDS01)VOLSER(BH21D1) 
> CATALOG
> DATA TYPE(LOGR)
>  ITEM NAME(LSR)  NUMBER(100)   
>  ITEM NAME(LSTRR)NUMBER(100)   
>  ITEM NAME(DSEXTENT) NUMBER(40)
>DEFINEDS SYSPLEX(BAPTPLEX)  
> DSN(SYS1.LOGRETB1.CDS02)VOLSER(BH21D2) 
> CATALOG
> DATA TYPE(LOGR)
>  ITEM NAME(LSR)  NUMBER(100)   
>  ITEM NAME(LSTRR)NUMBER(100)   
>  ITEM NAME(DSEXTENT) NUMBER(40)  
> 


**
For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), 
its subsidiaries and/or its employees shall not be liable for the incorrect or 
incomplete transmission of this e-mail or any attachments, nor responsible for 
any delay in receipt.
**

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread McKown, John
I guess that I wasn't clear in my original message. I do have all the 
logstreams set up and everything is running OK for the most part. But I did 
everything in "cookbook" style without understanding why I did what I did. One 
of my many problems is that I usually want to know "why" I'm supposed to do 
things. One can never become a true chef if one can only cook from a cookbook. 
Likewise with a sysprog. I know a fair amout of stuff (lots of which is now 
outdated junk, like doing a esoteric-only gen in MVT), but I'm "falling behind" 
in the newer stuff. Partially my fault, partially the fault of where I work 
("legacy"=="garbage", so why invest in it?)

> --
> John McKown
> Senior Systems Programmer
> UICI Insurance Center
> Information Technology
> 
> This message (including any attachments) contains confidential information 
> intended for a specific individual and purpose, and its content is protected 
> by law.  If you are not the intended recipient, you should delete this 
> message and are hereby notified that any disclosure, copying, or distribution 
> of this transmission, or taking any action based on it, is strictly 
> prohibited.
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [SMTP:[EMAIL PROTECTED] On Behalf Of 
> Vernooy, C.P. - SPLXM
> Sent: Tuesday, June 21, 2005 8:44 AM
> To:   IBM-MAIN@BAMA.UA.EDU
> Subject:  Re: LOGR for Dummies?
> 
> You have to set up the Logger subsystem, if not already done in your
> system(s).
> 
> THE bible is: SA22-7625-xx  z/OS Vxxx MVS Setting Up a Sysplex
> See: Chapter 9. Planning for System Logger Applications
> 
> You must decide if your CICS logs (and therefor the Logstreams) must be
> shared by more than one system in a sysplex.
> 
> Then you can turn to the System Logger Redbook.
> http://www.redbooks.ibm.com/redbooks/pdfs/sg246898.pdf
> See: Chapter 5: CICS and System Logger
> 
> Good luck,
> 
> Kees.
> 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread Vernooy, C.P. - SPLXM
You have to set up the Logger subsystem, if not already done in your
system(s).

THE bible is: SA22-7625-xx  z/OS Vxxx MVS Setting Up a Sysplex
See: Chapter 9. Planning for System Logger Applications

You must decide if your CICS logs (and therefor the Logstreams) must be
shared by more than one system in a sysplex.

Then you can turn to the System Logger Redbook.
http://www.redbooks.ibm.com/redbooks/pdfs/sg246898.pdf
See: Chapter 5: CICS and System Logger

Good luck,

Kees.



"McKown, John" <[EMAIL PROTECTED]> wrote in message
news:<[EMAIL PROTECTED]>...
> As all are likely aware, CICS no longer uses its own journals. Instead it
use the z/OS system logger. I know zippo about this function. I have tried
reading the books. But, as far as my comprehension is concerned, they may
have well been translated from Sanskrit to British English by an Australian
sheep farmer from the outback or a Texan . (No offense meant to any
Australians. Since I'm from Texas, well ...)
> 
> Is there a simple overview of all of this stuff? The main reason that I
ask is because we use CA-FileSave to process the CICS journals for forward
recovery. Due to lack of a VOL parameter along with heavy CICS activity
yesterday, our job abended with a S837-08 after filling up 5 tape volumes. I
read what I could and simply restarted the job "from the top", hoping that
all was well.
> 
> Thanks for any pointers.
> 
> > --
> > John McKown
> > Senior Systems Programmer
> > UICI Insurance Center
> > Information Technology
> > 
> > This message (including any attachments) contains confidential
information intended for a specific individual and purpose, and its content
is protected by law.  If you are not the intended recipient, you should
delete this message and are hereby notified that any disclosure, copying, or
distribution of this transmission, or taking any action based on it, is
strictly prohibited.
> > 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
> 
> 


**
For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), 
its subsidiaries and/or its employees shall not be liable for the incorrect or 
incomplete transmission of this e-mail or any attachments, nor responsible for 
any delay in receipt.
**

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


DFHSM...Can it be controlled via RACF?

2005-06-21 Thread Daniel Moshief
We are interested in testing our migration and recall DFSMS exits and wish
for a "bullet proof" way to make sure that we are only migrating specific
datasets.  Yes, we can alter the management classes to not migrate dataset
other than the ones we want.  But we are seeking some way in which RACF
would fail a migration because DFHSM is unable to catalog/uncatalog
datasets that this DFHSM is not supposed to handle.
We tried giving our DFHSM address space the attributes of a USERID that
only had update access to one specific usercatalog, but that did not work.
DFHSM was able to migrate datasets that the address space only had read
access to that user catalog.
Is there any way of crippling DFHSM to be assured that we only handling
certain datasets without updating an exit or updating management class
attributes?

thanks,

Dan Moshief
EMC Corp.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread McKown, John
Thanks - I'll pick them up tomorrow at work. I'm working from home today due to 
some work on my house. That is definately one plus of all this Internet stuff. 
Working from home on an ADSL link sure beats that 300 baud acoustic modem that 
I had. OOPS, there I go back into nostolgia .

> --
> John McKown
> Senior Systems Programmer
> UICI Insurance Center
> Information Technology
> 
> This message (including any attachments) contains confidential information 
> intended for a specific individual and purpose, and its content is protected 
> by law.  If you are not the intended recipient, you should delete this 
> message and are hereby notified that any disclosure, copying, or distribution 
> of this transmission, or taking any action based on it, is strictly 
> prohibited.
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [SMTP:[EMAIL PROTECTED] On Behalf Of Don 
> Deese
> Sent: Tuesday, June 21, 2005 8:22 AM
> To:   IBM-MAIN@BAMA.UA.EDU
> Subject:  Re: LOGR for Dummies?
> 
> John,
> 
> Try the System Programmer's Guide to z/OS System Logger Redbook 
> (SG24-6898).  The "Introduction to System Logger" and "System Logger 
> fundamentals" should give you what you want.
> 
> Regards,
> 
> Don
> 
> **
> Don Deese, Computer Management Sciences, Inc.
> Voice: (703) 922-7027  Fax: (703) 922-7305
> http://www.cpexpert.org
> **
> 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread Don Deese

John,

Try the System Programmer's Guide to z/OS System Logger Redbook 
(SG24-6898).  The "Introduction to System Logger" and "System Logger 
fundamentals" should give you what you want.


Regards,

Don

**
Don Deese, Computer Management Sciences, Inc.
Voice: (703) 922-7027  Fax: (703) 922-7305
http://www.cpexpert.org
**




At 08:57 AM 6/21/2005, you wrote:
As all are likely aware, CICS no longer uses its own journals. Instead it 
use the z/OS system logger. I know zippo about this function. I have tried 
reading the books. But, as far as my comprehension is concerned, they may 
have well been translated from Sanskrit to British English by an 
Australian sheep farmer from the outback or a Texan . (No offense 
meant to any Australians. Since I'm from Texas, well ...)


Is there a simple overview of all of this stuff? The main reason that I 
ask is because we use CA-FileSave to process the CICS journals for forward 
recovery. Due to lack of a VOL parameter along with heavy CICS activity 
yesterday, our job abended with a S837-08 after filling up 5 tape volumes. 
I read what I could and simply restarted the job "from the top", hoping 
that all was well.


Thanks for any pointers.

> --
> John McKown
> Senior Systems Programmer
> UICI Insurance Center
> Information Technology




--
No virus found in this outgoing message.
Checked by AVG Anti-Virus.
Version: 7.0.323 / Virus Database: 267.7.9/23 - Release Date: 6/20/2005

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: LOGR for Dummies?

2005-06-21 Thread Richard Pinion
1)  //STEP1EXEC PGM=IXCL1DSU   
   //ACCIGN   DD   DUMMY  
   //SYSPRINT DD   SYSOUT=*   
  //SYSINDD   *  
   DEFINEDS SYSPLEX(BAPTPLEX)  
DSN(SYS1.LOGRETB1.CDS01)VOLSER(BH21D1) 
CATALOG
DATA TYPE(LOGR)
 ITEM NAME(LSR)  NUMBER(100)   
 ITEM NAME(LSTRR)NUMBER(100)   
 ITEM NAME(DSEXTENT) NUMBER(40)
   DEFINEDS SYSPLEX(BAPTPLEX)  
DSN(SYS1.LOGRETB1.CDS02)VOLSER(BH21D2) 
CATALOG
DATA TYPE(LOGR)
 ITEM NAME(LSR)  NUMBER(100)   
 ITEM NAME(LSTRR)NUMBER(100)   
 ITEM NAME(DSEXTENT) NUMBER(40)  


2) ISREDDE2   SYS1.PARMLIB(COUPLE00) - 01.02  
Command ===> 
08  .  
09  .
20 DATA TYPE(LOGR) 
21  PCOUPLE(SYS1.LOGRETB1.CDS01) 
22  ACOUPLE(SYS1.LOGRETB1.CDS02)   

3) //DFHILG5  EXEC PGM=IXCMIAPU   
//SYSPRINT DD SYSOUT=* 
//SYSINDD *
  DATA TYPE(LOGR) REPORT(YES)  
   
  /* CICS log of logs*/
/* HBOP   */ 
   
  DELETE LOGSTREAM NAME(CICSUSER.HBOPCICS.DFHLGLOG)
  DEFINE LOGSTREAM NAME(CICSUSER.HBOPCICS.DFHLGLOG)
 RETPD(2)  
 AUTODELETE(YES)   
 LS_SIZE(01000)
 STG_SIZE(4000)
 MODEL(NO) 
 LS_DATACLAS(SHARE33)  
 HLQ(SYSTEMS)  
 DASDONLY(YES) 
 MAXBUFSIZE(64000) 
  /* CICS log*/
DELETE LOGSTREAM NAME(CICSUSER.HBOPCICS.DFHSHUNT)   
DEFINE LOGSTREAM NAME(CICSUSER.HBOPCICS.DFHSHUNT)   
   RETPD(2) 
   AUTODELETE(YES)  
   LS_SIZE(6)   
   STG_SIZE(4000)   
   MODEL(NO)
   LS_DATACLAS(SHARE33) 
   HLQ(SYSTEMS) 
   DASDONLY(YES)
   MAXBUFSIZE(64000)
/* Primary user log*/   
DELETE LOGSTREAM NAME(CICSUSER.HBOPCICS.DFHJ01) 
DEFINE LOGSTREAM NAME(CICSUSER.HBOPCICS.DFHJ01) 
   RETPD(2) 
   AUTODELETE(YES)  
   LS_DATACLAS(SHARE33) 
   LS_SIZE(4)   
   STG_SIZE(4000)   
   HLQ(SYSTEMS) 
   MODEL(NO)
   DASDONLY(YES)
MAXBUFSIZE(64000)   

 /* Secondary user log*/
 DELETE LOGSTREAM NAME(CICSUSER.HBOPCICS.DFHJ02)
 DEFINE LOGSTREAM NAME(CICSUSER.HBOPCICS.DFHJ02)
RETPD(2)
AUTODELETE(YES) 
LS_DATACLAS(SHARE33)
LS_SIZE(4)  
STG_SIZE(4000)  
HLQ(SYSTEMS)
MODEL(NO)   
DASDONLY(YES)   
MAXBUFSIZE(64000)   
.
. same for DFHJ03-DFHJ05

   
 /* CICS log*/ 
 DELETE LOGSTREAM NAME(CICSUSER.HBOPCICS.DFHLOG)   
 DEFINE LOGSTREAM NAME(CICSU

LOGR for Dummies?

2005-06-21 Thread McKown, John
As all are likely aware, CICS no longer uses its own journals. Instead it use 
the z/OS system logger. I know zippo about this function. I have tried reading 
the books. But, as far as my comprehension is concerned, they may have well 
been translated from Sanskrit to British English by an Australian sheep farmer 
from the outback or a Texan . (No offense meant to any Australians. Since 
I'm from Texas, well ...)

Is there a simple overview of all of this stuff? The main reason that I ask is 
because we use CA-FileSave to process the CICS journals for forward recovery. 
Due to lack of a VOL parameter along with heavy CICS activity yesterday, our 
job abended with a S837-08 after filling up 5 tape volumes. I read what I could 
and simply restarted the job "from the top", hoping that all was well.

Thanks for any pointers.

> --
> John McKown
> Senior Systems Programmer
> UICI Insurance Center
> Information Technology
> 
> This message (including any attachments) contains confidential information 
> intended for a specific individual and purpose, and its content is protected 
> by law.  If you are not the intended recipient, you should delete this 
> message and are hereby notified that any disclosure, copying, or distribution 
> of this transmission, or taking any action based on it, is strictly 
> prohibited.
> 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Supported interface to set/retrieve TCBUSER field NON-authorized?

2005-06-21 Thread Bill Fairchild
 
In a message dated 6/21/2005 7:23:18 A.M. Central Daylight Time,  
[EMAIL PROTECTED] writes:

An  anchor for persistent data is the application, and
name/token services is  the "right" answer.  For very small amounts of data,
though, it just  seems like overkill.




This reminds me of what someone else said recently (Craddock, Black?) about  
it's being worth it to pay the overhead to set up a complex structure if it is 
 to be used for a long time by a large number of users vs. quick and dirty.   
Tradeoffs everywhere.  But in this case the quick and dirty requires  
authorization, which is probably not allowed.  Perhaps the overkill can be  
leveraged/amortized by expanding the persistent data once the facility is  
working and 
more uses can be found for it.
 
Bill Fairchild

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


ICSF

2005-06-21 Thread Ward, Mike S
I searched the archives and found an ICSF thread there but it didn't
have what I was looking for. I have 2 LPARS on the same processor in a
sysplex. I can start ICSF from either LPAR. My question is should they
be sharing the same vsam datasets pks cks or should each LPAR have it's
own set? The domains are 0 and 1.

Mike S. Ward Jr.
A.V.P. Information Technology
Security Service Federal Credit Union
(210)476-4600
[EMAIL PROTECTED] 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z/OS future needs was Re: USS in a "legacy" world

2005-06-21 Thread Joe Zitzelberger

On Jun 20, 2005, at 8:31 PM, Clark Morris wrote:

1.  There must be a path from EBCDIC to either Unicode or the full ISO
2.  Given that 54 gigabytes is a relatively small disk drive in the
3.  The limitation to eight characters for names and passwords (44
4.  A clearer direct batch submission language than JCL is needed.  I
5.  A graphic interface and support for one or more application
6.  Record size limitations are going to have to change.  I know that


A very nice summary of some of the most glaring problems.

But will anyone at IBM listen...

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Supported interface to set/retrieve TCBUSER field NON-authorized?

2005-06-21 Thread Farley, Peter x23353
As I said earlier, name/token services is the "right" answer to the "right"
question.  I had only hoped there was a less complex method for small
amounts of data.

Peter

-Original Message-
From: Leonard Woren [mailto:[EMAIL PROTECTED] 
Sent: Monday, June 20, 2005 10:00 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Supported interface to set/retrieve TCBUSER field
NON-authorized?


The original question is the wrong question to be asking in the first
place, because it implies a solution instead of stating the real need.
The correct question, as Bill implies, should have been "Where can an
unprivileged program anchor some data?"  TCBUSER is just a wrong
answer to the proper question.  Name/Token is the right answer to the
right question.


/Leonard

_
This message and any attachments are intended only for the use of the addressee 
and
may contain information that is privileged and confidential. If the reader of 
the 
message is not the intended recipient or an authorized representative of the
intended recipient, you are hereby notified that any dissemination of this
communication is strictly prohibited. If you have received this communication in
error, please notify us immediately by e-mail and delete the message and any
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Aplications running on z/OS1.4 after implementation of Unicode Conversion services (UCS)

2005-06-21 Thread Joe Zitzelberger

On Jun 20, 2005, at 2:36 PM, Shmuel Metz (Seymour J.) wrote:

In <[EMAIL PROTECTED]>, on 06/20/2005
   at 03:02 AM, Joe Zitzelberger <[EMAIL PROTECTED]> said:


I quoted those unrelated prices only to illustrate how absurd it
might be to only consider cost of hardware when making ones decision
on UCS tables.


Almost as absurd as mentioning DASD prices when the issue is RAM.
Certainly RAM prices have fallen, but they are *not* anywhere close to
DASD prices.


In the 30 years I've been watching the hardware market, their prices  
tend to move together, always falling over time.  But all hardware  
does that.  Conversely, the cost of programmer labor has sharply  
increased.  I mention DASD because I was shopping for it that day and  
had the prices at hand (read too lazy to hit www.pricewatch.com for  
RAM prices).  Plus the 80G for $19.95 has a nice shock-impact on  
those that will spend (waste) hours of human labor to squeeze every  
last byte out of something.


My view of the issue is that some people get tunnel vision about what  
the hardware can and cannot support based on long outdated  
assumptions.  For example, some people still think they are  
conserving on storage by using 3-byte adcons -- they haven't yet come  
to terms with the reality that the minimum possible size of a  
physical memory allocation is a 4k page.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Washington Post: 40 Million Credit Card #s Hacked

2005-06-21 Thread Ted MacNEIL
...
An unauthorized attempt is already a security violation.
...

But, an attempt that should not have succeeded could end up making headlines.

-teD
(The secret to success is sincerity.
If you can fake that,
you've got it made!)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Supported interface to set/retrieve TCBUSER field NON-authorized?

2005-06-21 Thread Farley, Peter x23353
Agreed, Bill.  An anchor for persistent data is the application, and
name/token services is the "right" answer.  For very small amounts of data,
though, it just seems like overkill.

Peter

-Original Message-
From: Bill Fairchild [mailto:[EMAIL PROTECTED] 
Sent: Monday, June 20, 2005 9:18 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Supported interface to set/retrieve TCBUSER field
NON-authorized?


Since my last post I have learned a lot more about the name/token  services.

It appears that there is still no supported+documented interface  to set the

TCBUSER word, which was the original question.  But the  name/token service 
will probably let you do what you really want to use TCBUSER  for, which is
a means for multiple tasks/users to share info.  Once again  we have to ask
"why do you want to do that?"  Name/token services allow you  to work around
the need to be authorized in order to change TCBUSER.  In  effect, you can
store a piece of data "somewhere", just as if it were in  TCBUSER, which
other users can easily find.
 
The bottom line is that TCBUSER, which is theoretically reserved for the  
user, is actually reserved for all time unless users want to write
authorized  
code.
 
Bill Fairchild

_
This message and any attachments are intended only for the use of the addressee 
and
may contain information that is privileged and confidential. If the reader of 
the 
message is not the intended recipient or an authorized representative of the
intended recipient, you are hereby notified that any dissemination of this
communication is strictly prohibited. If you have received this communication in
error, please notify us immediately by e-mail and delete the message and any
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Supported interface to set/retrieve TCBUSER field NON-authorized?

2005-06-21 Thread Farley, Peter x23353
Thanks Roland, I am aware of that service.  I was just hoping there was a
less complex anchor mechanism.

Peter

-Original Message-
From: Schiradin,Roland HG-Dir itb-db/dc
[mailto:[EMAIL PROTECTED] 
Sent: Monday, June 20, 2005 7:34 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Supported interface to set/retrieve TCBUSER field
NON-authorized?

No need for a requirement it already exists using the Name/Token service. 

Roland

_
This message and any attachments are intended only for the use of the addressee 
and
may contain information that is privileged and confidential. If the reader of 
the 
message is not the intended recipient or an authorized representative of the
intended recipient, you are hereby notified that any dissemination of this
communication is strictly prohibited. If you have received this communication in
error, please notify us immediately by e-mail and delete the message and any
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Name/Token Services in COBOL?

2005-06-21 Thread Bill Fairchild
 
In a message dated 6/21/2005 6:39:48 A.M. Central Daylight Time,  
[EMAIL PROTECTED] writes:

I was  surprised that no one mentioned that interface definition file
IEANTCOB is  provided precisely for the purpose of allowing a COBOL program
to call the  name/token services


Maybe not very many IBM-MAINers speak COBOL?
 
“The  use of COBOL cripples the mind; its teaching should, therefore, be 
regarded as a  criminal offense.” [Edsgar Dijkstra]
 
“COBOL  can be cured if it’s caught soon enough.” [unknown]
 
:-)
 
Bill  Fairchild

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: GIVE/TAKESOCKET Macros

2005-06-21 Thread Walt Farrell

On 6/21/2005 6:25 AM, Tom Rusnak wrote:

Is there any way to Give a socket to an address space where the address
space does not have an OMVS segment?

As soon as the address space issues the TAKESOCKET I get an error code of
156 indicating that that address space needs an OMVS security segment.

Assume that the GIVESOCKET program can run authorized.  Is there anyway to
bypass the requirement for the OMVS segment or would that be considered an
integrity exposure?


No, that would not be an integrity exposure.  However, as far as I know, 
use of sockets requires UNIX functions, which in turn implies that the 
address space user needs a UID.


Just give the address space the OMVS data it needs.  This is simple with 
the default OMVS support available in the system.  For a RACF shop, 
define a FACILITY profile BPX.DEFAULT.USER as documented in the z/OS 
UNIX Planning guide.  See 
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/bpxzb251/5.3.4?SHELF=EZ2ZO10E&DT=20041214152236 
for details.


Walt Farrell, CISSP
z/OS Security Design, IBM

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Old MF - new Configuration

2005-06-21 Thread Ron and Jenny Hawkins
Magen,

You don't need 2105 support for the 9980 if that is a problem for you. It is
preferable to use 2105 emulation, but 3990-6 works just fine.

You may want to check with HDS (my employer) that current microcode levels
are Downward Compatible to OS390 v.1.2.

Ron

> -Original Message-
> From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
> Behalf Of Mark Scate
> Sent: Tuesday, 21 June 2005 12:39 PM
> To: IBM-MAIN@BAMA.UA.EDU
> Subject: Old MF - new Configuration
> 
> Hi all,
> 
> I'm helping a site, aims to kill the "MF" for several years.,
> but still didn't manage to do so.
> 
> They currently have: CMOS 9672 Models: R24, R32
> running OS390 v.1.2.
> and the gave some problems
> leading me to ask the following questions:
> 
> 1. The storage server used at this site is HDS 7700
> and they would like to implement the MF configuration
> in a 9980V they already have for other systems.
> Is it possible to "connect" 9980V to OS390 1.2
> This would require IOCDS support with CU 2105
> Does someone remember being able to connect 2105
> CU to server running OS390 1.2
> 
> 2. Is it possible to replace the 3174 controllers
> with 2074 controllers in such low level
> configuration?
> 
> 
> Thanks for your help,
> Magen.
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Name/Token Services in COBOL?

2005-06-21 Thread Peter Relson
I was surprised that no one mentioned that interface definition file
IEANTCOB is provided precisely for the purpose of allowing a COBOL program
to call the name/token services.

Peter Relson
z/OS Core Technology Design

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Upgrading from z/900 to z/990 and Cisco CIP HCD Definitions

2005-06-21 Thread Mark T. Regan, K8MTR
We will be upgrading from a z/900 to a z/990 next month and we still have some 
Cisco CIP
cards to support for one of our customers. I asked Cisco if their CIP cards 
support the z/990, and
they said yes, but they added:


"However from the M/F point of view you may have to define the HCD CIP 
definitions as 3172.
Apparently with some of the new processors you can't define the CIP links as 
CTC or RS6K only as
3172."

Currently we have them defined as "SCTC" and they are connected via ESCON 
Director switches.
Does anyone if we will have to change UNIT= setting or not?

Thanks.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: GIVE/TAKESOCKET Macros

2005-06-21 Thread Tom Rusnak
Is there any way to Give a socket to an address space where the address
space does not have an OMVS segment?

As soon as the address space issues the TAKESOCKET I get an error code of
156 indicating that that address space needs an OMVS security segment.

Assume that the GIVESOCKET program can run authorized.  Is there anyway to
bypass the requirement for the OMVS segment or would that be considered an
integrity exposure?


Thanks,

Tom

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


SA PB in CICC App ...

2005-06-21 Thread Moussadak, Mustafa
Hi all,

We had just migrate from OS390 2.10 to zOS 1.4. 

We got a PB in SA (release 1.3) : The Application CICC, having VTAM & TCPIP
as parents, don't start at IPL !

Here's the SA msg at SYSLOG :

IEF196I AOF313I 11:46:16 : START FOR SUBSYSTEM CICC (JOB CICC) WAS NOT 
AOF313I 11:46:16 : START FOR SUBSYSTEM CICC (JOB CICC) WAS NOT 051 
IEF196I  ATTEMPTED - PARENT(S) NOT 
 ATTEMPTED - PARENT(S) NOT UP  
IEF196I UP 


The CICC Automation info is :

Job Name   : CICC

 

Sysname  . . . . . .
Parent(s)  . . . . . VTAM,TCPIP 
 

Start on IPL . . . . YES
Start on Recycle . .
Startup  . . . . . . CUSTOMER   
  Edit startup . . . NO 
Start timeout  . . . 00:06:00   



I'm new to SA. How can we, please, correct this situation !



Thanks in advance.


Cordialement/Regards

 
Moussadak

###

This message has been scanned by F-Secure Anti-Virus for Microsoft Exchange.
For more information, connect to http://www.F-Secure.com/


**
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.

This footnote also confirms that this email message has been analysed by
and controled for the presence of computer viruses.

cpm.co.ma
**

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html