Re: Rent-a-phone

2006-08-13 Thread J R
I do the opposite; my phone works everywhere I need or want to go.  Since 
roaming fees are ridiculously expensive, if I'm going somewhere for long 
enough, I buy the cheapest SIM card when I get there.


I currently use a Canadian SIM and have a UK one in my wallet.



From: Phil Payne <[EMAIL PROTECTED]>
Reply-To: IBM Mainframe Discussion List 
To: IBM-MAIN@BAMA.UA.EDU
Subject: Rent-a-phone
Date: Sat, 12 Aug 2006 09:12:36 +0200

(Unless Darren is for some reason also filtering this thread - I've not 
seen an Administrivia

yet.)

GSM phones have the personality imposed by their SIM cards.  If you already 
have a GSM phone,
just take the SIM card with you in your wallet and shove it into the rental 
phone.  It then

"becomes" your phone  - your number, your normal billing.

All you need is a TN3270 emulator - several available free for download - 
and you can run TSO
sessions on the system back home anywhere you like.  My personal 
preferences are for IrDA

links followed by BlueTooth - I've never had much luck with cables.

--
  Phil Payne
  http://www.isham-research.co.uk
  +44 7833 654 800

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


_
On the road to retirement? Check out MSN Life Events for advice on how to 
get there! http://lifeevents.msn.com/category.aspx?cid=Retirement


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Rmm and BLP

2006-08-13 Thread Mike Wood
Mike, When you use BLP, RMM does still use the actual volser from the 
mounted volume for its processing. No matter what volser you code in your 
JCL, rmm checks both that volser against volumes in the CDS and also the 
mounted volume. If one of them matches an rmm managed volume you had 
better have the correct volser in JCL and mounted.
You could use EXPDT=98000 to have rmm 'ignore' this request.  You could 
also use the 'duplicate volume' support to define X00123 as a volume to 
RMM with an internal volser of 000123 and then do not need either BLP or 
EXPDT=98000.
If you use ignore processing you must be authorized to do that. See 
STGADMIN.EDG.IGNORE.TAPE. . . .  profiles in FACILITY class. See I&C uide 
for details.  The authorization is based on the MOUNTED volser by default, 
and whether we use RMM or NORMM in the authorization resource is based on 
what we find for THAT mounted volume.  You can use EDGUX100 to request the 
REQUESTED volume is used instead.

Mike Wood RMM Development
On Wed, 9 Aug 2006 13:40:13 -0400, Martin, Mike <[EMAIL PROTECTED]> 
wrote:

>All,
>
>We have production jobs that read tapes that come from outside our
>company. Because we cannot   
>predict what the internal tape volsers will be, our production jobs have
>been setup to use 
>BLP. (the volsers for these tapes may or may not match a volser in our  
>shop)   
>
>The following DD is an example of how we use BLP for a tape from an 
>outside source...   
>
>//DOTIN DD DSN=OUTSIDE.TAPE,  
>// VOL=SER=X00123,  
>// DISP=OLD,LABEL=(2,BLP),UNIT=TAPE,  
>// DCB=(RECFM=FB,BLKSIZE=4000,LRECL=50,DEN=3)   
>
>But when we run this job with rmm active (warning mode), rmm indicates
>that the tape   
>will be rejected... 
>
>EDG4048I VOLUME 000123 REJECTED. MOUNTED VOLUME DOES NOT EQUAL REQUESTED
>VOLUME  
>EDG4004I **WARNING** USE OF 000123 BY ABCR0254, STEP40, INTAPE ONLY
>PERMITTED BECAUSE DFSMSrmm RUNNING IN WARNING MODE  
>
>Apparently, the internal volser for the tape happens to match one of our
>tapes (that rmm has in the CDS).
>
>I understand the message and I am looking for a simple solution 
>so that the production jobs do not fail once we cutover to rmm. 
>
>I am looking for a painless solution. My preference is to avoid making
>any JCL  
>changes. (also, FYI we are using the supplied EDGUX100) 
>
>We are z/OS 1.4 
>
>Mike Martin   

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ISREDIT macro lexical puzzle

2006-08-13 Thread Shmuel Metz (Seymour J.)
In <[EMAIL PROTECTED]>, on 08/12/2006
   at 02:22 AM, Paul Gilmartin <[EMAIL PROTECTED]> said:

>In a file I have a line:

>  (&FOO,BAR)

>>From a Rexx macro, I issue the command, logged:

> 31 *-* 'CHANGE c''(&FOO,BAR)'' wombat ALL'
>>>>   "CHANGE c'(&FOO,BAR)' wombat ALL"
>+++ RC(4) +++

>... and nothing is changed.  If I paste the failed command from the
>message:

>CHANGE c'(&FOO,BAR)' wombat ALL

Don't confuse EDIT commands for the command line with EDIT commands
for the ISREDIT environement; they have different syntax. Read the
desciption of CHANGE in the EDIT macros text.


In <[EMAIL PROTECTED]>, on 08/12/2006
   at 02:41 AM, Paul Gilmartin <[EMAIL PROTECTED]> said:

>And what if I need to use both a literal ampersand and a symbol value
>in the same command.

You run with SCAN OFF and evaluate the symbol in REXX.

address ISREXEC CHANGE "C'replace" this"' C'with &&'"

Assuming that this equals "that", the above will replace "replace
that" with "with &". Note: not tested.

-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see  
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: the personal data theft pandemic continues

2006-08-13 Thread Shmuel Metz (Seymour J.)
In <[EMAIL PROTECTED]>, on
08/12/2006
   at 12:07 PM, Anton Britz <[EMAIL PROTECTED]> said:

>Note: Could this just be a reminder to all of us, why two wars in the
>Middle East are really neccessary ?

When the sponsorship of terrorism were coming from Iran, Saudi Arabia
and Syria, how was the invasion of Iraq neccessary? They were
sidelined.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see  
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Two TSO TRANSMIT (XMIT) questions

2006-08-13 Thread Ed. Benoit
Hello All,

The TSO Command Reference states the TRANSMIT command converts this data to a 
special format.
Questions:
(1)  Do this mean it converts it to binary or some special TSO format?
(2)  After downloading a transmitted dataset to the PC with no conversion 
(CRLF and ASCII/EBCDIC turned off), is there a software on the market to 
convert 
the dataset back to character form on the PC?  Something like the RECEIVE on 
the mainframe?  I am attempting to do this with a complete library PDS.


Ed. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Rent-a-phone

2006-08-13 Thread Barry Merrill
And if you think GSM roaming charges for talking are high,
take a look at GPRS data charges; last summer we were in
Irish cottages with no phone so we used GPRS to download
our email, until we received a 42 MegaByte video of our godson
Keller William's daughter dancing on the sands of Virginia Beach,
i.e., until I discovered the seemingly low data fee of .0192/KB
when roaming worked out to $19.20 per MegaByte, so I had
paid over $800.00 to see the dance!

Thereafter, I webmailed first and set aside any attachments
for download when no longer roaming on GPRS.

And, while the initial connection speed was always displayed 
to be 214.7 kilobits/sec, peak hour congestion on the GSM
phone system clearly takes precedence over GPRS data, and 
the effective transfer rate was often only tens of bytes per second
for extended periods.

Barry Merrill

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


SMP/E RESTORE Wish (was: Vendor JCL)

2006-08-13 Thread Paul Gilmartin
In a recent note, Arthur T. said:

> Date: Sat, 12 Aug 2006 01:57:34 -0400
> 
> On 11 Aug 2006 21:02:35 -0700, in bit.listserv.ibm-main
> (Message-ID:<[EMAIL PROTECTED]>)
> [EMAIL PROTECTED] (Robert A. Rosenberg) wrote:
> 
> >If I do the RESTORE the current way and back off 10
> >SYSMODS only to do the APPLY and apply 9 of them, why is
> >this "safer"/"more correct" than just doing a forward
> >APPLY of those element(s) of the backed-off SYSMOD that
> >were taken from the other 9 SYSMODs during the Apply step
> >that was done after the Restore?
> 
>   I've cursed SMP for the same reasons.  However, I can
> think of reasons that the current method is safer or more
> correct:
> 
> 1.  If you've Received Holddata between the Apply and
> Restore, it may be that one of those other Sysmods is PEd,
> SUPed, or some such.
> 
Hmmm.  Is there still an exposure?  Suppose I APPLY and ACCEPT
PTF A.  Then I APPLY PTF B.  Subsequently, I RECEIVE HOLDDATA
which declares A PE; resolved by B.  Do I get any warning if
I then RESTORE B?  This is introducing a situation in which
there's an unresolved HOLD ERROR.  Ideally, the programmer should
be required to RESTORE BYPASS( HOLDERR ) to perform this
operation, but RESTORE has no such operand value.

> 2.  If any of the 10 had JCLIN, things could get
> tricky.  Especially tricky if the one you're Restoring had JCLIN.
> 
It's too bad about JCLIN.  I often wish that JCLIN were a proper
element, with its own FMID and RMID, and that LMOD subentries were
not cumulative, so that replacing the JCLIN for a Link step with
JCLIN having fewer INCLUDE statements would remove the LMOD
subentries corresponding to MODs in the removed INCLUDEs, and
rebuild the load modules acccordingly.

But, simply, if JCLIN consisted of elements, one for each LMOD,
with RMIDs, RESTORE should simply revert to the JCLIN at the
earlier RMID.

>   Also, IBM has limited resources for SMP
> enhancements.  I suspect it would be easier to code SMP to
> Restore all 10, then automatically re-Apply the other
> 9.  (Or, at least, automatically create the control cards
> for doing so.)

That would be useful.

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: the personal data theft pandemic continues

2006-08-13 Thread Anne & Lynn Wheeler

ref:
http://www.garlic.com/~lynn/2006o.html#35 the personal data theft 
pandemic continues
http://www.garlic.com/~lynn/2006o.html#38 the personal data theft 
pandemic continues


for some additional drift related to being able to harvest personal
information and whether or not it represents a vulnerability, risk,
threat, and/or fraud potential.

here is a lot of past postings on account number harvesting
http://www.garlic.com/~lynn/subpubkey.html#harvest

and even more posts on general fraud
http://www.garlic.com/~lynn/subpubkey.html#fraud

... basically being able to harvest (static) information and perform
fraudulent activities ... frequently as some form of replay-attack.

x9.59 included countermeasure to simple replay-attack ... i.e. simple
skimming/harvesting of readily available information and using it for
fraudulent transactions
http://www.garlic.com/~lynn/x959.html#x959
http://www.garlic.com/~lynn/subpubkey.html#x959

another example is the recent news articles about cloning e-passport chips
http://www.garlic.com/~lynn/aadsm25.htm#9 DDA cards may address the UK 
Chip&Pin woes

http://www.garlic.com/~lynn/aadsm25.htm#11 And another cloning tale

where there have been subsequent comments that e-passport cloning
doesn't represent a vulnerability (i.e. personal information may be
captured, but it supposedly isn't subject to exploits).

this is somewhat in light of recent items about similar cloning of
financial payment chip cards ... and "yes card" vulnerability

first a quicky comment about 3-factor authentication model
http://www.garlic.com/~lynn/subpubkey.html#3factor

* something you have
* something you know
* something you are

in the "yes card" vulnerability, the chip card represented "something
you have" authentication. it contained static information that is very
similar to what is found on a magstripe ... and the chip is
vulnerable to some of the same techniques used to harvest magstripe
information. then a counterfeit "yes card" chip card is built in
manner similar to creating a counterfeit magstripe card. presenting a
supposedly valid card is then a form of "something you have"
authentication.

supposedly the e-passport can be considered a form of electronic
surrogate passport. there can be a digital image, a name and a
passport number ... supposedly all protected from modification by some
form of cryptographic technique or secure hash.

if the threat model is the stealing and use of electronic passport
then the e-passport is a failure ... since it is easier to copy/steal
the e-passport information (compared to physical passport). furthermore,
the theft of a physical passport is frequently noticed and reported
... while the "theft" of e-passport may not even be noticed.

however, the e-passport does provide a countermeasure to modification
threat model (i.e. altering information/picture on valid passport
and/or creating purely counterfeit passport with false information).

the lack of vulnerability, somewhat supposes that there is a (trusted)
human in the loop that reads the electronic information, looks at the 
digital picture and compares it against the person standing in front of 
them (basically a form of "something you are" or biometric

authentication).

the issue with the "yes card", was that the card represented purely
"something you have" authentication (whoever possesses the object is 
authenticated). it does require a PIN ("something you know" 
authentication) for supposedly multi-factor authentication

and as a countermeasure to lost/stolen cards.

however, a fault in the "yes card" scenario was that the terminal
would authenticate the (potentially counterfeit) card (with static
data vulnerable to replay attacks) and then asked the card if the
correct PIN was entered. the counterfeit "yes cards" were programmed
to always respond "YES", that the correct pin was entered. Slight
additional digression on "yes card" and multi-factor authentication,
supposedly multi-factor authentication is considered more secure based
on the different authentication factors having independent threats and
vulnerabilities (which isn't valid if they have common threat/attack).

supposedly the countermeasure to the "yes card" "replay attack"
exploit (using static data authentication) is to convert to dynamic
data authentication (DDA; i.e. changes on every use). However, there
may still be a man-in-the-middle vulnerability (MITM-attack)
http://www.garlic.com/~lynn/subpubkey.html#mitm

where a counterfeit "yes card" is paired with some valid card, the
counterfeit "yes card" transparently passes the authentication
operation to a valid card ... but then takes control of the remaining
interactions. as an aside, this somewhat was the motivation for the
"naked transaction" thread mentioned earlier (i.e. straight forward
"something you have" card authentication separate from the actual
transactions and business processes opening gaps for MITM-attacks).

a few recent posts discussing "yes card" vulnerability, c

Re: Two TSO TRANSMIT (XMIT) questions

2006-08-13 Thread Ed Finnell
 
In a message dated 8/13/2006 11:14:43 A.M. Central Standard Time,  
[EMAIL PROTECTED] writes:

Do this  mean it converts it to binary or some special TSO format?
(2)  After  downloading a transmitted dataset to the PC with no conversion 
(CRLF and  ASCII/EBCDIC turned off), is there a software on the market to 
convert 
the  dataset back to character form on the PC?  Something like the RECEIVE on 
 
the mainframe?  I am attempting to do this with a complete library  PDS.




>>
Guess the CBT guys are probably in transit. The format is documented in the  
TSO User Guide. It's a special version of IEBCOPY unload with headers 
intermixed  with data. It's also FB 80/3120.
 
The CBT tape has an XMIT manager(v.3) that can extract files from
a host produced .xmi file. _www.cbttape.org_ (http://www.cbttape.org) 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Two TSO TRANSMIT (XMIT) questions

2006-08-13 Thread Paul Gilmartin
In a recent note, Ed. Benoit said:

> Date: Sun, 13 Aug 2006 12:14:15 EDT
> 
> The TSO Command Reference states the TRANSMIT command converts this data to a
> special format.
> Questions:
> (1)  Do this mean it converts it to binary or some special TSO format?
> 
Both.  It contains nondisplayable characters, so "binary" is appropriate,
and it's sui generis.  Interactive Data Transmission Format is closely
based on 80-character punched card images.  IDTF may have originated
on CMS, so "special TSO" may not be apropriate.

> (2)  After downloading a transmitted dataset to the PC with no conversion
> (CRLF and ASCII/EBCDIC turned off), is there a software on the market to 
> convert
> the dataset back to character form on the PC?  Something like the RECEIVE on
> the mainframe?  I am attempting to do this with a complete library PDS.
> 
See, e.g.:

File that you are currently viewing
   Linkname: Planet MVS :: Home of the Dinosaurs
URL: http://planetmvs.com/

Link that you currently have selected
   Linkname: UnXMIT information exchange
URL: http://planetmvs.com/unxmit/index.html

Disclamer:  I haven't tried it.

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Vendor JCL (was: WHY IS JCL ALLERGIC ... )

2006-08-13 Thread Rick Fochtman
Been There, Done That, Got The . . . Subsystem?  Starship?  Solid State?
Schutzstaffeln?



Jon




BTDTGTSS



Been There, Done That, Got T-Shirt & Scars

---
[This E-mail has been scanned for viruses by the YourNet Connection Virus 
system]
[For more information, please go to http://www.ync.net/YourMAIL]

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Two TSO TRANSMIT (XMIT) questions

2006-08-13 Thread Dave Salt

From: "Ed. Benoit" <[EMAIL PROTECTED]>
After downloading a transmitted dataset to the PC with no conversion
(CRLF and ASCII/EBCDIC turned off), is there a software on the market to 
convert
the dataset back to character form on the PC?  Something like the RECEIVE 
on

the mainframe?  I am attempting to do this with a complete library PDS.



Download XMIT manager to your PC. It's free, and it's very good. Here's the 
link:


http://www.cbttape.org/njw/

Dave Salt
SimpList(tm) - The easiest, most powerful way to surf a mainframe!
http://www.mackinney.com/products/SIM/simplist.htm

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Two TSO TRANSMIT (XMIT) questions

2006-08-13 Thread Ed. Benoit
Dave,
I have downloaded the XMIT Manager v.3.  But I cannot seams to find 
instructions on how to use it.  Are there any documentation.  Non of the 
downloaded 
members give instructions.

Ed. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Two TSO TRANSMIT (XMIT) questions

2006-08-13 Thread J R

Double click on the zip file that you downloaded.

Double click on setup.exe to install XMITmanager.

Double click on any .xmi file (i.e. a XMIT dataset that you have downloaded 
to your PC).


Things should be intuitive from there on.



From: "Ed. Benoit" <[EMAIL PROTECTED]>
Reply-To: IBM Mainframe Discussion List 
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Two TSO TRANSMIT (XMIT) questions
Date: Sun, 13 Aug 2006 16:43:03 EDT

Dave,
I have downloaded the XMIT Manager v.3.  But I cannot seams to find
instructions on how to use it.  Are there any documentation.  Non of the 
downloaded

members give instructions.

Ed.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


_
Express yourself instantly with MSN Messenger! Download today - it's FREE! 
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Vendor JCL (was: WHY IS JCL ALLERGIC ... )

2006-08-13 Thread Robert A. Rosenberg
At 01:57 -0400 on 08/12/2006, Arthur T. wrote about Re: Vendor JCL 
(was: WHY IS JCL ALLERGIC ... ):


On 11 Aug 2006 21:02:35 -0700, in bit.listserv.ibm-main 
(Message-ID:<[EMAIL PROTECTED]>) 
[EMAIL PROTECTED] (Robert A. Rosenberg) wrote:


If I do the RESTORE the current way and back off 10 SYSMODS only to 
do the APPLY and apply 9 of them, why is this "safer"/"more 
correct" than just doing a forward APPLY of those element(s) of the 
backed-off SYSMOD that were taken from the other 9 SYSMODs during 
the Apply step that was done after the Restore?


 I've cursed SMP for the same reasons.  However, I can think of 
reasons that the current method is safer or more correct:


1.  If you've Received Holddata between the Apply and Restore, it 
may be that one of those other Sysmods is PEd, SUPed, or some such.


See my reply to point 3 below. I do not think that it is hard to do a 
scan to see if Holddata issued AFTER the date of the APPLY would have 
blocked the APPLY (I think that the date of the APPLY is stored in 
the element's entry as well as each HOLDDATA entry having a similar 
"issued" date).




2.  If any of the 10 had JCLIN, things could get tricky.  Especially 
tricky if the one you're Restoring had JCLIN.


ONLY if the To-be-Restored SYSMOD has JCLIN (or is PRE'ed by another 
SYSMOD with JCLIN). Note that my method automatically merges an 
SYSMODs that PRE the named SYSMODs and treats them as if they were 
listed in the SELECT clause. So long as the SYSMODs to be backed off 
have no JCLIN, there is no problem since any LMODs get created the 
same (just possibly with earlier versions of the backed off elements).




3.  SMP won't know if you did any BYPASSes when Applying.  If you 
had, things could get tricky.  Better that a person do trickiness 
than trusting it to SMP.


I am only addressing what I perceive as a basic design flaw in the 
original implementation. To avoid the potential problems you list, 
I'd agree to a RESTORE CHECK option - ie: Do the Restore as a Check 
followed by an under-the-covers APPLY CHECK suppressing the SELECTED 
SYSMODs to see if the result is the same as just backing off the 
relevant elements. The result is a report that says either that just 
"Forward APPLY'ing" (ie: Doing an APPLY only with prior versions of 
the elements in the SYSMODs) will result in the same state as the 
current RESTORE/APPLY process would or that one or more SYSMODs will 
not go on (probably due to newer HOLDS) and list the reasons (similar 
to the current APPLY CHECK BYPASS report).




 Also, IBM has limited resources for SMP enhancements.  I 
suspect it would be easier to code SMP to Restore all 10, then 
automatically re-Apply the other 9.  (Or, at least, automatically 
create the control cards for doing so.)


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Two TSO TRANSMIT (XMIT) questions

2006-08-13 Thread Ed. Benoit
Thanks to all for the help.  I have downloaded and installed the xmit manager.
Thanks again.  I love this email list.

Ed.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SHOWzOS V713

2006-08-13 Thread Schiradin,Roland HG-Dir itb-db/dc
http://www.cbttape.org/updates.htm

FILE#492. Do not use the pre-load stuff in FILE#614 (same URL)
as this is based on an early beta and might abend in some cases. 
FILE#492 contains these fixes. 

Roland


-Original Message-
From: IBM Mainframe Discussion List 
[mailto:[EMAIL PROTECTED] On Behalf Of Hal Merritt
Sent: Friday, August 11, 2006 3:58 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: SHOWzOS V713


I am a little confused. Where should I go to get V713? 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Two TSO TRANSMIT (XMIT) questions

2006-08-13 Thread Ed Finnell
 
In a message dated 8/13/2006 6:16:46 P.M. Central Standard Time,  
[EMAIL PROTECTED] writes:

Thanks  to all for the help.  I have downloaded and installed the xmit  
manager.
Thanks again.  I love this email  list.




>>
 Just celebrated the 20th anniversary back in June. Most of the time  it's a 
pretty good place to get useful information. I'm still laughing at Barry  
Merrill's roaming charge experience...Have a good one.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Why HSM does not migrate to primary?

2006-08-13 Thread Tommy Tsui
Hi all,
Anyone know why I set the management class attributes "primary days
non-usage"   to  "0" but all datasets does not move to primary disk after
primary management started.

Migration Attributes
  Primary Days Non-usage  . . . . 0   (0 to  or blank)
  Level 1 Days Non-usage  . . . . 4   (0 to , NOLIMIT or blank)
  Command or Auto Migrate . . . . BOTH(BOTH, COMMAND or NONE)

thanks

Tommy



*** 
This message contains confidential information which is intended only for the 
person or entity to which it is addressed.  If you are not the intended 
recipient, you should not read, disseminate, distribute or copy this e-mail.  
Any opinion contained in this message are those of the author and are not given 
or endorsed by BOCHK unless otherwise stated in this message and the authority 
of the author to so bind BOCHK is duly verified.  We do not guarantee that this 
e-mail is virus-free or secure and are not liable in respect of any delay or 
omission in the transmission of this message.
***

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why HSM does not migrate to primary?

2006-08-13 Thread Richards.Bob
I assume you mean primary to ML1.

In the applicable storage group, is AUTO MIGRATE set to YES? 

What are the Migrate High and Migrate Low threshold values set to and
were those values reached?

Bob Richards 



-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Tommy Tsui
Sent: Sunday, August 13, 2006 11:26 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Why HSM does not migrate to primary?

Hi all,
Anyone know why I set the management class attributes "primary days
non-usage"   to  "0" but all datasets does not move to primary disk
after
primary management started.

Migration Attributes
  Primary Days Non-usage  . . . . 0   (0 to  or blank)
  Level 1 Days Non-usage  . . . . 4   (0 to , NOLIMIT or
blank)
  Command or Auto Migrate . . . . BOTH(BOTH, COMMAND or NONE)

thanks

Tommy



*** 
This message contains confidential information which is intended only
for the person or entity to which it is addressed.  If you are not the
intended recipient, you should not read, disseminate, distribute or copy
this e-mail.  Any opinion contained in this message are those of the
author and are not given or endorsed by BOCHK unless otherwise stated in
this message and the authority of the author to so bind BOCHK is duly
verified.  We do not guarantee that this e-mail is virus-free or secure
and are not liable in respect of any delay or omission in the
transmission of this message.
***

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html 
  
  
  
LEGAL DISCLAIMER 
The information transmitted is intended solely for the individual or entity to 
which it is addressed and may contain confidential and/or privileged material. 
Any review, retransmission, dissemination or other use of or taking action in 
reliance upon this information by persons or entities other than the intended 
recipient is prohibited. If you have received this email in error please 
contact the sender and delete the material from any computer. 
  
Seeing Beyond Money is a service mark of SunTrust Banks, Inc. 
[ST:XCL] 
 
 
 
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why HSM does not migrate to primary?

2006-08-13 Thread George Davis
Tommy Tsui, on Sunday, August 13, 2006 at 11:26 PM wrote:
>
>Anyone know why I set the management class attributes "primary days
>non-usage"   to  "0" but all datasets does not move to primary disk after
>primary management started.
>
>Migration Attributes
>  Primary Days Non-usage  . . . . 0   (0 to  or blank)
>  Level 1 Days Non-usage  . . . . 4   (0 to , NOLIMIT or blank)
>  Command or Auto Migrate . . . . BOTH(BOTH, COMMAND or NONE)

My guess is that the utilization for the pool was below the threshold, or
the low threshold was achieved before this dataset was migrated.  Since
DFSMShsm does a pretty good job of keeping datasets on the quickest devices,
it will only migrate data if it has to.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


how to use "ADRDSSU" to copy multiple volume dataset to other DASDs

2006-08-13 Thread Tommy Tsui






 Hi all,
 Anyone know how to use "ADRDSSU" to copy a multiple volumes datasets to
 other new DASDs  if the single dataset size over 9000 CYLS and spans into  
 3 volumes. How to copy it to other volumes use ADRDSSU?

 * I try to use the following way and it works but use a huge EXCP to   
 finish because flashcopy is deactiviated   
 //DFDSS   EXEC PGM=ADRDSSU,REGION=4096K
 //SYSPRINT DD  SYSOUT=*
 //OUTDDDD  UNIT=(SYSDA,2),VOL=SER=(IBAE02,IBAF02),DISP=OLD 
 //SYSIN DD *   
   COPY   OUTDYNAM((IBAE02),(IBAF02)) - 
   DATASET(INCLUDE(  -  
IPOSYS,SMFDUMPW-
 ))-
   REPLACE -
   ALLDATA(*) - 
   RENAMEU((IPOSYS.SMFDUMPW , IPOSYS.SMFDUMPW.BK1)) 

 any other recommendation?  

 * the reasion is that I try to copy a SMFLOG to other DASDs (flashcopy)
 instead of backup to tape immediately (hold resource), as you know CICS
 trace takes a lots of SMF log otherwise SMF data may lost or buffer may
 full soon. 

 * assume all volumes located at the same ESS DASD CU.  


 regards
 Tommy  












*** 
This message contains confidential information which is intended only for the 
person or entity to which it is addressed.  If you are not the intended 
recipient, you should not read, disseminate, distribute or copy this e-mail.  
Any opinion contained in this message are those of the author and are not given 
or endorsed by BOCHK unless otherwise stated in this message and the authority 
of the author to so bind BOCHK is duly verified.  We do not guarantee that this 
e-mail is virus-free or secure and are not liable in respect of any delay or 
omission in the transmission of this message.
***

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


回信: Re: Why HSM does not migrate to primary?

2006-08-13 Thread Tommy Tsui
Hi
It works after I set the following parms ...thanks a lots
Auto Migrate . . Y  (Y, N, I or P)
Allocation/migration Threshold: High . . 60  (1-99)  Low  . . 10
(0-99)

regards
Tommy




*** 
This message contains confidential information which is intended only for the 
person or entity to which it is addressed.  If you are not the intended 
recipient, you should not read, disseminate, distribute or copy this e-mail.  
Any opinion contained in this message are those of the author and are not given 
or endorsed by BOCHK unless otherwise stated in this message and the authority 
of the author to so bind BOCHK is duly verified.  We do not guarantee that this 
e-mail is virus-free or secure and are not liable in respect of any delay or 
omission in the transmission of this message.
***

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: New POO

2006-08-13 Thread Hunkeler Peter (KIUB 34)
>BookManager search entine was far and away the best.  
>If anyone can point me to the last version of BookManager 
>Read, I'd be grateful.

Do you happen to have an OS/390 CD Collection around? These
have the old Library Reader on the first disk.

Peter Hunkeler
CREDIT SUISSE

Help me improve my English. Corrections are very welcome.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html