Re: Gartner: Stop Outsourcing Now

2005-10-28 Thread John R. Grout
Ed Gould [EMAIL PROTECTED] writes:

1. Gartner Analyst: Stop Outsourcing Now
Gartner's chief of research for outsourcing says
companies have become compulsive about outsourcing...
and it's creating chaos and hurting business.

Does anyone think outsourcing is _not_ about
punching up financials to inflate executive
compensation packages?  Unless the FASB (and
similar bodies in the rest of the G-8) brings
the gravy train to a halt, asking executives
to stop outsourcing is like asking them to
trade in their 7-series Beemers and S-class
Benzes for Corollas and Civics.

John R. Grout
[EMAIL PROTECTED]

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ISPF WSA (Was: TN3270 Emulator)

2005-10-28 Thread Phil Smith III
Gray Maddry [EMAIL PROTECTED] wrote:
That kind of cutting is sometimes called block or column mode and many PC 
editors support that. Ultraedit, ConText, Crimson Editor to name three.

And Kedit, which is a CMS XEDIT clone and is thus a lot closer to ISPF than 
most (and is highly customizable).

www.kedit.com.

...phsiii (unpaid shill)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 3745 cable pin out.

2005-10-28 Thread ibm-main
From: R.S.
  
  GREAT! Wonder why it's not linked in the Hardware  section? 
 
 It would be against IBM mainframe rules.
 It could be *convenient*.
 
 It's very good that IBM publishes so much. I really appreciate it. 
 However it's a pity that all the publications are not accessible from 
 single site.

Radoslaw could be said to have a bit of an attitude proble.

Except that he's *very* close to the bone ...  8-(

Shane ...

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SMP/E: Deleting SMPPTS entries

2005-10-28 Thread Matthew Stitt
You could delete the fmid from the global zone through the dialogs.  Then
run an SMPE REJECT NOFMID and see what that gets you.


On Thu, 27 Oct 2005 16:25:43 -0600, Paul Gilmartin [EMAIL PROTECTED]
wrote:

Way back in:

   Linkname: Re: SMPE Problem
URL:
http://bama.ua.edu/cgi-bin/wa?A2=ind0403L=ibm-mainD=1O=DI=1P=273501

It was suggested:

... In my opinion, deleting a member from the PTS is a
reasonable approach to the problem you are trying to solve.

(Badly out of context, but the citation is above.)

Today, I had a typo in a DISTLIB entry in a FUNCTION.  Of course
this resulted in:

GIM54502E ** ALLOCATION FAILED FOR ... BECAUSE THERE IS NO DD STATEMENT IN
THE JCL AND NO DDDEF ENTRY IN TARGET
 ZONE ...

I corrected the DISTLIB, and rebuilt the tape.  Hastily, I deleted
the member from the SMPPTS, and deleted all the TLIBs and re-received.
The APPLY failed identically.  The SMPPTS member shows the corrected
DISTLIB regardless of the failure.

Would the SMP/E panels explain what's going on?  Where is the rogue
DISTLIB DDNAME hiding?  Would REJECT have repaired the problem?
Would bumping the REWORK have repaired the problem?  Apparently
deleting the SMPPTS entry isn't always enough to clean the slate.

I created a new CSI and RECEIVED into it, and APPLYed.  The APPLY
disclosed further errors, but the GIM54502E is gone.  SMP/E 32.16

-- gil
StorageTek
INFORMATION made POWERFUL


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Martin Kline
 I apologize in advance for not knowing the best list to send this
 question to.  (Perhaps ISPF-L?  But I'm not a subscriber there.)  I'm
 proposing to our systems folks that we allow a user to use TSO to
 get to the Zeke Work Center function.  I'm being told that there is no
 way for us to limit what the user can do if we let them intoTSO.


 Sounds like bullshirt to me. Any user with ATTRIBUTES=RESTRICTED will
 require that _every function_ they need be explicitly authorized,
 regardless of any existing UACC settings.

I find this interesting. Just recently, list members were objecting that
limiting a user's access to resources (in that case it was memory) was
probably keeping them from doing their job. Where are they now?

The argument was that if a user was requesting a resource, they MUST NEED
IT for their job. This seems like a very similar situation. Why not allow
the users access to all of ISPF, and depend on their honorable nature to
only use those functions that they need to do their job?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Paul Gilmartin
In a recent note, Martin Kline said:

 Date: Fri, 28 Oct 2005 07:41:03 -0500
 
 I find this interesting. Just recently, list members were objecting that
 limiting a user's access to resources (in that case it was memory) was
 probably keeping them from doing their job. Where are they now?
 
Weary from the last time around?  But since you ask ...

 The argument was that if a user was requesting a resource, they MUST NEED
 IT for their job. This seems like a very similar situation. Why not allow
 the users access to all of ISPF, and depend on their honorable nature to
 only use those functions that they need to do their job?
 
depend on their honorable nature is appropriate for functions,
but inadequate for resources.  But the approach should be to
protect resources with RACF, not to restrict a targeted class
of users.  Don't stigmatize a group and confine them to reservations,
or to ghettos, or with house arrest; rather secure the bank vaults
to prevent theft.

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Gartner: Stop Outsourcing Now

2005-10-28 Thread Timothy Sipples
Gartner's chief of research for outsourcing says companies have become 
compulsive about outsourcing...

...and, since nobody should make a business decision compulsively, 
companies should turn to Gartner for advice and consulting services first.

:-)

Seriously, the article makes a good point.

- - - - -
Timothy F. Sipples
Consulting Enterprise Software Architect
IBM Americas zSeries/z9 Software
Phone: +1 312 529 1612
E-Mail: [EMAIL PROTECTED]

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Martin Kline
HI Gil. You said:

 depend on their honorable nature is appropriate for functions,
 but inadequate for resources.

So, you believe that resources, e.g. memory, should be protected, while
functions, like TSO commands, should not?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Gartner: Stop Outsourcing Now

2005-10-28 Thread Froberg, David C
 

 
 Gartner's chief of research for outsourcing says companies 
 have become 
 compulsive about outsourcing...
 

A new illness: Compulsive Outsourcing Disorder or COD

Does NIH have funding for this?

Dave

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What causes this?

2005-10-28 Thread Ed Finnell
 
In a message dated 10/28/2005 4:30:36 A.M. Central Standard Time,  
[EMAIL PROTECTED] writes:

You may  wish to consider taking a stand-alone dump, if you aren't able to
collect  any other information,





Most of the time it's a missing $s?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 3745 cable pin out.

2005-10-28 Thread Ed Finnell
 
In a message dated 10/28/2005 6:13:21 A.M. Central Standard Time,  
[EMAIL PROTECTED] writes:

It's  very good that IBM publishes so much. I really appreciate it. 
However it's  a pity that all the publications are not accessible from 
single  site.




Take a PFCSK about two minutes to link them together given the
authority!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


ISPF member list

2005-10-28 Thread R.S.

Few years ago ISPF changed behavior of member list, I'l try to explain:
When you select a member (for Browse, Edit, View) from middle of the 
screen, you enter into edit session, exit the editor, the list of 
members is automatically scrolled up, so just-editer member is on the 
top of the list (I mean the part of the list, visible on the screen).

It's not big pain, but I'd like to know how to switch it off.
Any clue ?

--
Radoslaw Skorupka
Lodz, Poland

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Paul Gilmartin
In a recent note, Martin Kline said:

 Date: Fri, 28 Oct 2005 08:15:26 -0500
 
 So, you believe that resources, e.g. memory, should be protected, while
 functions, like TSO commands, should not?
 
I was thinking more of data sets than memory (Resources like the
R in RACF), but yes.  If you wish to prevent a user's
deleting SYS1.LINKLIB, don't try to prevent the user's use of
the TSO DELETE command, and ALLOC DISP=(...,DELETE), and IDCAMS,
and any number of commands that might delete a data set.  Simply
protect SYS1.LINKLIB with RACF (probably a good idea anyway).

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ISPF member list

2005-10-28 Thread Fletcher, Kevin
Rad,

I think there is an ISPF member list exit. You have to turn it on via
the ISPCCONF panels and write the exit. Some of the details are in the
ISPF Planning and Customization Guide. 

Though, IMHO, if this is just an annoyance and does not fill a business
need, I would just live with it.

HTH 

Thanks,
 
Fletch


-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of R.S.
Sent: Friday, October 28, 2005 8:53 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: ISPF member list


Few years ago ISPF changed behavior of member list, I'l try to explain:
When you select a member (for Browse, Edit, View) from middle of the 
screen, you enter into edit session, exit the editor, the list of 
members is automatically scrolled up, so just-editer member is on the 
top of the list (I mean the part of the list, visible on the screen).
It's not big pain, but I'd like to know how to switch it off. Any clue ?

-- 
Radoslaw Skorupka
Lodz, Poland

--
For IBM-MAIN subscribe / signoff / archive access instructions, send
email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search
the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Edward E. Jaffe

Martin Kline wrote:


I find this interesting. Just recently, list members were objecting that
limiting a user's access to resources (in that case it was memory) was
probably keeping them from doing their job. Where are they now?

The argument was that if a user was requesting a resource, they MUST NEED
IT for their job. This seems like a very similar situation. Why not allow
the users access to all of ISPF, and depend on their honorable nature to
only use those functions that they need to do their job?
 



Your confusion is due to an unfortunate use of the word resource in 
two wholly-different contexts.


RACF stands for Resource Access Control Facility. But, the resources 
it protects have nothing whatsoever to do with CPU time or virtual storage.


I suppose, if we could convince Mr. Peabody to use the Wayback Machine 
to take us to the meeting where RACF's moniker was invented, we could 
insist on a more-appropriate one, like PCF = Permissions Control 
Facility.   :-\ 


--
.-.
| Edward E. Jaffe||
| Mgr, Research  Development| [EMAIL PROTECTED]|
| Phoenix Software International | Tel: (310) 338-0400 x318   |
| 5200 W Century Blvd, Suite 800 | Fax: (310) 338-0801|
| Los Angeles, CA 90045  | http://www.phoenixsoftware.com |
'-'

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ISPF member list

2005-10-28 Thread DeFabritus, Peter [NCSUS Non-JJ]
On Fri, 28 Oct 2005 15:52:47 +0200, R.S. [EMAIL PROTECTED]
wrote:

Few years ago ISPF changed behavior of member list, I'l try to explain:
When you select a member (for Browse, Edit, View) from middle of the
screen, you enter into edit session, exit the editor, the list of
members is automatically scrolled up, so just-editer member is on the
top of the list (I mean the part of the list, visible on the screen).
It's not big pain, but I'd like to know how to switch it off.
Any clue ?

--
Radoslaw Skorupka
Lodz, Poland

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


In ISPF for z/OS 1.5 and above there is an option in the ISPF Configuration
Table, in the ISPF Site-Wide Profile Customizations section, called
SCROLL_MEMBER_LIST, which gives you control over this function.  This is
described in the Planning and Customizing manual.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


GDPS possibilities across distances

2005-10-28 Thread Clark Lowery
Thanks you for all of the help I've received in investigating the problems
with running a fully duplexed GDPS across distances.

There are several users in Europe running GDPS with data sharing/CF
duplexing, and possibly one in Australia. My company is very interested in
this approach, and would like to work toward a better understanding of all
of the experiences of other users.

Who would be interested in getting together for some discussions? I can
host some WEB sessions, and would be glad to pay a visit to any of you who
think it worthwhile.

Please let me know:
• If you are interested in some user-experience discussions about
GDPS
• If I can contact you directly (via email) to set something up
• If you think this subject deserves coverage in conference – and
what conference you think would fit best
Feel free to contact me directly.

Clark

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: MEMLIMIT and IEFUSI

2005-10-28 Thread Mark Zelden
On Thu, 27 Oct 2005 00:00:00 GMT, Ted MacNEIL
[EMAIL PROTECTED] wrote:

The number eventually gets stored into an MVS control block which is
examined
by various system services.
...

I don't think you want to touch DB2 V8+ as far as MEMLIMIT is concerned.
It is architected (and expects) to use all that memory.
Only a couple of pools are left below the bar.
You would kick the snot out of any performance gains that this gives you,
if it would even come up.
-teD

Surely you jest!   What don't you (and IBM) get?!   If DB2 were to
use all that memory I would need a large portion of my entire DASD
farm dedicated to page data sets.   Isn't the max real supported by
z/OS still 128G?  What's the point of hard coding 4T?

For as long as I can remember IBM has told us to protect ourselves
from wait03C with IEFUSI (and a robust paging subsystem). It hasn't
really mattered in the recent past with large systems and 31-bit,
but now it is more important than ever.   I can no longer rely on
a robust paging system alone to protect the system.

I just don't get it.

Vendors PLEASE. If you are going to need oodles of storage
above the bar, just document your requirements just like you would
for common storage.

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America and Farmers Insurance Group
mailto: [EMAIL PROTECTED]
Systems Programming expert at http://Search390.com/ateExperts/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Edward E. Jaffe

Walt Farrell wrote:


On 10/28/2005 10:16 AM, Edward E. Jaffe wrote:

RACF stands for Resource Access Control Facility. But, the 
resources it protects have nothing whatsoever to do with CPU time 
or virtual storage.


I suppose, if we could convince Mr. Peabody to use the Wayback 
Machine to take us to the meeting where RACF's moniker was invented, 
we could insist on a more-appropriate one, like PCF = Permissions 
Control Facility.   :-\



The internal tool which became RACF did have controls for CPU and DASD 
storage utilization (though I don't think it had controls for virtual 
storage).


If you were going to go back and change something, I'd prefer you 
convince them to make those controls part of the product, too, rather 
than changing the product name.



If such controls were present in the product, the RACF name might have 
been more appropriate. In any case, you guys have already changed its 
name more than enough times. :-D


--
.-.
| Edward E. Jaffe||
| Mgr, Research  Development| [EMAIL PROTECTED]|
| Phoenix Software International | Tel: (310) 338-0400 x318   |
| 5200 W Century Blvd, Suite 800 | Fax: (310) 338-0801|
| Los Angeles, CA 90045  | http://www.phoenixsoftware.com |
'-'

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Thomas Berg

==  Steve Grimes  ==  wrote2005-10-26 01:11:
Our  application programmers no longer, for instance, have update access to 
SYS1.PARMLIB, etc.


8-O   :-D
ROFL!


--

--
Mundus Vult Decipi
--

 They that can give up essential liberty to obtain a little temporary safety 
deserve neither liberty nor safety.
 - Benjamin Franklin

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ISPF member list

2005-10-28 Thread Richard Pinion
So you belong to the same organization as the Three Stooges, the AMA 
(Amalgamated Moron's Association).

 [EMAIL PROTECTED] 10/28/2005 11:41:32 AM 
And I disagree entirely with your opinions.  I am quite pleased with the
functionality you describe. Perhaps I'm a moron...  :-)

Greg Shirey
Ben E. Keith Company

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] 
Behalf Of Paul Gilmartin
Sent: Friday, October 28, 2005 10:11 AM


OTOH, it's simply moronic that when the member list is small and
fits entirely on a single screen, and I browse the last member and
exit, the screen is scrolled so only one member shows.  Such
automatic scrolling should never go farther than the effect of
DOWN MAX.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Martin Kline
 Your confusion is due to an unfortunate use of the word resource in
 two wholly-different contexts.

 You're getting waaay off track here...

I'm confused and off track? Please do not attacking me personally.

I got into this discussion just to highlight the inconsistency of two
arguments. In one case it was argued that any user who used a resource must
need it to do their job, otherwise they would never have used it. In the
other case, it's argued that all resources should be protected, and only
specific authorizations given out, because accidents and bad intentions
happen.

The resources involved are different, but the reasons for protecting them
are essentially the same.

If the business requires that a user access a specific set of resources,
and no other resources, then the other resources have to be protected.

If the business would like a user to access a set of resources and would
like (but not require) them NOT to access other resources, then a note
saying, Please don't touch these other resources might suffice.

Each business' requirements are different. Perhaps the originator is
satisfied with a logon proc that only points Joe user to Zeke. Maybe the
requestor isn't interested in the myriad methods of bypassing security, and
is only interested in satisfying the immediate needs of Joe user. After
all, the original request said, I'm hoping no RACF changes will be
required, except perhaps for authorization to execute the sign-on proc.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Wayne Driscoll
Martin, 
If a persons job function requires that they be able to use ISPF and edit a
file that requires 128M of virtual storage, then they should have access to
that much storage.  If their job functions requires that they have update
access to SYS1.PARMLIB, then the should have it.  However, giving them
update access to the FILE that requires 128M of virtual storage to edit, but
limiting the user to 32M of virtual storage will not allow them to perform
there job function.  I don't believe that anyone is saying don't have
limits, just that the limits should be so restrictive that the computer
doesn't get used.
Wayne Driscoll
Product Developer
Western Metal Supply
NOTE: All opinions are strictly my own.
  

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Martin Kline
Sent: Friday, October 28, 2005 9:37 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Allowing Joe User into TSO

 Your confusion is due to an unfortunate use of the word resource in 
 two wholly-different contexts.

On the contrary, I am not confused at all. Clearly, users should be
prevented from deleting datasets they shouldn't delete. However, who's to
say Joe user shouldn't delete dataset JOE.yyy.zzz? Is it a requirement of
the job?

Likewise, who's to say Joe user shouldn't allocate 100Gb of virtual memory
to load a table? Is it a requirement of the job?

Should the approach be to protect all datasets, and require every user to
get authorization before accessing them? Won't this interfere with their
ability to do their jobs?

What about memory? Shouldn't excessive memory requests be restricted, and
require authorization as well? Would that interfere with the ability of
users to do their jobs? Is it any worse than setting up dataset protection?

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the
archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Edward E. Jaffe

Martin Kline wrote:


Each business' requirements are different. Perhaps the originator is
satisfied with a logon proc that only points Joe user to Zeke. Maybe the
requestor isn't interested in the myriad methods of bypassing security, and
is only interested in satisfying the immediate needs of Joe user.



Perhaps. But he solicited advice from the list and that's what he got.


After
all, the original request said, I'm hoping no RACF changes will be
required, except perhaps for authorization to execute the sign-on proc.
 



And I'm hoping to win the MEGA Millions California Lottery. Chances are 
both Steve and I will be disappointed. ;-)


--
.-.
| Edward E. Jaffe||
| Mgr, Research  Development| [EMAIL PROTECTED]|
| Phoenix Software International | Tel: (310) 338-0400 x318   |
| 5200 W Century Blvd, Suite 800 | Fax: (310) 338-0801|
| Los Angeles, CA 90045  | http://www.phoenixsoftware.com |
'-'

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: allowing Joe User into TSO

2005-10-28 Thread john gilmore

There are two polar attitudes toward problems of this sort, viz.,

Was ist nicht erlaubt is verboten (What is not allowed is forbidden).

and

Was ist nicht verboten ist erlaubt (What is not forbidden is allowed).

The second of them has three great merits:

o It does not require uncommon, even God-like prescience;

o It does not cumber the working environment with barred windows and culs de 
sac; and


o It is much less labor-intensive than the first.

Computer-security problems are real; but we now have a large and growing 
group of computer-security specialists who have a vested, bureaucratic 
interest in devoting more and more resources to treating these problems 
simplistically; and these 'specialists' are hard to oppose without being 
attacked as naif or in league with the villains.



John Gilmore
Ashland, MA 01721-1817
USA

_
Express yourself instantly with MSN Messenger! Download today - it's FREE! 
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Martin Kline
 If a persons job function requires that they be able to use ISPF and edit
 a file that requires 128M of virtual storage, then they should have
 access to that much storage.  If their job functions requires that they
 have update access to SYS1.PARMLIB, then the should have it.

I agree, Wayne. just because one user needs to have update access to
parmlib does not mean all users should have update access.

But the previous discussion had some users suggesting that memory limits
for all users should be set higher than the maximum requirement for any
user. I believe this leave the organization vulnerable to problems.
Instead, allow the one user to have lots of memory, and restrict others to
a lower limit, that the system can tolerate.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Chase, John
 -Original Message-
 From: IBM Mainframe Discussion List On Behalf Of Martin Kline
 
  Your confusion is due to an unfortunate use of the word 
 resource in 
  two wholly-different contexts.
 
 On the contrary, I am not confused at all.

I'm inclined to think you are, because you're in effect comparing a
restriction on how fast you can drive a car (storage/CPU) vs. a restriction
on where you can or cannot drive it (TSO, SDSF, Zeke, etc.).

-jc-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


[Fwd: Re: SMP/E: Deleting SMPPTS entries]

2005-10-28 Thread Kurt Quackenbush



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
---BeginMessage---

 Today, I had a typo in a DISTLIB entry in a FUNCTION.  Of course

this resulted in:

GIM54502E ** ALLOCATION FAILED FOR ... BECAUSE THERE IS NO DD STATEMENT IN THE 
JCL AND NO DDDEF ENTRY IN TARGET
 ZONE ...

I corrected the DISTLIB, and rebuilt the tape.  Hastily, I deleted
the member from the SMPPTS, and deleted all the TLIBs and re-received.
The APPLY failed identically.  The SMPPTS member shows the corrected
DISTLIB regardless of the failure.



Would the SMP/E panels explain what's going on?  Where is the rogue
DISTLIB DDNAME hiding?


You didn't state what element type contained the bad DISTLIB value.  Was 
it a ++MOD?  Did you need to correct the JCLIN?  Remember, link edit 
INCLUDE statements define the DISTLIB for MODs.


Would REJECT have repaired the problem?

REJECT should have given equivalent results... it deletes the SMPPTS 
member and the global zone SYSMOD entry.



Would bumping the REWORK have repaired the problem?


Incrementing the REWORK also should have given equivalent results... 
RECEIVE would overlay the SMPPTS member and replace the global zone 
SYSMOD entry with that from the higher level SYSMOD.


Kurt Quackenbush -- IBM, SMP/E Development


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
---End Message---


Re: Allowing Joe User into TSO

2005-10-28 Thread Martin Kline
 On the contrary, I am not confused at all.

 I'm inclined to think you are, because you're in effect comparing a
 restriction on how fast you can drive a car (storage/CPU) vs. a
 restriction on where you can or cannot drive it (TSO, SDSF, Zeke, etc.).

If this discussion is about a car, then I am definitely confused. ;)

But, if we were talking about cars, I think we'd be discussing you stealing
100 gallons of my gas (Gb of memory) vs. you driving on my lawn and running
over my azaleas (anything other than poor ol' Zeke).

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SMP/E: Deleting SMPPTS entries

2005-10-28 Thread Jorge Arueira Campos
Hello

I need information about a DEFINE of alias in catalog user wich is under
master of production for clonning other system. The job and msg of IDCAMS
follow:

//DEFSSA EXEC PGM=IDCAMS
//STEPCAT DD DISP=SHR,DSN=CATALOG.ZOSP3
// DD DISP=SHR,DSN=CATALOG.MASTCAP3
//SYSPRINT DD SYSOUT=*
//SYSIN DD *
DEF ALIAS(NAME(JAVA) REL(CATALOG.ZOSP3))


DEF ALIAS(NAME(JAVA) REL(CATALOG.ZOSP3))
IDC3022I INVALID RELATED OBJECT
IDC3009I ** VSAM CATALOG RETURN CODE IS 80 - REASON CODE IS IGG0CLEK-28
IDC3003I FUNCTION TERMINATED. CONDITION CODE IS 12

IDC0002I IDCAMS PROCESSING COMPLETE. MAXIMUM CONDITION CODE WAS 12

Best regards

Jorge Arueira Campos
System Support
Caixa Economica Federal
São Paulo - Brazil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SMP/E: Deleting SMPPTS entries

2005-10-28 Thread Imbriale, Donald (Exchange)
The Messages manual gives a clear explanation of the problem.  Is there
something about the message that you do not understand?

Don Imbriale

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf
Of Jorge Arueira Campos
Sent: Friday, October 28, 2005 2:20 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: SMP/E: Deleting SMPPTS entries

Hello

I need information about a DEFINE of alias in catalog user wich is
under
master of production for clonning other system. The job and msg of
IDCAMS
follow:

//DEFSSA EXEC PGM=IDCAMS
//STEPCAT DD DISP=SHR,DSN=CATALOG.ZOSP3
// DD DISP=SHR,DSN=CATALOG.MASTCAP3
//SYSPRINT DD SYSOUT=*
//SYSIN DD *
DEF ALIAS(NAME(JAVA) REL(CATALOG.ZOSP3))


DEF ALIAS(NAME(JAVA) REL(CATALOG.ZOSP3))
IDC3022I INVALID RELATED OBJECT
IDC3009I ** VSAM CATALOG RETURN CODE IS 80 - REASON CODE IS IGG0CLEK-
28
IDC3003I FUNCTION TERMINATED. CONDITION CODE IS 12

IDC0002I IDCAMS PROCESSING COMPLETE. MAXIMUM CONDITION CODE WAS 12



***
Bear Stearns is not responsible for any recommendation, solicitation, 
offer or agreement or any information about any transaction, customer 
account or account activity contained in this communication.
***

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Howard Brazee
On 28 Oct 2005 09:14:03 -0700, [EMAIL PROTECTED] (Martin
Kline) wrote:

But the previous discussion had some users suggesting that memory limits
for all users should be set higher than the maximum requirement for any
user. I believe this leave the organization vulnerable to problems.
Instead, allow the one user to have lots of memory, and restrict others to
a lower limit, that the system can tolerate.

If it's not good for the system, I like working on a way to allow
anybody to get those resources - but to have to do a bit of work every
time, so that they don't set up parameters to *always* use those
resources.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Time change this weekend.

2005-10-28 Thread Leonard Woren
On Thu, Oct 27, 2005 at 06:51:51PM -0400, Ed Finnell ([EMAIL PROTECTED]) wrote:
 [EMAIL PROTECTED] writes:
 
 ACROBAT  READER 7.0.5 was recently released and so far it seems to be
 working fine.  It's a big update, something like 9+  Mb.

 Yup, autoupdate picked it up and another reboot.

Aren't you glad that you don't have to IPL MVS every time some
applications programmer recompiles a COBOL or C program?

Some readers apparently missed the point in a previous post of mine
asking about rebooting their PCs.  It was a snide rhetorical question.
If Winblows wasn't fundamentally broken at an architectural level it
wouldn't be necessary to reboot for trivial applications program 
installs/updates.

Getting back onto the topic of this thread:
One selling point of z/OS is supposedly continuous operations.
So if you have to shut down an application or the system for the
time change, then that application or the system is not in compliance
with the continuous operations philosophy.  If the code in question
is current level supported by IBM, I'd be pushing hard for a fix
through the APAR process.


/Leonard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Steve Grimes
Hello again!

We'll I'm certainly enjoying the exchange.  I think the initial responses 
covered what I was after.

An additional detail for the curious -- Joe User currently has a Roscoe 
account and uses it to submit jobs that do updates.  So, he has a 
reasonable amount of RACF authority already.  But, alas, not enough due to 
recent (long overdue) tightening of RACF rules.So he calls us, and we 
submit this one job.

Zeke has the authority to submit what they want, and the Work Center 
function (within) can be set up so they can only submit that -one- job.

This would also serve as a proof of concept for migrating JCL stuff away 
from users (and Roscoe) and toward better (I think) control via the Zeke 
Work Center.

Stg

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Klein, Kevin
We got around the TSO need by implementing Zeke's CICS interface, then 
controlling it with transaction security.  I think that interface comes 
standard with Zeke.  Another option to consider for you.  Local policies and 
politics notwithstanding.  Also assuming you have CICS/TS.

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED]
Behalf Of Steve Grimes
Sent: Friday, October 28, 2005 2:06 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Allowing Joe User into TSO


Hello again!

We'll I'm certainly enjoying the exchange.  I think the initial responses 
covered what I was after.

An additional detail for the curious -- Joe User currently has a Roscoe 
account and uses it to submit jobs that do updates.  So, he has a 
reasonable amount of RACF authority already.  But, alas, not enough due to 
recent (long overdue) tightening of RACF rules.So he calls us, and we 
submit this one job.

Zeke has the authority to submit what they want, and the Work Center 
function (within) can be set up so they can only submit that -one- job.

This would also serve as a proof of concept for migrating JCL stuff away 
from users (and Roscoe) and toward better (I think) control via the Zeke 
Work Center.

Stg

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
#
Attention:
The information contained in this message and or attachments is intended
only for the person or entity to which it is addressed and may contain
confidential and/or privileged material. Any review, retransmission,
dissemination or other use of, or taking of any action in reliance upon,
this information by persons or entities other than the intended recipient
is prohibited. If you received this in error, please contact the sender and
delete the material from any system and destroy any copies.
#

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:[EMAIL PROTECTED] On Behalf Of Steve Grimes
 Sent: Friday, October 28, 2005 2:06 PM
 To: IBM-MAIN@BAMA.UA.EDU
 Subject: Re: Allowing Joe User into TSO
 
 
 Hello again!
 
 We'll I'm certainly enjoying the exchange.  I think the 
 initial responses 
 covered what I was after.
 
 An additional detail for the curious -- Joe User currently 
 has a Roscoe 
 account and uses it to submit jobs that do updates.  So, he has a 
 reasonable amount of RACF authority already.  But, alas, not 
 enough due to 
 recent (long overdue) tightening of RACF rules.So he 
 calls us, and we 
 submit this one job.
 
 Zeke has the authority to submit what they want, and the Work Center 
 function (within) can be set up so they can only submit that 
 -one- job.
 
 This would also serve as a proof of concept for migrating 
 JCL stuff away 
 from users (and Roscoe) and toward better (I think) control 
 via the Zeke 
 Work Center.
 
 Stg

I know nothing about Zeke. But would it be possible for Joe to submit
a job which triggers the actual job to be run? I know that CA-7 can do
this.

--
John McKown
Senior Systems Programmer
UICI Insurance Center
Information Technology

This message (including any attachments) contains confidential
information intended for a specific individual and purpose, and its'
content is protected by law.  If you are not the intended recipient, you
should delete this message and are hereby notified that any disclosure,
copying, or distribution of this transmission, or taking any action
based on it, is strictly prohibited.
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: MEMLIMIT and IEFUSI

2005-10-28 Thread Mark Zelden
On Fri, 28 Oct 2005 10:28:14 -0500, Wayne Driscoll [EMAIL PROTECTED]
SUPPLY.COM wrote:

since the vast majority of the storage that DB2 uses above
the bar is for Bufferpools, the EDM pool and other pools whose sizes is set
by the user, via DB2 commands and customization, the only way that DB2
SHOULD cause a problem would be if the DB2 systems programmer (or sysadm)
incorrectly sizes these pools.

I don't trust them either.  :-)

However, I do agree that DB2 should play by
the rules and not override a system limit.

Exactly.  Nothing (that I know of) in the system (including *MASTER*)
has ever bypassed IEFUSI before.

side bar
I remember being at a shop once (not all that long ago) that had
REGION=32M coded in MSTJCLxx.  No problem until they coded some job
that issued several hundred operator commands.
/side bar

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America and Farmers Insurance Group
mailto: [EMAIL PROTECTED]
Systems Programming expert at http://Search390.com/ateExperts/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Gartner: Stop Outsourcing Now

2005-10-28 Thread David Speake
According to an article in Z-Journal by Jon William Toigo, titled
IT SENSE, Words of Caution some executives ARE outsourceing a major
portion of their function if not of their fat salaries. He contends they
have outsourced their thinking to the leading vendor of X partially
on the old FUD, No one ever lost their job . The other part was as
perverse an interpetation of capitalism as can be imagined, which he refutes.

If his father in laws ideas are a correct description of the way things work
then capitalism does indeed belong in the dust bin of history. What the inlaw
recommends to him for career purposes would put his integrity one attometer
ahead of the white smocked intellectual whores the cigarette industry used to
parade around on leashes.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: MEMLIMIT and IEFUSI

2005-10-28 Thread Ted MacNEIL
Vendors PLEASE. If you are going to need oodles of storage
above the bar, just document your requirements just like you would
for common storage.
...

It is documented!
IBM just gave a WEB presentations about how you can use (cheap) memory in 
version 8 to undo some of the things you did in versions 6  7, that cost you 
(expensive when you include S/W) CPU because of all the constraints there were 
below the bar.

The removal of hiperpools is also a bonus.

It may not be of benefit to all, but I know two organisations (first hand) that 
will definitely enjoy it.


-teD

In God we Trust!
All others bring data!
 -- W. Edwards Deming

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ISPF member list

2005-10-28 Thread Thomas Conley
- Original Message - 
From: [EMAIL PROTECTED]

Newsgroups: bit.listserv.ibm-main
Sent: Friday, October 28, 2005 11:17 AM
Subject: Re: ISPF member list



In a recent note, Gary Green said:


Date: Fri, 28 Oct 2005 10:38:31 -0400

Funny thing, I like this behavior.  If one is manually 
searching/looking-in

different members in the member list, it's a pain to scroll down a few
lines to get to the next member that is off-screen.  With this 
auto-scroll

of the selected member name to the top makes it so much easier...


OTOH, it's simply moronic that when the member list is small and
fits entirely on a single screen, and I browse the last member and
exit, the screen is scrolled so only one member shows.  Such
automatic scrolling should never go farther than the effect of
DOWN MAX.

And there you have the tastes great, less filling argument that this 
issue brings up.  Back in the mid-90's we were having MAJOR problems trying 
to debug member list scrolling issues because of inconsistent behavior 
amongst all the different member lists.  We decided to standardize on the 
scrolling behavior because it fixed a major problem when processing lots of 
members.  Let's say you selected 100 out of 500 members to process.  The 
resulting member list would be at the top of the list and you would have to 
scroll down a number of pages to take up where you left off.  The problem 
with handling all the exceptions (like single pages, etc.) is the 
complications that it introduces to the member list code.  We've tried to 
streamline it to make it simple, but we've had to re-introduce the 
non-intuitive behavior for those who only work with member lists on a single 
screen.  I won't even get into the complications if an error occurs while 
you're processing multiple members.


It's not as easy as it seems.  If you think you can do better, be my guest. 
Fill out your SHARE requirements and then spend time with the ISPF 
development team beta testing the prototypes.  Can't wait to see what you 
come up with.


Regards,
Tom Conley 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: MEMLIMIT and IEFUSI

2005-10-28 Thread Ted MacNEIL
However, I do agree that DB2 should play by
the rules and not override a system limit
...

I disagree!
I'd rather have my business stay up, than fail because a system programmer 
'knew better'!

We just had the argument about resources needed to do the job!

Right backatchya!

-teD

In God we Trust!
All others bring data!
 -- W. Edwards Deming

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: MEMLIMIT and IEFUSI

2005-10-28 Thread Mark Zelden
On Fri, 28 Oct 2005 00:00:00 GMT, Ted MacNEIL
[EMAIL PROTECTED] wrote:

However, I do agree that DB2 should play by
the rules and not override a system limit
...

I disagree!
I'd rather have my business stay up, than fail because a system programmer
'knew better'!

We just had the argument about resources needed to do the job!

Right backatchya!

No comparison with that conversation.

Sorry to say Ted, but I think you've really missed the boat on this one.

If that system programmer is the DB2 sysprog that decided to play
with his test subsystem and define 30G of buffer pools, he will
quickly put my system in a wait state (assuming DB2 actually tried to
use that storage).

The DB2/CICS/WAS/ISV/etc. folks typically look at things from their own
perspective only.  Part of the job in my group is to be the gate keeper.
As a capacity guy you should understand that because you have the same
responsibilities to the health of the overall system.

What if every authorized program / product felt they knew more and
bypassed IEFUSI and just used whatever above the bar storage they
wanted with no overall system control?

I'd rather have the one DB2 subsystem or program abend than the
entire system in a wait state.

Using your argument, IBM should remove the ability of IEFUSI to
influence region size and MEMLIMIT altogether.  Sorry, given the
past history this makes no sense at all to me (IMHO).  This is the
same place 31-bit was when systems only had 16M (or less) of
central storage - only worse.  64-bit potential is just too big.

Regards,

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America and Farmers Insurance Group
mailto: [EMAIL PROTECTED]
Systems Programming expert at http://Search390.com/ateExperts/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Ted MacNEIL
I think we'd be discussing you stealing
100 gallons of my gas (Gb of memory) vs. you driving on my lawn and running
over my azaleas (anything other than poor ol' Zeke).
...
To quote the Great Monty Python:
“Stop that! It's silly! It was funny once. But, now it's just silly!”

The issue is not how big is my banana.
Rather, do I have enough bananas to do my job!

It is not up to some SYSPROG who 'knows better' to decide that.

Remember, the reason we are employed is to facilitate the business.
NOT, to hinder it.

If I need an 8GB dataspace to do my job (not that far into the future), your 
job is to get it for me.
NOT, to complain that nobody else has one bigger than 20MB.

If the business has justified it, implement it!
Don't P*SS  MOAN about it.

Remember what NIKE said!
“Just do it!”

-teD

In God we Trust!
All others bring data!
 -- W. Edwards Deming

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: MEMLIMIT and IEFUSI

2005-10-28 Thread Ted MacNEIL
Sorry to say Ted, but I think you've really missed the boat on this one
Possibly, but I don't think so.I was probably over-reacting.We don't implement 
a 4TB system overnight.We plan and understand (sometimes on both points)
If that system programmer is the DB2 sysprog that decided to playwith his test 
subsystem and define 30G of buffer pools, he willquickly put my system in a 
wait state (assuming DB2 actually tried touse that storage)...
Again, we plan.If a SYSPROG doesn't know better, I don't want him on my 
account.Gone are the days where you ask: 'what would happen if I did this?'.If 
I really needed 30GB of storage I would put it into the box.THEN, I would 
define it.
We don't suddenly drop DB2 V8 (for example) into the environment, and say: 'Oh 
crap! We forgot about MEMLIST and IEFUSI!'.We say: “Let's change IEFUSI to 
allow DB2 to do what is required.IE: It's DB2. Salute, and let it enter.'

The DB2/CICS/WAS/ISV/etc. folks typically look at things from their 
ownperspective only.  Part of the job in my group is to be the gate keeper
Again, it's documented.We don't complain about the amount of resource (within 
reason).If the business needs it, it needs it.

As a capacity guy you should understand that because you have the 
sameresponsibilities to the health of the overall system
What if every authorized program / product felt they knew more andbypassed 
IEFUSI and just used whatever above the bar storage theywanted with no overall 
system control?...
Again, we don't blindly implement, do we?
My point was more of don't mess with it.Let it go through.Only, because it's 
documented and we understand it.If I inadvertently implied a blind 'the vendor 
said so, so it must be true', that is my error.
What I meant was, don't limit DB2, but make sure you know what the DBA's are 
doing.
I also meant that SYSPROG-types should not be applying arbitrary limits and 
impacting the business.
DB2 V8 can save a ton of money because of the cost of CPU (hardware  software) 
that has been consumed in V6  V7 to reduce the impact of the 2GB limit and the 
use of HIPERPOOLs.
Staple additional memory on the box, back out the unusual acts you had to 
perform to get around the 2GB limit.And, accept that IEFUSI has no effect with 
DB2.Don't mess with DB2's decisions.But, plan -- so it doesn't take you by 
surprise.Implement -- in chunks, in case something goes South.And, monitor.
But, don't impose arbitrary limits.SYSPROGs don't always 'know better'.
-teD

In God we Trust!
All others bring data!
 -- W. Edwards Deming

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: MEMLIMIT and IEFUSI

2005-10-28 Thread Ted MacNEIL
I don't know what happened this time.But, this looked like garbage (poorly 
formated on my BlackBerry), so I'm trying again with better formatting.If it 
came out better for everybody else, I'm sorry for the duplicate post.
Sorry to say Ted, but I think you've really missed the boat on this one

Possibly, but I don't think so.
I was probably over-reacting.We don't implement a 4TB system overnight.
We plan and understand (sometimes on both points)

If that system programmer is the DB2 sysprog that decided to playwith his test 
subsystem and define 30G of buffer pools, he willquickly put my system in a 
wait state (assuming DB2 actually tried touse that storage)...

Again, we plan.
If a SYSPROG doesn't know better, I don't want him on my account.
Gone are the days where you ask: 'what would happen if I did this?'.
If I really needed 30GB of storage I would put it into the box.
THEN, I would define it.
We don't suddenly drop DB2 V8 (for example) into the environment, and say: 'Oh 
crap! We forgot about MEMLIST and IEFUSI!'.
We say: “Let's change IEFUSI to allow DB2 to do what is required.
IE: It's DB2. Salute, and let it enter.'
The DB2/CICS/WAS/ISV/etc. folks typically look at things from their 
ownperspective only.  Part of the job in my group is to be the gate keeper

Again, it's documented.
We don't complain about the amount of resource (within reason).
If the business needs it, it needs it.

As a capacity guy you should understand that because you have the 
sameresponsibilities to the health of the overall system

What if every authorized program / product felt they knew more andbypassed 
IEFUSI and just used whatever above the bar storage theywanted with no overall 
system control?...

Again, we don't blindly implement, do we?
My point was more of don't mess with it.
Let it go through.
Only, because it's documented and we understand it.
If I inadvertently implied a blind 'the vendor said so, so it must be true', 
that is my error.
What I meant was, don't limit DB2, but make sure you know what the DBA's are 
doing.
I also meant that SYSPROG-types should not be applying arbitrary limits and 
impacting the business.DB2 V8 can save a ton of money because of the cost of 
CPU (hardware  software) that has been consumed in V6  V7 to reduce the 
impact of the 2GB limit and the use of HIPERPOOLs.
Staple additional memory on the box, back out the unusual acts you had to 
perform to get around the 2GB limit.
And, accept that IEFUSI has no effect with DB2.
Don't mess with DB2's decisions.
But, plan -- so it doesn't take you by surprise.
Implement -- in chunks, in case something goes South.
And, monitor.
But, don't impose arbitrary limits.
SYSPROGs don't always 'know better'.
-teD

In God we Trust!
All others bring data!
 -- W. Edwards Deming

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: MEMLIMIT and IEFUSI

2005-10-28 Thread Ted MacNEIL
I give up. Yet another reason to complain to RIM!

-teD

In God we Trust!
All others bring data!
 -- W. Edwards Deming

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ISPF WSA (Was: TN3270 Emulator)

2005-10-28 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on
10/28/2005
   at 07:17 AM, Phil Smith III [EMAIL PROTECTED] said:

And Kedit, which is a CMS XEDIT clone

No, it's missing key pieces of XEDIT.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: MEMLIMIT and IEFUSI

2005-10-28 Thread Edward E. Jaffe

Mark Zelden wrote:


If that system programmer is the DB2 sysprog that decided to play
with his test subsystem and define 30G of buffer pools, he will
quickly put my system in a wait state (assuming DB2 actually tried to
use that storage).

The DB2/CICS/WAS/ISV/etc. folks typically look at things from their own
perspective only.  Part of the job in my group is to be the gate keeper.
As a capacity guy you should understand that because you have the same
responsibilities to the health of the overall system.

What if every authorized program / product felt they knew more and
bypassed IEFUSI and just used whatever above the bar storage they
wanted with no overall system control?

I'd rather have the one DB2 subsystem or program abend than the
entire system in a wait state.
 



Hopefully, DB2 uses SYSEVENT STGTEST or similar service to help it 
intelligently use large virtual storage.


--
-
| Edward E. Jaffe||
| Mgr, Research  Development| [EMAIL PROTECTED]|
| Phoenix Software International | Tel: (310) 338-0400 x318   |
| 5200 W Century Blvd, Suite 800 | Fax: (310) 338-0801|
| Los Angeles, CA 90045  | http://www.phoenixsoftware.com |
- 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


3333 weight

2005-10-28 Thread William Donzelli
I am looking to find the weight of the old  Disk Storage Control box
(the head of string of 3330s). Anyone have and old site planning guide
with the data handy?

Thanks!

--
William Donzelli
[EMAIL PROTECTED] 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: MEMLIMIT and IEFUSI

2005-10-28 Thread ibm-main
From: Edward E. Jaffe

 Hopefully, DB2 uses SYSEVENT STGTEST or similar service to help it
 intelligently use large virtual storage.

Last time (a while ago) I looked at STGTEST, I seem to recall I wasn't
overly impressed.
Will have to see if I can find the code next week.

As for hoping that DB2 will take a {w}holistic view and intelligently use
virtual ... m
I'll have to wait till I can get hold of a Version 8 system to judge that.

Shane ...

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Ed Gould

On Oct 28, 2005, at 7:41 AM, Martin Kline wrote:


I apologize in advance for not knowing the best list to send this
question to.  (Perhaps ISPF-L?  But I'm not a subscriber there.)  I'm
proposing to our systems folks that we allow a user to use TSO to
get to the Zeke Work Center function.  I'm being told that there is 
no

way for us to limit what the user can do if we let them intoTSO.



Sounds like bullshirt to me. Any user with ATTRIBUTES=RESTRICTED will
require that _every function_ they need be explicitly authorized,
regardless of any existing UACC settings.


I find this interesting. Just recently, list members were objecting 
that

limiting a user's access to resources (in that case it was memory) was
probably keeping them from doing their job. Where are they now?

The argument was that if a user was requesting a resource, they MUST 
NEED
IT for their job. This seems like a very similar situation. Why not 
allow
the users access to all of ISPF, and depend on their honorable nature 
to

only use those functions that they need to do their job?



Martin,

One of the main objections I have to a common logon is that there is 
no accountability.


I would run the concept by the auditors.

Ed

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allowing Joe User into TSO

2005-10-28 Thread Ed Gould

On Oct 28, 2005, at 9:16 AM, Edward E. Jaffe wrote:





--SNIP
I suppose, if we could convince Mr. Peabody to use the Wayback Machine 
to take us to the meeting where RACF's moniker was invented, we could 
insist on a more-appropriate one, like PCF = Permissions Control 
Facility.   :-\

--


Already taken PCF = Program Control Facility.

Ed

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Time change this weekend.

2005-10-28 Thread John S. Giltner, Jr.
I'm not sure, but I think IDMS (we are 14.2) still can't handle moving 
back an hour so we need to leave it down.


Last year (2004) for the change to EDT we had an operator who thought 
they remembered how to change the time on the sysplex timers, ended up 
changing GMT time instead of the local offset.  We had to leave DB2 down 
for an hour when we changed it back.


I think if you use the oder NetView time commands instead of newer cron 
based ones it still needs to be bounced after the time change, both to 
and from EDT.




McGee, Cletus wrote:

I am new to this company here and one of the things they do is to shut
the system down on the fall time change and wait one hour before they
bring the system back up. Outside of scheduler issues, is there any
reason to do this? One that keeps coming up is the timestamp on VSAM
files being an issue. Some questions. One does anyone else do this and
if so why? Second, is there real reason why this should happen, if so
what are they?

Or are they just working off one bad past experience.

 

 


Thanks in advance.

 


***

Cletus McGee

Technical Services

(334) 394-3320

 


Have a grand day



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html