Re: Disposition of Log data in ISPF Panel
On Wed, 14 Feb 2007 12:28:28 +0530 Jacky Bright [EMAIL PROTECTED] wrote: :I want to force all my TSO users to keep TSO Log dataset so that activities :carried out by all TSO users can be recorded. What activities? :AS of now all users are able to delete the datasets while logging off from :the system. Also during the run. The also can turn off logging. :How to configure this ? What data are you truly trying to collect? -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
How to delete structure from disconnected CF?
Hello, I ran into an interesting situation: I have a structure in a disconnected CF and cannot delete it nor remove it from the administration. All structures except the IXC Signalling structure were moved to another CF and the CF lpar was inactivated. The CFRM policy was updated and a new IXC Signalling structure was allocated. So far so good, except that I have the old structure in the Pending Deallocation status. The SETXCF Force command tells me that it will only process the command if it or another system can connect to the CF. In this case I can still activate the CF lpar to deallocate the structure, but I am more interested in the situation when this were not possible anymore. How do I clean up the Structure administration then, apart from a cold sysplex start by formatting new CFRM Couple Datasets? Kees. ** For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Sorting SMF records
Hello all, need to sort a month of SMF data excluding specific LPAR's and one type of SMF record. With IFASMFDP I can filter out the SMF records, not however, the LPAR's I want excluded. Would anyone have any DFSORT / ICETOOL JCL handy? TIA and regards, J. John Cassidy (Dipl.-Ingr.) Berninastrasse 9 8057 Zuerich Europe -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
On Tue, 2007-02-13 at 23:20 -0500, Ed Finnell wrote: Wonder if it's correlated to today's announcements? Limited to locales close to North America only fella ... What about the rest of us ???. Shane ... -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How to delete structure from disconnected CF
Kees, as far as I know, you don't. About two years back we were in a similar situation. We had to get rid of the second CF in the sandbox sysplex, and I ended up with a sysplex CFRM coldstart. (Despite IBM saying 'Who cares there are structures in pending deallocate state'). The IBM opinion at that time was that there had been a mistake in defining the CFRM policy and activating it, and unless I could either reproduce the problem or produce the joblogs/jcl of the run that defined the administrative policy (which of course was gone as that had been several months earlier), it would be considered a user error. So I guess you either have to reactivate the CF to get rid of the structure, live with it indefinitely in a pending deallocate state or cold start CFRM. Regards, Barbara -- Der GMX SmartSurfer hilft bis zu 70% Ihrer Onlinekosten zu sparen! Ideal für Modem und ISDN: http://www.gmx.net/de/go/smartsurfer -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Compulsory accounting
Hello list, which is the easiest method to make the accounting info in the jobcard compulsory ? JES2 exit 6 ? RACF ? SMF exit ? Walter Marguccio z/OS Systems Programmer Munich - Germany -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How to delete structure from disconnected CF
On Wed, 2007-02-14 at 11:09 +0100, Barbara Nitz wrote: as far as I know, you don't. Well, welcome back Barbara. Allow me to concur. Last CEC upgrade (to new series processor) we had was done in place. Meant bringing down a CF, moving everything out to DR, letting the CEs do their bit, define new, and move everything into the new box. Same serial number. For contingency I had defined a new CF so things could be set up in advance. Subsequently, the third CF ghost was always with us until the 'plex was finally dismantled completely. Learn to live with it Kees. Shane ... -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Compulsory accounting
Walter Marguccio [EMAIL PROTECTED] wrote in message news:[EMAIL PROTECTED]... Hello list, which is the easiest method to make the accounting info in the jobcard compulsory ? JES2 exit 6 ? RACF ? SMF exit ? Much simpler: In JES2PARM: JOBCLASS(*) ACCT=YES ACCT=Yes|No Specifies whether an account number is required (Yes) or not required (No) on a JCL JOB statement. Kees. ** For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Disposition of Log data in ISPF Panel
Like deletion of TSO datasets. Issuing TSO commands etc. These activities are recorded in log dataset when user logs off from the system dataset name like user.SPFLOG1.LIST When user logs off user gets following option 1. Print data set and delete 2. Delete data set without printing 3. Keep data set - Same (allocate same data set in next session) 4. Keep data set - New (allocate new data set in next session) I want to disable 1 , 2 and 4 option. JAcky On 2/14/07, Binyamin Dissen [EMAIL PROTECTED] wrote: On Wed, 14 Feb 2007 12:28:28 +0530 Jacky Bright [EMAIL PROTECTED] wrote: :I want to force all my TSO users to keep TSO Log dataset so that activities :carried out by all TSO users can be recorded. What activities? :AS of now all users are able to delete the datasets while logging off from :the system. Also during the run. The also can turn off logging. :How to configure this ? What data are you truly trying to collect? -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Compulsory accounting
On Wed, 14 Feb 2007 02:28:34 -0800 Walter Marguccio [EMAIL PROTECTED] wrote: :which is the easiest method to make the accounting info in the jobcard :compulsory ? JES2 exit 6 ? RACF ? SMF exit ? The presence or validation? A C/I parm can set it to required. -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
Shane, From IBM's own web-site; zIIP is designed to help free-up general computing capacity and lower software costs for select workloads such as business intelligence (BI), ERP and CRM on the mainframe. IBM will not impose software charges on zIIP capacity1. Wonder why you believe that select workloads should be limited to DB2 only applications? If IBM had wanted the zIIP's to only be for DB2, they probably would not have allowed the interface to leave IBM. Russell Witt CA-1 Level-2 Support Manager From: Shane Ginnane [EMAIL PROTECTED] Date: 2007/02/13 Tue PM 06:10:11 CST To: IBM-MAIN@BAMA.UA.EDU Subject: CA and zIIPs Had to happen I suppose - zIIP(s) as utility engines, rather than just DB2 engines. http://www3.ca.com/press/PressRelease.aspx?CID=99107 Shane ... -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Disposition of Log data in ISPF Panel
On Wed, 14 Feb 2007 17:16:59 +0530 Jacky Bright [EMAIL PROTECTED] wrote: :Like deletion of TSO datasets. Issuing TSO commands etc. The former is easily handled by checking SMF. As to the latter - They might be recordable in SMF as well. But - why? Which commands are you interested in? What are special about them? :These activities are recorded in log dataset when user logs off from the :system :dataset name like user.SPFLOG1.LIST :When user logs off user gets following option : 1. Print data set and delete : 2. Delete data set without printing : 3. Keep data set - Same :(allocate same data set in next session) : 4. Keep data set - New :(allocate new data set in next session) :I want to disable 1 , 2 and 4 option. It also can be easily removed by issuing the LOG DELETE command. And, of course, there is settings. Also, it can easily be altered to produce whatever one wants it to contain. It is not intended for the use you wish to make of it. You have to think of what you truly wish to do, and why. As a side point - you can use ISPF exits to track much of this. But as ISPF is a problem state program, it is quite easy to spoof the exits. :On 2/14/07, Binyamin Dissen [EMAIL PROTECTED] wrote: : On Wed, 14 Feb 2007 12:28:28 +0530 Jacky Bright [EMAIL PROTECTED] : wrote: : :I want to force all my TSO users to keep TSO Log dataset so that : activities : :carried out by all TSO users can be recorded. : What activities? : :AS of now all users are able to delete the datasets while logging off : from : :the system. : Also during the run. : The also can turn off logging. : :How to configure this ? : What data are you truly trying to collect? -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
Don't know about the rest of the 'stuff' in the announcement, but the DB2 Detector item doesn't really mean a whole lot, I don't think. Detector gets it's data by hooking the SQL PC's. I would think that that means the Detector code has no choice but to run on whatever processor the operating system has chosen for the SQL statement. There may be more to this, but I think that part of the announcement is just stating the obvious. --Dave - Original Message - From: Shane Ginnane [EMAIL PROTECTED] Newsgroups: bit.listserv.ibm-main To: IBM-MAIN@BAMA.UA.EDU Sent: Tuesday, February 13, 2007 6:10 PM Subject: CA and zIIPs Had to happen I suppose - zIIP(s) as utility engines, rather than just DB2 engines. http://www3.ca.com/press/PressRelease.aspx?CID=99107 Shane ... -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ps dataset
Paul: Arthur is correct. If you delete a dataset then ask for the same allocation, the system will find the best fit which is usually the space you just deleted so you will get the same space. If you ONLY do an allocation like an IEFBR14 and do not open it for output, you will not get the eof record, consequently access methods will read the data just fine assuming blocksize etc, are correct. The field name in the F1 dscb is DS1LSTAR and is the last block pointer. Bill From: Arthur T. [EMAIL PROTECTED] Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU To: IBM-MAIN@BAMA.UA.EDU Subject: Re: ps dataset Date: Tue, 13 Feb 2007 22:45:42 -0500 On 13 Feb 2007 19:28:48 -0800, in bit.listserv.ibm-main (Message-ID:[EMAIL PROTECTED]) [EMAIL PROTECTED] (Paul Jodlowski) wrote: I have a wierd problem, a programmer runs a job that creates a dsn (tst.report) then he ftp's it down to a server and then uncat/deletes it. Later on he runs the job again expecting the dsn (tst.report) to be empty. AND IT SHOULD BE. Well it's not in fact it has the same data as the first run. I go to 3.4 screen an try to browse the dataset but it says it is empty. I even ran a IEBGENER and i showed the data (of cource we DID NOT run the uncat/delete step) This is all done on the same volume (userb4) and it is NOT sms-managed. In fact We don't HAVE any SMS-managed data sets. We are running of z/os v1r7. I've hit this, before. This feature goes 'way back. I first hit some variation of it more than 25 years back. It's caused when the new allocation is in the same exact spot as the old (deleted) allocation was. This is not rare enough. Some programs (such as ISPF's 3.4) notice that the VTOC's pointer to the last record (I forget its name, but it ends with STAR) is zero. No records means an empty dataset, therefore it won't show any data. Most other programs (such as IEBGENER) will read until it hits an EOF. If you did have this under SMS management, you wouldn't have the problem. When the system allocates a PS dataset on SMS dasd, it immediately writes an EOF. You can see recent threads for details on exactly when this does and doesn't happen. -- I cannot receive mail at the address this was sent from. To reply directly, send to ar23hur at intergate dot com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html _ FREE online classifieds from Windows Live Expo buy and sell with people you know http://clk.atdmt.com/MSN/go/msnnkwex001001msn/direct/01/?href=http://expo.live.com?s_cid=Hotmail_tagline_12/06 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Compulsory accounting
From: Binyamin Dissen [EMAIL PROTECTED] The presence or validation? A C/I parm can set it to required. Binyamin, the first thing they're asking here is a way to force people to code accounting info into their JCL. To accomplish such no accont info, then jcl error request, what Kees mentioned is enough. Maybe at some point we will have the need to check or validate if the accounting info follows certain rules, i.e. typing anything like 12345 is not allowed, it must be DEPTA789. Where do you set such C/I parm as required ? Walter Marguccio z/OS Systems Programmer Munich - Germany -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
SHARE Forecast
National Weather Service Zone Forecast Hillsborough 436 AM EST WED FEB 14 2007 corrected for thursday night winds TODAY Patchy fog early in the morning...then sunny. Highs around 70 around tampa bay and 73 to 78 east and south of tampa bay. southwest winds around 10 mph becoming west 10 to 20 mph with higher gusts by late morning. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SHARE Forecast
It's amazing how much Americans do care about weather forecasts. It seems to be national hobby. g Disclaimer: It's obviously as off topic as whole thread. -- Radoslaw Skorupka Lodz, Poland John P Kalinich wrote: National Weather Service Zone Forecast Hillsborough 436 AM EST WED FEB 14 2007 corrected for thursday night winds TODAY Patchy fog early in the morning...then sunny. Highs around 70 around tampa bay and 73 to 78 east and south of tampa bay. southwest winds around 10 mph becoming west 10 to 20 mph with higher gusts by late morning. -- BRE Bank SA ul. Senatorska 18 00-950 Warszawa www.brebank.pl Sd Rejonowy dla m. st. Warszawy XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, nr rejestru przedsibiorców KRS 025237 NIP: 526-021-50-88 Wedug stanu na dzie 01.01.2007 r. kapita zakadowy BRE Banku SA (w caoci opacony) wynosi 118.064.140 z. W zwizku z realizacj warunkowego podwyszenia kapitau zakadowego, na podstawie uchwa XVI WZ z dnia 21.05.2003 r., kapita zakadowy BRE Banku SA moe ulec podwyszeniu do kwoty 118.760.528 z. Akcje w podwyszonym kapitale zakadowym bd w caoci opacone. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Compulsory accounting
On Wed, 14 Feb 2007 04:51:45 -0800 Walter Marguccio [EMAIL PROTECTED] wrote: :From: Binyamin Dissen [EMAIL PROTECTED] : The presence or validation? : A C/I parm can set it to required. :the first thing they're asking here is a way to force people to code accounting info into their JCL. :To accomplish such no accont info, then jcl error request, what Kees mentioned is enough. :Maybe at some point we will have the need to check or validate if the accounting info follows :certain rules, i.e. typing anything like 12345 is not allowed, it must be DEPTA789. : :Where do you set such C/I parm as required ? JES2 - the JOBCLASS statement. JES3 - the CIPARM statement. -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SHARE Forecast
Detroit, MI Intermittent snow showers and windy. Blowing and drifting snow. High 17; wind makes it feel colder. Winds N at 20 to 30 mph. Chance of snow 70%. where are you Calgon? Beam me up Scotty, John P Kalinich [EMAIL PROTECTED] Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU 02/14/2007 07:56 AM Please respond to IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU To IBM-MAIN@BAMA.UA.EDU cc Subject SHARE Forecast National Weather Service Zone Forecast Hillsborough 436 AM EST WED FEB 14 2007 corrected for thursday night winds TODAY Patchy fog early in the morning...then sunny. Highs around 70 around tampa bay and 73 to 78 east and south of tampa bay. southwest winds around 10 mph becoming west 10 to 20 mph with higher gusts by late morning. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
ENQ management
Can anyone suggest how one could provide functions similar to CA-MIM's resource conflict notification and job requeueing without too much programming efforts? Thanks in advance. Staffan -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Compulsory accounting
- Original Message From: Binyamin Dissen [EMAIL PROTECTED] JES2 - the JOBCLASS statement. JES3 - the CIPARM statement. I have misunderstood your question, since Kees already answered. I did try the $TJOBCLASS(5),ACCT=Y and it works. Thanks. Walter Marguccio z/OS Systems Programmer Munich - Germany -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
-Original Message- From: IBM Mainframe Discussion List On Behalf Of Shane Ginnane Had to happen I suppose - zIIP(s) as utility engines, rather than just DB2 engines. http://www3.ca.com/press/PressRelease.aspx?CID=99107 Hmmm Doesn't say one way or the other whether presence and use of zIIPs will affect software licensing costs Is No news [] good news? -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
If IBM had wanted the zIIP's to only be for DB2, they probably would not have allowed the interface to leave IBM. So how does that work? Can anyone get the zIIP interface code and use it without having to pay a license fee to IBM? Or is CA paying IBM for access to the ZIIP and that cost will eventually get passed on in their software cost? Just seems like both CA and IBM are giving up money for nothing since so many of their products are MIPS or MSU based and off-loading cycles to zIIP processors will have us staying on 'smaller' machines longer. Or are they just starting to realize a new cost model? Jeffrey Deaver, Engineer Systems Engineering [EMAIL PROTECTED] 651-665-4231(v) 651-610-7670(p) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ENQ management
Staffan Tylen wrote: Can anyone suggest how one could provide functions similar to CA-MIM's resource conflict notification and job requeueing without too much programming efforts? Thanks in advance. Do you mean ENQ management or notification of ENQ contentions ? For management you have GRS, built in z/OS (no additional fee). For notification you can use/modify one of the GRS samples (SYS1.SAMPLIB). It's called ISGECMON - ENQ contention Monitor. Of course you can also use some auto-operator, because messages job waiting for dataset are sent to syslog. -- Radoslaw Skorupka Lodz, Poland -- BRE Bank SA ul. Senatorska 18 00-950 Warszawa www.brebank.pl Sd Rejonowy dla m. st. Warszawy XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, nr rejestru przedsibiorców KRS 025237 NIP: 526-021-50-88 Wedug stanu na dzie 01.01.2007 r. kapita zakadowy BRE Banku SA (w caoci opacony) wynosi 118.064.140 z. W zwizku z realizacj warunkowego podwyszenia kapitau zakadowego, na podstawie uchwa XVI WZ z dnia 21.05.2003 r., kapita zakadowy BRE Banku SA moe ulec podwyszeniu do kwoty 118.760.528 z. Akcje w podwyszonym kapitale zakadowym bd w caoci opacone. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
Don't know about the rest of the 'stuff' in the announcement, but the DB2 Detector item doesn't really mean a whole lot, I don't think. Detector gets it's data by hooking the SQL PC's. I would think that that means the Detector code has no choice but to run on whatever processor the operating system has chosen for the SQL statement. There may be more to this, but I think that part of the announcement is just stating the obvious. You're correct about that part. For Detector, it's just stating the obvious. The whole announcement is a lot more comprehensive though. There are products that merely observe the behavior of work on the zIIP. They would be used for planning and tuning and other vendors have similar function too. However, the real meat of the announcement is that several of our products really are exploiting zIIP engines to offload work from the general purpose engines. They are using the formal IBM interfaces that allow them to run on a zIIP. So that's considerably different than just being a casual bystander. And there will be more coming. Maybe it's not your father's CA after all? CC -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Disposition of Log data in ISPF Panel
Depending on the size initially allocated these files will reach 16 extents quickly. What are you prepared to do to save and reallocate? Alan Schwartz Assurant Shared Business Services Lead Systems Programmer Phone: 651-361-4758 Fax: 651-361-5625 Jacky Bright [EMAIL PROTECTED] Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU 02/14/2007 05:46 AM Please respond to IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU To IBM-MAIN@BAMA.UA.EDU cc Subject Re: Disposition of Log data in ISPF Panel Like deletion of TSO datasets. Issuing TSO commands etc. These activities are recorded in log dataset when user logs off from the system dataset name like user.SPFLOG1.LIST When user logs off user gets following option 1. Print data set and delete 2. Delete data set without printing 3. Keep data set - Same (allocate same data set in next session) 4. Keep data set - New (allocate new data set in next session) I want to disable 1 , 2 and 4 option. JAcky ** This e-mail message and all attachments transmitted with it may contain legally privileged and/or confidential information intended solely for the use of the addressee(s). If the reader of this message is not the intended recipient, you are hereby notified that any reading, dissemination, distribution, copying, forwarding or other use of this message or its attachments is strictly prohibited. If you have received this message in error, please notify the sender immediately and delete this message and all copies and backups thereof. Thank you. ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
I thought that the zIIP was proprietary to IBM, I guess not anymore. A couple of snippets from the DBTA 5 Minute Briefing. Among the CA solutions announced today is Unicenter NetMaster Network Management for TCP/IP, which offloads statistical analysis of packet flows by its Packet Analyzer component and the trace processing performed by its SmartTrace component to one or more zIIP engines. Another product, BrightStor CA-Vtape Virtual Tape System, frees up capacity on general purpose processors by offloading its processing to zIIP engines, thereby reducing the cost of tape storage while adding greater scalability and reliability to virtual tape implementations, CA said. Also announced was BrightStor Tape Encryption, which employs zIIP engines to reduce general processor capacity requirements, enabling customers to protect data with existing hardware. CA also unveiled Unicenter NeuMICS Resource Management, which enables system administrators to determine workloads that will deliver maximum ROI through the zIIP processor. Additional CA solutions, including the CA IDMS and CA DATACOM database management systems, will exploit zIIP over the next 12 to 18 months, according to the company. It is kind of a slow, steady build towards serious exploitation of the zIIP, said Re. I think where we would like to end up is that the customer could think of that zIIP engine almost as an embedded management appliance. All of the management function runs there, all of the stuff that you really don't want to use general mainframe MIPS for ends up on that zIIP engine - it saves the customer a lot of money and gives him a lot of flexibility about where to put these different product functions. Craddock, Chris [EMAIL PROTECTED] Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU 02/14/2007 08:45 AM Please respond to IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU To IBM-MAIN@BAMA.UA.EDU cc Subject Re: CA and zIIPs Don't know about the rest of the 'stuff' in the announcement, but the DB2 Detector item doesn't really mean a whole lot, I don't think. Detector gets it's data by hooking the SQL PC's. I would think that that means the Detector code has no choice but to run on whatever processor the operating system has chosen for the SQL statement. There may be more to this, but I think that part of the announcement is just stating the obvious. You're correct about that part. For Detector, it's just stating the obvious. The whole announcement is a lot more comprehensive though. There are products that merely observe the behavior of work on the zIIP. They would be used for planning and tuning and other vendors have similar function too. However, the real meat of the announcement is that several of our products really are exploiting zIIP engines to offload work from the general purpose engines. They are using the formal IBM interfaces that allow them to run on a zIIP. So that's considerably different than just being a casual bystander. And there will be more coming. Maybe it's not your father's CA after all? CC -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
Jeffrey Deaver asks If IBM had wanted the zIIP's to only be for DB2, they probably would not have allowed the interface to leave IBM. So how does that work? Can anyone get the zIIP interface code and use it without having to pay a license fee to IBM? Yes. If you are an IBM PartnerWorld member you can get a license from IBM. The license is free because in essence the vendor is offering to provide a benefit to IBM customers. These days anything that helps attract or retain work on the platform is in both IBM's interests and the vendor's interests. Once you have signed the license agreement you get access to the interface spec. It is a pretty simple document and there are only a small number of macro calls required to get it going. I do want to emphasize that we are using the formal interfaces and not sneaking in through the back door. Or is CA paying IBM for access to the ZIIP and that cost will eventually get passed on in their software cost? No, we're not paying anything so there is nothing to be passed along. Just seems like both CA and IBM are giving up money for nothing since so many of their products are MIPS or MSU based and off-loading cycles to zIIP processors will have us staying on 'smaller' machines longer. Or are they just starting to realize a new cost model? IBM says offload engines don't count for software MSUs and the vendor community has a gentleman's agreement to follow suit. As far as I know everyone is sticking by that. The bottom line on all of the offload engines is that the whole industry needed a new cost model to remain competitive. There is nothing sinister about it and IBM has given all of the vendors access to the same resources and capabilities. A level playing field is good for everyone. CC -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How to delete structure from disconnected CF
On Wed, 14 Feb 2007 11:09:57 +0100, Barbara Nitz [EMAIL PROTECTED] wrote: Kees, as far as I know, you don't. About two years back we were in a similar situation. We had to get rid of the second CF in the sandbox sysplex, and I ended up with a sysplex CFRM coldstart. (Despite IBM saying 'Who cares there are structures in pending deallocate state'). The IBM opinion at that time was that there had been a mistake in defining the CFRM policy and activating it, and unless I could either reproduce the problem or produce the joblogs/jcl of the run that defined the administrative policy (which of course was gone as that had been several months earlier), it would be considered a user error. So I guess you either have to reactivate the CF to get rid of the structure, live with it indefinitely in a pending deallocate state or cold start CFRM. This is exactly why we always start with a newly formatted CFRM (and XCF) couple data set for disaster recovery. Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group: G-ITO mailto:[EMAIL PROTECTED] z/OS and OS390 expert at http://searchDataCenter.com/ateExperts/ Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Howard Brazee Sent: Tuesday, February 13, 2007 1:11 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8 On 13 Feb 2007 10:49:55 -0800, [EMAIL PROTECTED] wrote: Or are you saying that mixed-case increases security in those rare shops that haven't implemented revoking IDs on wrong passwords? I think he is - but it might be more secure than in shops that require passwords that are so strong that people don't remember them, but write them down on yellow post notes. This is easy to stop. Restrict distribution and use of yellow post-it(tm) note paper. Use of post-it note paper will be considered a security violation and subject to disciplinary action up to and including immediate termination. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
-Original Message- From: IBM Mainframe Discussion List On Behalf Of Craddock, Chris [ snip ] IBM says offload engines don't count for software MSUs and the vendor community has a gentleman's agreement to follow suit. As far as I know everyone is sticking by that. The bottom line on all of the offload engines is that the whole industry needed a new cost model to remain competitive. There is nothing sinister about it and IBM has given all of the vendors access to the same resources and capabilities. A level playing field is good for everyone. How about VWLC? (Or is it there and I'm missing it?) Any other vendor reps (ASG, Compuware, etc.) care to chime in on this? -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Disposition of Log data in ISPF Panel
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Jacky Bright Sent: Wednesday, February 14, 2007 5:47 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Disposition of Log data in ISPF Panel Like deletion of TSO datasets. Issuing TSO commands etc. These activities are recorded in log dataset when user logs off from the system dataset name like user.SPFLOG1.LIST When user logs off user gets following option 1. Print data set and delete 2. Delete data set without printing 3. Keep data set - Same (allocate same data set in next session) 4. Keep data set - New (allocate new data set in next session) I want to disable 1 , 2 and 4 option. JAcky Silly, IMO. The person can still use the LOG command to force ISPF to switch to a new log. Then use option 3.4 to find the old log and delete it from there. Oh, and I doubt there is a way to stop this. At least with RACF, if the HLQ of a dataset is the same as the user's RACF id, then the implicit authority is ALTER, even if there exists a RACF profile which says something else. The dataset profile is ignored in this case. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
-Original Message- From: IBM Mainframe Discussion List On Behalf Of McKown, John -Original Message- From: IBM Mainframe Discussion List On Behalf Of Howard Brazee On 13 Feb 2007 10:49:55 -0800, pauls2272 wrote: Or are you saying that mixed-case increases security in those rare shops that haven't implemented revoking IDs on wrong passwords? I think he is - but it might be more secure than in shops that require passwords that are so strong that people don't remember them, but write them down on yellow post notes. This is easy to stop. Restrict distribution and use of yellow post-it(tm) note paper. Use of post-it note paper will be considered a security violation and subject to disciplinary action up to and including immediate termination. That would go over like exhaust pipe resonance in an elevator. -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How to delete structure from disconnected CF?
Vernooy, C.P. - SPLXM [EMAIL PROTECTED] wrote in message news:[EMAIL PROTECTED] t... Hello, I ran into an interesting situation: I have a structure in a disconnected CF and cannot delete it nor remove it from the administration. Thanks to all who replied. I was indeed lucky to be able to activate the CF one more time and this cleared up the pending structure. Kees. ** For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
zIIP and chargeback. So what are people doing with their internal chargeback models and the cycles that get moved to these speciality engines? Charging the same as CP cycles? Some reduced amount? Free? Seems like they ought to perhaps still get charged something, but that it would perhaps be quite a bit less since it seems that quite a bit of capacity drivers are based on CP MIPS and their ripple effects on other charges. But how much? Thanks. Jeffrey Deaver, Engineer Systems Engineering [EMAIL PROTECTED] 651-665-4231(v) 651-610-7670(p) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
John Chase asks How about VWLC? (Or is it there and I'm missing it?) Any other vendor reps (ASG, Compuware, etc.) care to chime in on this? Honestly I have no idea. I don't do pricing at all. That's a black art and I would probably be hung before dawn for even having an opinion on it. CC -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: HSM : CHANGING TO VSAM EXTENDED
Since z/OS 1.5, VSAM RLS is not required in order to make the HSM MCDS, BCDS, and OCDS an Extended Addressability data set, but as another poster pointed out RLS provides some very nice performance benefits in a multi-system sysplex. You should re-consider your policy to reorganize your HSM CDS's weekly. The article at http://www.mainstar.com/pdf/000-0112_HSM-CDS-Tng.PDF does a good job of describing the problem you are creating by reorganizing once a week. You also have the option to split the MCDS into 2, 3, or 4 MCDS data sets. Check http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/DGT2I440/1.3. 1.13?DT=20050712201502 for more information. Information about converting to Extended Addressability can be found at http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/DGT2I440/1.3. 1.15?DT=20050712201502. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Elizabeth Black Sent: Tuesday, February 13, 2007 8:01 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: HSM : CHANGING TO VSAM EXTENDED It used to be a requirement that to go EA with the CDS' required that you go RLS first. We followed that route and actually found some significant improvement in HSM processing times due to the RLS conversion, however, I believe that now you can go EA without having to first convert to RLS processing. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Sorting SMF records
Look at the INCLUDE/OMIT control cards. You should be able to do it all in one pass of the data and skip the IFASMFDP process. Christopher Y. Blaicher BMC Software, Inc. Austin Development Labs (512) 340-6154 The comments made are my personal opinions. BMC Software, Inc. makes no representations or promises regarding the reliability, completeness, or accuracy of the information provided in this discussion; all readers agree not to rely on this information or take any action against BMC Software in response to this information. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of John Cassidy Sent: Wednesday, February 14, 2007 2:45 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Sorting SMF records Hello all, need to sort a month of SMF data excluding specific LPAR's and one type of SMF record. With IFASMFDP I can filter out the SMF records, not however, the LPAR's I want excluded. Would anyone have any DFSORT / ICETOOL JCL handy? TIA and regards, J. John Cassidy (Dipl.-Ingr.) Berninastrasse 9 8057 Zuerich Europe -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
In a message dated 2/14/2007 8:57:21 A.M. Central Standard Time, [EMAIL PROTECTED] writes: Honestly I have no idea. I don't do pricing at all. That's a black art and I would probably be hung before dawn for even having an opinion on it. I had a curiosity question. How does WLM handle zIIP'd workloads? Or if you're really sneaky could you run zIIPs only? Back to the Weather Channel. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
NOTICE: All information in and attached to the e-mail(s) below may be proprietary, confidential, privileged and otherwise protected from improper or erroneous disclosure. If you are not the sender's intended recipient, you are not authorized to intercept, read, print, retain, copy, forward, or disseminate this message. If you have erroneously received this communication, please notify the sender immediately by phone (704-758-1000) or by e-mail and destroy all copies of this message (electronic, paper, or otherwise). Thank you. You have to have at least one real CP for each zIIP CP, so you still have to have some workload. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Ed Finnell Sent: Wednesday, February 14, 2007 10:08 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: CA and zIIPs In a message dated 2/14/2007 8:57:21 A.M. Central Standard Time, [EMAIL PROTECTED] writes: Honestly I have no idea. I don't do pricing at all. That's a black art and I would probably be hung before dawn for even having an opinion on it. I had a curiosity question. How does WLM handle zIIP'd workloads? Or if you're really sneaky could you run zIIPs only? Back to the Weather Channel. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Fault Analyzer...
Hi Thomas, I've got one exit working. We had problems because maintenance (2 years ago) moved exit parameters from one input structure (stem variable) to another. The change was documented in the ptf but not in the manuals at the time. Here's the idicnf00 parms relevant to rexx I use to invoke the exit. DATASETS( ... IDIEXEC (SYS1.SIDIEXEC) /* added this library and maintain it with umod */ ... ) EXITS(CONTROL(REXX(NORIDICT))) Beyond that the manual works pretty well. My systems are z/os 1.7, fault analyzer manuals are v6r1. The books seem to match the call parms now. Mark Date:Tue, 13 Feb 2007 19:42:56 +0100 From:[EMAIL PROTECTED] Subject: Fault Analyzer... I have some problems with IBM's Fault Analyzer regarding rexx user exits (manual doesn't match examples or experience, unexpected and undocumented error messages, etc.). I wondering if there are any good web resources (other than the manual) or maybe even a mailing list (regarding FA) ? Or anyone with experience and time to help me ? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
On 2/13/2007 1:49 PM, [EMAIL PROTECTED] wrote: I believe that allowing mixed-case does increase security, as it makes the number of possible passwords of any given length much greater, and increases the amount of time needed for brute-force password guessing. How can you do a brute-force password guess when you have a max of 3 password attempts before the ID is revoked? Or are you saying that mixed-case increases security in those rare shops that haven't implemented revoking IDs on wrong passwords? Revocation based on number of invalid attempts should (for the most part) prevent attacks from people actually trying to login. It does not stop attacks from people who have acquired a copy of your database, and can thus see the encrypted data in the password fields. Given the encrypted authentication data, and the user ID, the brute force attack would involve examining all possible passwords until you find one that generates that same encrypted data. With mixed-case that brute force process needs to cover more possible passwords, and thus will take longer, on average. You have a possible password space (for 8-character passwords) of 65**8 rather than 39**8. Walt Farrell, CISSP z/OS Security Design, IBM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Disposition of Log data in ISPF Panel
I want to disable 1 , 2 and 4 option. Why? Most of that activity is journalled in SMF. What are you going to do with the logs? Read them; archive them? - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Fault Analyzer...
Connecting the response to the thread. Sorry. -Original Message- From: Gibbons, Mark Sent: Wednesday, February 14, 2007 7:15 AM To: 'IBM Mainframe Discussion List' Subject: Fault Analyzer... Hi Thomas, I've got one exit working. We had problems because maintenance (2 years ago) moved exit parameters from one input structure (stem variable) to another. The change was documented in the ptf but not in the manuals at the time. Here's the idicnf00 parms relevant to rexx I use to invoke the exit. DATASETS( ... IDIEXEC (SYS1.SIDIEXEC) /* added this library and maintain it with umod */ ... ) EXITS(CONTROL(REXX(NORIDICT))) Beyond that the manual works pretty well. My systems are z/os 1.7, fault analyzer manuals are v6r1. The books seem to match the call parms now. Mark Date:Tue, 13 Feb 2007 19:42:56 +0100 From:[EMAIL PROTECTED] Subject: Fault Analyzer... I have some problems with IBM's Fault Analyzer regarding rexx user exits (manual doesn't match examples or experience, unexpected and undocumented error messages, etc.). I wondering if there are any good web resources (other than the manual) or maybe even a mailing list (regarding FA) ? Or anyone with experience and time to help me ? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
SV: Fault Analyzer...
Hi Mark, I have no problem with getting the exit to run (I do like You do), but I have these problems: 1. When displaing program areas using EVALUATE ADDRESS(259AC050) LENGTH(4000) REXX(STORAGE(RXVAR) UNFORMATTED) and then IDIWRITE 'DATA 4000(raw data)' I'm sometimes getting (typically one of several similar displays for a dump): FAULTA: Syntax error, one or more closing parenthesis missing - command terminated +++ RC(8) +++ Since I don't find this error message in the manual (or elsewhere) and the message don't makes sense for me I have a problem. 2. In the manual the syntax of the IDIWRITE command is IDIWRITE varname (or just IDIWRITE plus buffer usage). But in the examples from IBM they solely uses the format (example): IDIWRITE 'LInvalid TCB at Address ADDR TCB/ADDR/L'. Furthermore, when I tried to use the format from the manual I got error messages. The second is of course no showstopper but still irritating. TIA Thomas Berg IT Utveckling Swedbank AB (Publ) -Ursprungligt meddelande- Från: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] För Gibbons, Mark Skickat: den 14 februari 2007 16:15 Till: IBM-MAIN@BAMA.UA.EDU Ämne: Fault Analyzer... Hi Thomas, I've got one exit working. We had problems because maintenance (2 years ago) moved exit parameters from one input structure (stem variable) to another. The change was documented in the ptf but not in the manuals at the time. Here's the idicnf00 parms relevant to rexx I use to invoke the exit. DATASETS( ... IDIEXEC (SYS1.SIDIEXEC) /* added this library and maintain it with umod */ ... ) EXITS(CONTROL(REXX(NORIDICT))) Beyond that the manual works pretty well. My systems are z/os 1.7, fault analyzer manuals are v6r1. The books seem to match the call parms now. Mark Date:Tue, 13 Feb 2007 19:42:56 +0100 From:[EMAIL PROTECTED] Subject: Fault Analyzer... I have some problems with IBM's Fault Analyzer regarding rexx user exits (manual doesn't match examples or experience, unexpected and undocumented error messages, etc.). I wondering if there are any good web resources (other than the manual) or maybe even a mailing list (regarding FA) ? Or anyone with experience and time to help me ? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ps dataset
If you ONLY do an allocation like an IEFBR14 and do not open it for output, you will not get the eof record, I don't believe that is 100% accurate. If you have a data class (optional under SMS), the file will be opened by SMS, therebye creating an EOF (iirc). - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EMC's DASD replication
EMCSAFI is an EMC low-level API module. There is a large manual that describes how to use it. Are they suggesting that you write your own API calls instead of using the EMC high-level programs? That seems like an extreme solution. -- Bruce Black Senior Software Developer Innovation Data Processing -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
In a message dated 2/14/2007 8:44:43 A.M. Central Standard Time, [EMAIL PROTECTED] writes: That would go over like exhaust pipe resonance in an elevator. Shoot, we got fixes for everything _http://www.jcwhitney.com/autoparts/Product/tf-Browse/s-10101/Pr-p_Product.CAT ENTRY_ID:2012155/p-2012155/N-111+10201+600015810/c-10101_ (http://www.jcwhitney.com/autoparts/Product/tf-Browse/s-10101/Pr-p_Product.CATENTRY_ID:2012155/p-2 012155/N-111+10201+600015810/c-10101) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
(Soap box deployed) You can make such policies, but folks will find ways to cope. We point a fire hose of passwords to manage at the poor user. I argue it is best to attack a root problem rather than try to pile on fix after fix. In response to Walt's wise words: yes the *individual* password may be technically stronger, but we have to consider the larger picture. It is one thing if that were the *only* password the user had to manage, but quite another if the user has to fumble with many. Same goes for those tokens. Those are wonderful gadgets and offer a strong solution. But just how many do we expect the average user to carry? Two? Ten? The solution does not look to scale well. (Soap box secured) -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of McKown, John Sent: Wednesday, February 14, 2007 8:31 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8 I think he is - but it might be more secure than in shops that require passwords that are so strong that people don't remember them, but write them down on yellow post notes. This is easy to stop. Restrict distribution and use of yellow post-it(tm) note paper. Use of post-it note paper will be considered a security violation and subject to disciplinary action up to and including immediate termination. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
ESP under Z/os 1.7 Heads up
We run the ESP scheduler formally offered by Cybermation, now by CA. We upgraded one of two LPARs in a basic sysplex from z/os 1.4 to 1.7. A mission critical feature of the scheduler is detecting when data sets are created or modified (dataset triggers). That feature does not seem to be working under 1.7. We are working with CA for a resolution. HTH. NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
In a recent note, Walter Farrell said: Date: Tue, 13 Feb 2007 12:57:00 -0500 You're right, though, that all the applications that are passing the password along need to know to leave it as the user entered it. That makes migrating to mixed-case passwords harder than it would have been if we'd made the security product do the upper-casing of the input many years ago. A similar principle should have been applied to data set and member name transformation and enforcement -- this should have been done in a single common component at a low layer. If the intent of the Data Management design was to have a mixed case file system, all names should be taken as-is. If the intent was to have a single-case file system, any attempted use of the other case should result in a syntax error. If the intent was to have a case-insensitive file system, a low level component should perform the translation. Alas, Conway's law took its pernicious toll. The design groups didn't communicate and did not form a common objective. In consequence, allocation assumes mixed-case and takes names as-is. JCL and Catalog assume single-case and treat most uses of lower case as syntax errors. And TSO et. al. assume case-insensitive and convert to upper before calling lower level layers. -- gil -- StorageTek INFORMATION made POWERFUL -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EMC's DASD replication
I am not familiar with the module you mention beyond the fact that it is a SAF interface. If the EMC software you are using for the RESTORE does not provide you with an automatic way to bypass the WTOR, you might want to create an MPF exit to automatically answer the prompt. Liliane At 05:43 PM 2/13/2007, Ping Chiao wrote: We are a CA's ACF2 shop under z/OS and using EMC's DASD replication for Disaster Recovery purposes. When issue 'RESTORE' of thousands of DASD devices, you need to respond to prompt messages of each and every single one of the DASD device. We asked EMC on 'Bypassing' those prompt messages and replies, EMC gave us a module called 'EMCSAFI'. Does anybody have any knowledge of working on this module? Things I'd like to find out are: 1.ACF2 set up, such as CLASMAP, SAFDEF, , etc. 2.Changes in this assembler source module on BYPASS-WTOR in FULL or PARTIAL-RESTORE I'd appreciate if someone would share the experience with me. Regards, Ping Chiao -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html Liliane Clever SunGard Higher Education/Temple University Lead Systems Programmer 1-215-204-6411 (Office) ; 1-215-204-1817 (Fax) [EMAIL PROTECTED] ; [EMAIL PROTECTED] www.sungardhe.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
On 14 Feb 2007 06:31:32 -0800, [EMAIL PROTECTED] (McKown, John) wrote: I think he is - but it might be more secure than in shops that require passwords that are so strong that people don't remember them, but write them down on yellow post notes. This is easy to stop. Restrict distribution and use of yellow post-it(tm) note paper. Use of post-it note paper will be considered a security violation and subject to disciplinary action up to and including immediate termination. LOL! Trouble is, that's almost as bad as what is actually happening. Individual shops can (but don't) spend the money for fingerprint readers - I'm not sure if that solution would work universally (if Microsoft, Apple, and Red Hat included standard ID software in their operating systems). It could be that everybody's waiting for someone else to solve the problem for the Net instead of fixing their in-shop problem now. The payback time for getting fingerprint readers isn't that large for those with desktop computers.And if they are combined with good cryptology, the security advantage for laptops is tremendous. VPN software companies should be offering integration now. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EMC's DASD replication
Ping Perhaps it would help if we knew what you were trying to accomplish in disaster recovery and the reason that EMC displays the WTOR and requires a reply. There may be another way to accomplish your purpose that does not require the replies. Two general observations might also help you. The customers that I have worked with for disaster recovery operations have used some form of SRDF and that process does not require any operator replies to function properly. Especially not for thousands of individual devices. Also, the restore operation when it is used as a full volume restore is a destructive operation that requires verifying the VOLSER. You want to think carefully before you overwrite standard volumes without some process to verify that the source and target were actually paired together at one time and represent the same volume. Tom Moulder -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Ping Chiao Sent: Tuesday, February 13, 2007 4:43 PM To: IBM-MAIN@BAMA.UA.EDU Subject: EMC's DASD replication We are a CA's ACF2 shop under z/OS and using EMC's DASD replication for Disaster Recovery purposes. When issue 'RESTORE' of thousands of DASD devices, you need to respond to prompt messages of each and every single one of the DASD device. We asked EMC on 'Bypassing' those prompt messages and replies, EMC gave us a module called 'EMCSAFI'. Does anybody have any knowledge of working on this module? Things I'd like to find out are: 1.ACF2 set up, such as CLASMAP, SAFDEF, …, etc. 2.Changes in this assembler source module on BYPASS-WTOR in FULL or PARTIAL-RESTORE I'd appreciate if someone would share the experience with me. Regards, Ping Chiao -- No virus found in this outgoing message. Checked by AVG Free Edition. Version: 7.5.441 / Virus Database: 268.17.39/686 - Release Date: 2/14/2007 7:54 AM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
z/IIP work loads are only enclave SRB mode units of work, and then only for an enclave that you set up for working in a z/IIP. One way to get your license to use the z/IIP interface terminated is to try and dispatch TCB work on a z/IIP. I didn't say this, but if I know about all this, do you think we aren't looking at utilizing z/IIP processors? I don't do marketing or pricing, but at this point in time, it seems z/IIP mips will not be used in mip based pricing, at least by BMC. Christopher Y. Blaicher BMC Software, Inc. Austin Development Labs (512) 340-6154 The comments made are my personal opinions. BMC Software, Inc. makes no representations or promises regarding the reliability, completeness, or accuracy of the information provided in this discussion; all readers agree not to rely on this information or take any action against BMC Software in response to this information. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Ed Finnell Sent: Wednesday, February 14, 2007 9:08 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: CA and zIIPs In a message dated 2/14/2007 8:57:21 A.M. Central Standard Time, [EMAIL PROTECTED] writes: Honestly I have no idea. I don't do pricing at all. That's a black art and I would probably be hung before dawn for even having an opinion on it. I had a curiosity question. How does WLM handle zIIP'd workloads? Or if you're really sneaky could you run zIIPs only? Back to the Weather Channel. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Sorting SMF records
Hello all, need to sort a month of SMF data excluding specific LPAR's and one type of SMF record. With IFASMFDP I can filter out the SMF records, not however, the LPAR's I want excluded. Would anyone have any DFSORT / ICETOOL JCL handy? TIA and regards, J. John Cassidy (Dipl.-Ingr.) Berninastrasse 9 8057 Zuerich Europe John Cassidy (Dipl.-Ingr.) Berninastrasse 9 8057 Zuerich Europe Telephone: +41 (0) 43 300 4602 Mobile:+41 (0) 79 207 3268 E-Mail: [EMAIL PROTECTED] http://www.JDCassidy.net http://www.europeunited.org http://en.wikipedia.org/wiki/Europe_United -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
immediate termination. With or without prejudice? - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: VTAM session information - rewording of an earlier question.
Richard, I'll try to provide more details. We have historically been a RUMBA shop, using RUMBA for normal telnet traffic going to our z9. We also have an application that uses RUMBA HLLAPI interfaces for screen scraping into other software packages. Recently management decided they wanted to switch our emulator from RUMBA to HOD. (political decision that I can't do anything about) Anyway, once the developers started messing with HOD, we have occasionally had the situation where a block of LUs will become unavailable to RUMBA. When this happens, the victim will get a black screen in RUMBA. The LUname will show on the RUMBA screen, but our TPX session manager main screen will fail to appear. The user will disconnect/reconnect, getting the next LUname and probably another black screen. Eventually they will get a session and TPX will come up. If, in the middle of this, the person tries to connect with HOD, they will get right in. I think it is a timing issue of some sort but haven't been able to track it down. Hence, I was hoping to get some kind of historical VTAM LU session start/end records and compare them (brute force) to the SMF 119 records out of TCPIP. Unfortunately I know nothing about HOD and the setup they used on it. Rex -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Richard Peurifoy Sent: Tuesday, February 13, 2007 5:16 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: VTAM session information - rewording of an earlier question. Pommier, Rex R. wrote: Unfortunately Netview isn't part of my software mix. At one time years ago, we had netspy from CA and I would assume it gave me that capability as well. I was hoping that VTAM would cut SMF records out-of-the-box, but it appears as though it doesn't. I'm sure mgmt would never allow me the time to build an exit to gather the information either. Thanks for the info. Can you provide more detail on your problem, maybe there is another way to look at it. -- Richard -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
In a recent note, Howard Brazee said: Date: Wed, 14 Feb 2007 09:34:55 -0700 Individual shops can (but don't) spend the money for fingerprint readers - I'm not sure if that solution would work universally (if Microsoft, Apple, and Red Hat included standard ID software in their operating systems). Isn't it merely a matter of time, though, before the technology arises to spoof fingerprint readers? Then we'll need to be concerned not only that a dishonest waiter copies our credit cards, but that a dishonest busboy lifts our fingerprints from the water glasses. Fingerprints don't impress me as a good secret. -- gil -- StorageTek INFORMATION made POWERFUL -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ps dataset
This is exactly correct for a non-sms managed dataset. If you do an allocate and never open the dataset you will not get an EOF. Any old data at that allocation will be readable with the correct dcb. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Sorting SMF records
The JCL below provides an example with SMF/LPAR selection. Refer to the DFSORT documentation at the DFSORT home page link below for details. Sincerely, Scott Barry SBBWorks, Inc. http://www-304.ibm.com/jct01004c/systems/support/storage/software/sort/mvs/ //S1 EXEC PGM=SORT,PARM=ABEND //SYSOUT DD SYSOUT=* //SORTIN DD DSN=smf.input,... //SORTOUT DD DSN=smf.output,... //SYSINDD * OPTION VLSHRT,VLSCMP * COPY/SUBSET SMFJOB FILE FOR TYPE 30 SORT FIELDS=(11,4,PD,A,7,4,BI,A) * SELECT ONLY TYPE 30 and 26. INCLUDE COND=((6,1,BI,EQ,30,OR,6,1,BI,EQ,26),AND, (15,4,SS,EQ,C'SYSA,SYSB,SYSZ')) /* John Cassidy wrote: Hello all, need to sort a month of SMF data excluding specific LPAR's and one type of SMF record. With IFASMFDP I can filter out the SMF records, not however, the LPAR's I want excluded. Would anyone have any DFSORT / ICETOOL JCL handy? TIA and regards, J. John Cassidy (Dipl.-Ingr.) Berninastrasse 9 8057 Zuerich Europe -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
On 14 Feb 2007 09:14:34 -0800, [EMAIL PROTECTED] (Paul Gilmartin) wrote: Isn't it merely a matter of time, though, before the technology arises to spoof fingerprint readers? Then we'll need to be concerned not only that a dishonest waiter copies our credit cards, but that a dishonest busboy lifts our fingerprints from the water glasses. Fingerprints don't impress me as a good secret. As with all security needs, the technology will need to improve to match the moving target of criminals. We don't know far behind the 8-ball our credit cards technologies or our currency technologies are - but we trust them enough so they work for our current needs. I suspect we are more vulnerable than we would like to admit here. We know passwords are failing though.And the primary reason is we need too many passwords all over the place - security needs to work the way people work. A couple or a few decades ago I read a SF story - the protagonist appeared to be a criminal and one thing he did was pull the fingerprint off a rich person to make a bunch of luxury purchases. It turns out he worked for the good guys, and was testing the system for a bet.At the end of the story, he made another bet for 6 months in the future - after his co-workers changed the technology for such things as making sure that the fingerprint came from a conscious person. In that world, such crime appeared to be rare - but the process made sense anyway. (I tend to believe that Vernor Vinge's example of the danger of ubiquitous law enforcement is more likely to be true). What direction do we need to go for logon security? The problem of counterfeiting is also a problem that extends beyond paper money - counterfeiting data can effect us all over. Google recently added software to counter Google Bombs (miserable failure). It's not hard to extrapolate this concept to all Information Processing. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
Ed Finnell wrote: In a message dated 2/14/2007 8:44:43 A.M. Central Standard Time, [EMAIL PROTECTED] writes: That would go over like exhaust pipe resonance in an elevator. Shoot, we got fixes for everything _http://www.jcwhitney.com/autoparts/Product/tf-Browse/s-10101/Pr-p_Product.CAT ENTRY_ID:2012155/p-2012155/N-111+10201+600015810/c-10101_ (http://www.jcwhitney.com/autoparts/Product/tf-Browse/s-10101/Pr-p_Product.CATENTRY_ID:2012155/p-2 012155/N-111+10201+600015810/c-10101) uh, Ed... ??? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Applications Life Cycle Management
Is anyone using a z/OS Applications Life Cycle Management system supplied by someone other than CA or IBM? Mike Brauweiler -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
In a message dated 2/14/2007 12:11:50 P.M. Central Standard Time, [EMAIL PROTECTED] writes: uh, Ed... ??? Just trying to reduce the back pressure on the manifolds. Search jcwhitney -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Sorting SMF records
Scott, will give it a whirl tomorrow, appreciate the tip. Regards, John O n Wed, February 14, 2007 18:51, [EMAIL PROTECTED] wrote: The JCL below provides an example with SMF/LPAR selection. Refer to the DFSORT documentation at the DFSORT home page link below for details. Sincerely, Scott Barry SBBWorks, Inc. http://www-304.ibm.com/jct01004c/systems/support/storage/software/sort/mv s/ //S1 EXEC PGM=SORT,PARM=ABEND //SYSOUT DD SYSOUT=* //SORTIN DD DSN=smf.input,... //SORTOUT DD DSN=smf.output,... //SYSINDD * OPTION VLSHRT,VLSCMP * COPY/SUBSET SMFJOB FILE FOR TYPE 30 SORT FIELDS=(11,4,PD,A,7,4,BI,A) * SELECT ONLY TYPE 30 and 26. INCLUDE COND=((6,1,BI,EQ,30,OR,6,1,BI,EQ,26),AND, (15,4,SS,EQ,C'SYSA,SYSB,SYSZ')) /* E-Mail: [EMAIL PROTECTED] http://www.JDCassidy.net -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
Doesn't anyone watch the Discovery Channel show Mythbusters? There was one episode where they defeated a fingerprint based lock. They did not disclose the details on how they accomplished one critical step, but, hey, we know it can be done. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Paul Gilmartin Sent: Wednesday, February 14, 2007 11:14 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8 In a recent note, Howard Brazee said: Isn't it merely a matter of time, though, before the technology arises to spoof fingerprint readers? Then we'll need to be concerned not only that a dishonest waiter copies our credit cards, but that a dishonest busboy lifts our fingerprints from the water glasses. Fingerprints don't impress me as a good secret. -- gil -- StorageTek INFORMATION made POWERFUL NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
-snip--- Doesn't anyone watch the Discovery Channel show Mythbusters? There was one episode where they defeated a fingerprint based lock. They did not disclose the details on how they accomplished one critical step, but, hey, we know it can be done. unsnip-- Let's face it; no matter what security we devise, it will only serve to keep honest people out. Sooner or later, the criminally-inclined will find a steal-around. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
And if your token is used with a laptop for remote access, don't store the token in the laptop case, even in your own house. IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU wrote on 02/14/2007 11:08:34 AM: Same goes for those tokens. Those are wonderful gadgets and offer a strong solution. But just how many do we expect the average user to carry? Two? Ten? The solution does not look to scale well. - The information contained in this communication (including any attachments hereto) is confidential and is intended solely for the personal and confidential use of the individual or entity to whom it is addressed. The information may also constitute a legally privileged confidential communication. If the reader of this message is not the intended recipient or an agent responsible for delivering it to the intended recipient, you are hereby notified that you have received this communication in error and that any review, dissemination, copying, or unauthorized use of this information, or the taking of any action in reliance on the contents of this information is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail, and delete the original message. Thank you -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
BAD VVRS?
Hi, I'm converting some volumes to SMS and have a VSAM file that: * Was created and cataloged on a particular volume. * The catalog was then deleted. * The file was deleted, but the VVR was not. (?) * The file was recreated and cataloged in a different catalog on the same volume. * The file is accessible and can be opened with no errors. * I seem to have 2 VVRs for the file, one good - one bad. CONVERTV TEST reports the following: ADR724E (001)-FMSCT(03), ERROR DURING LOCATE OF DATA SET INFORMATION FOR DATA SET VPFDT.CHKORD.MFDM0C0G IN CATALOG TSGDP.CAT.SYSTEST, 01-AM-00012-00068 CMI RETURN INFORMATION IS : AH-4-00120 IGW01068T UNEXPECTED RESULTS FROM A CATALOG LOCATE REQUEST. RETURN CODE WAS 4 . REASON CODE WAS X'0078' To fix this, I've been backing up the file, doing an IDCAMS delete (which takes a non-zero return code), then running a DELVVR on the files. Then I reload the file and all is fine. I verify this by running CONVERTV TEST. Is there an easier way to do a DELVVR for a VVR that points to a non-existent catalog? TIA, *BobL* -- This e-mail transmission may contain information that is proprietary, privileged and/or confidential and is intended exclusively for the person(s) to whom it is addressed. Any use, copying, retention or disclosure by any person other than the intended recipient or the intended recipient's designees is strictly prohibited. If you are not the intended recipient or their designee, please notify the sender immediately by return e-mail and delete all copies. OppenheimerFunds may, at its sole discretion, monitor, review, retain and/or disclose the content of all email communications. == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
Howard Brazee wrote: As with all security needs, the technology will need to improve to match the moving target of criminals. We don't know far behind the 8-ball our credit cards technologies or our currency technologies are - but we trust them enough so they work for our current needs. I suspect we are more vulnerable than we would like to admit here. We know passwords are failing though.And the primary reason is we need too many passwords all over the place - security needs to work the way people work. collection of posts over the past year about deployment of hardware tokens in that market segment ... and some of the related vulnerabilities and exploits http://www.garlic.com/~lynn/subintegrity.html#yescard recent thread in crypto list http://www.garlic.com/~lynn/aadsm26.htm#32 Failure of PKI in messaging http://www.garlic.com/~lynn/aadsm26.htm#33 Failure of PKI in messaging http://www.garlic.com/~lynn/aadsm26.htm#34 Failure of PKI in messaging and somewhat related thread that preceeded it http://www.garlic.com/~lynn/aadsm26.htm#26 man in the middle, SSL http://www.garlic.com/~lynn/aadsm26.htm#27 man in the middle, SSL http://www.garlic.com/~lynn/aadsm26.htm#28 man in the middle, SSL http://www.garlic.com/~lynn/aadsm26.htm#30 man in the middle, SSL http://www.garlic.com/~lynn/aadsm26.htm#31 man in the middle, SSL as repeatedly mentioned in the above ... (SSL) encryption involved hiding the account number while it moved thru the internet ... for what came to be called electronic commerce. in the mid-90s, the x9a10 financial standard working group had been given the requirement to preserve the integrity of the financial infrastructure for all retail payments. this resulted in the x9.59 financial standard http://www.garlic.com/~lynn/x959.html#x959 http://www.garlic.com/~lynn/subpubkey.html#x959 if you look at the security PAIN acronym P - privacy (or somethings CAIN for confidentiality, i.e. security by hiding information) A - authentication I - integrity N - non-repudiation in effect, x9.59 financial standard substituted authentication and integrity for privacy. part of this was the diametrically opposing requirements placed on account numbers. at one end, the requirement to keep account numbers confidential and never allowed to be divulged. at the other end, dozens of business processes that require ready and general access to the account number. this led to my periodic comment that even if the planet was buried under miles of (information hiding) encryption, it still wouldn't be able to prevent account number leakage. now, part of the password paradigm analysis is from the standpoint of 3-factor authentication: http://www.garlic.com/~lynn/subintegrity.html#3factor * something you know (i.e. pins and passwords) * something you have (i.e. hardware tokens) * something you are (i.e. biometrics) pins and passwords ... have commoningly been deployed as shared secrets. This has resulted in a security requirement for a unique shared secret for every unique security domain (as countermeasure to cross domain attacks). Other security requirements have required passwords to be impossible to guess (as countermeasure to guessing attacks) ... which also tends to have the side-effect that they are impossible to remember. 40-50 years ago, when a person was possibly involved in only a single security domain ... and only had a single password to remember ... the password (shared-secret something you know) paradigm was somewhat tolerable. However, as typical number of unique security domain participation by individuals has grown to scores ... the scores of related passwords have become unmanageable. http://www.garlic.com/~lynn/subintegrity.html#secrets now, one of the assumptions in the domain of multi-factor authentication ... is the security is better based on (frequently implicit) assumption that the different factors are subject to independent vulnerabilities. however, there are a number of technology attacks that can invalidate such a assumption ... being able to compromise multi-factor authentication in a single exploit. For instance, in the previously mentioned yes card exploit, there is an assumption about multi-factor authentication ... with a chip-token as a something you have authentication in conjunction with a PIN as something you know. However, part of the yes card exploit is being able to counterfeit the YES in response to query whether the correct PIN was entered (i.e. YES is the response regardless of what PIN is entered, negating any requirement for actually needing to know the correct PIN). http://www.garlic.com/~lynn/subintegrity.html#yescard and a recent somewhat long running general thread http://www.garlic.com/~lynn/2007.html#0 Securing financial transactions a high priority for 2007 http://www.garlic.com/~lynn/2007.html#5 Securing financial transactions a high priority for 2007 http://www.garlic.com/~lynn/2007.html#6 Securing financial
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
NOTICE: All information in and attached to the e-mail(s) below may be proprietary, confidential, privileged and otherwise protected from improper or erroneous disclosure. If you are not the sender's intended recipient, you are not authorized to intercept, read, print, retain, copy, forward, or disseminate this message. If you have erroneously received this communication, please notify the sender immediately by phone (704-758-1000) or by e-mail and destroy all copies of this message (electronic, paper, or otherwise). Thank you. I saw that episode. Both of the main people using different methods were able to defeat the fingerprint based lock once they obtained the fingerprint of the person that programmed the lock. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Hal Merritt Sent: Wednesday, February 14, 2007 1:46 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8 Doesn't anyone watch the Discovery Channel show Mythbusters? There was one episode where they defeated a fingerprint based lock. They did not disclose the details on how they accomplished one critical step, but, hey, we know it can be done. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ESP under Z/os 1.7 Heads up
At 14 Feb 2007 16:18:34 GMT, concerning ESP under Z/os 1.7 Heads up, Hal Merritt [EMAIL PROTECTED] wrote (to IBM-Main): We run the ESP scheduler formally offered by Cybermation, now by CA. We upgraded one of two LPARs in a basic sysplex from z/os 1.4 to 1.7. A mission critical feature of the scheduler is detecting when data sets are created or modified (dataset triggers). That feature does not seem to be working under 1.7. We are working with CA for a resolution. Hal: the problem might be specific to SysPlex as we've been z/OS v1.7 here since the fall without problems. However, we're a MonoPlex. I just cycled our test Cics region and the triggered job was run. I've pasted some information that you might use for comparison values with CA. (Yeah, I wasn't thrilled with the call last fall that Cybermation had sold out.) Misc details: z/OS v1.7 (MonoPlex), 2-way z890, ESP v5.4.0 d iplinfo: D IPLINFO IEE254I 16.03.16 IPLINFO DISPLAY 435 SYSTEM IPLED AT 08.57.26 ON 01/20/2007 RELEASE z/OS 01.07.00LICENSE = z/OS ARCHLVL = 2 MTLSHARE = N d m=cpu: CPC SI = 2086.250.IBM.02. ESP STC log information: ESP499I ESP RELEASE 5.4.0 INITIALIZED, SUBSYS ESP 15.39.35 WED 14FEB07 EVENTEX: ADABAS.NCILOG_GENERIC SCHEDULED, DSTRIG, UNCONDITIONAL The event definition: /*/ /* DEFINED BY NDUFFEE AT 09.54 ON TUE 8OCT2002 */ /*/ EVENT ID(ADABAS.NCILOG_GENERIC) SYSTEM(UODP) REPLACE INVOKE 'DBSP.UTILITY.CNTL(ESPSYMBL)' SUBMIT 'DBSP.UTILITY.CNTL(NCILOG)' DSTRIG DBDI.DC07.NCILOG JOB(DC07-) ANYCLOSE DSTRIG DBDD.DC10.NCILOG JOB(DC10-) ANYCLOSE DSTRIG DBDD.DC15.NCILOG JOB(DC15-) ANYCLOSE DSTRIG DBDQ.DCQA.NCILOG JOB(DCQA-) ANYCLOSE DSTRIG DBDQ.DC25.NCILOG JOB(DC25-) ANYCLOSE DSTRIG DBDQ.DC26.NCILOG JOB(DC26-) ANYCLOSE DSTRIG DBDP.DCTO.NCILOG JOB(DCTO-) ANYCLOSE DSTRIG DBDP.DC51.NCILOG JOB(DC51-) ANYCLOSE DSTRIG DBDP.DC52.NCILOG JOB(DC52-) ANYCLOSE DSTRIG DBDP.DC53.NCILOG JOB(DC53-) ANYCLOSE DSTRIG DBDP.DC54.NCILOG JOB(DC54-) ANYCLOSE DSTRIG DBDP.DC60.NCILOG JOB(DC60-) ANYCLOSE From the submitted job: //* SUBMITTED BY ESP AT 15.39.35 ON WEDNESDAY FEBRUARY 14TH, 2007 //* SYSTEM UODP, SUBSYSTEM ESP //* REQUESTED BY EVENT ADABAS.NCILOG_GENERIC //* EVENT TRIGGERED BY USER DC07JOB //* TRIGGERED ON CREATION BY JOB DC07CICS //* OF DATA SET DBDI.DC07.NCILOG //* JCL FROM DBSP.UTILITY.CNTL(NCILOG) //* //**JCLLIB ORDER=(DBSI.UTILITY.CNTL) //* //* ESP variable values //* %CICS = 07 //* %CICSTS13 = .CICSTS13 //* %DB2HLEV = INS //* %DB2VER = 610 //* %ENV = I //* %ESPTRDSN = DBDI.DC07.NCILOG //* %ESPUSER = NDUFFEE //* -- signature = 6 lines follows -- Neil Duffee, Joe SysProg, U d'Ottawa, Ottawa, Ont, Canada telephone:1 613 562 5800 x4585 fax:1 613 562 5161 mailto:NDuffee of uOttawa.ca http:/ /aix1.uottawa.ca/ ~nduffee How *do* you plan for something like that? Guardian Bob, Reboot For every action, there is an equal and opposite criticism. Systems Programming: Guilty, until proven innocent John Norgauer 2004 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
Rus wrote on 14/02/2007 10:35:46 PM: zIIP is designed to help free-up general computing capacity and lower software costs for select workloads such as business intelligence (BI), ERP and CRM on the mainframe. IBM will not impose software charges on zIIP capacity1. Wonder why you believe that select workloads should be limited to DB2 only applications? If IBM had wanted the zIIP's to only be for DB2, they probably would not have allowed the interface to leave IBM. What makes you think I think that ... :-) IBM put particular (marketing) effort into projecting the zIIP as a DB2 benefit. You and I and everybodies dog knew that creating an entity that could be dispatched on a zIIP just needed a little (non published) interface info. Not all the people capable of doing that work for ISVs or are Partnerworld members. For a lot of us that info *hasn't* left IBM. Shane ... -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Shane Ginnane Sent: Wednesday, February 14, 2007 3:40 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: CA and zIIPs Rus wrote on 14/02/2007 10:35:46 PM: zIIP is designed to help free-up general computing capacity and lower software costs for select workloads such as business intelligence (BI), ERP and CRM on the mainframe. IBM will not impose software charges on zIIP capacity1. Wonder why you believe that select workloads should be limited to DB2 only applications? If IBM had wanted the zIIP's to only be for DB2, they probably would not have allowed the interface to leave IBM. What makes you think I think that ... :-) IBM put particular (marketing) effort into projecting the zIIP as a DB2 benefit. You and I and everybodies dog knew that creating an entity that could be dispatched on a zIIP just needed a little (non published) interface info. Not all the people capable of doing that work for ISVs or are Partnerworld members. For a lot of us that info *hasn't* left IBM. Shane ... The same with using a zAAP, I'll bet. Curiously, due to an error in my installing Java 1.5, I even know the IBM supplied module which does it. Of course, I don't know how to properly invoke that module. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: VTAM session information - rewording of an earlier question.
Pommier, Rex R. wrote: Richard, I'll try to provide more details. We have historically been a RUMBA shop, using RUMBA for normal telnet traffic going to our z9. We also have an application that uses RUMBA HLLAPI interfaces for screen scraping into other software packages. Recently management decided they wanted to switch our emulator from RUMBA to HOD. (political decision that I can't do anything about) Anyway, once the developers started messing with HOD, we have occasionally had the situation where a block of LUs will become unavailable to RUMBA. When this happens, the victim will get a black screen in RUMBA. The LUname will show on the RUMBA screen, but our TPX session manager main screen will fail to appear. The user will disconnect/reconnect, getting the next LUname and probably another black screen. Eventually they will get a session and TPX will come up. If, in the middle of this, the person tries to connect with HOD, they will get right in. I think it is a timing issue of some sort but haven't been able to track it down. Hence, I was hoping to get some kind of historical VTAM LU session start/end records and compare them (brute force) to the SMF 119 records out of TCPIP. Unfortunately I know nothing about HOD and the setup they used on it. It sounds like the TCP LU is occasionally being left connected to some application and the RUMBA connection is landing in the middle of it. Do you have LOSTERM=IMMED coded on the VTAM appl definitions being used by TCP? Have you displayed the LU in VTAM when RUMBA gets a dead connection (D NET,ID=luname,E)? When the user disconnect does it still look the same? What does TCP show (D TCPIP,tcpjobname,T,CONN,LUN=luname) The TPX log also shows LOGON, SIGNON, SIGNOFF, and LOGOFF as well as TPX virtual terminal connect/disconnect. TPX can also be configured to log this to SMF. Is TPX your default appl in TCP, or are you using the TCP USS screens (or some other solicitor)? -- Richard -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: BAD VVRS?
All of the product that help maintain catalogs have the ability to delete a specific VVR. The main ones are T-REX from Dino-Software, Catalog Recovery Plus from Mainstar, and Catalog Solutions from EMC. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Lester, Bob Sent: Wednesday, February 14, 2007 2:03 PM To: IBM-MAIN@BAMA.UA.EDU Subject: BAD VVRS? Hi, I'm converting some volumes to SMS and have a VSAM file that: * Was created and cataloged on a particular volume. * The catalog was then deleted. * The file was deleted, but the VVR was not. (?) * The file was recreated and cataloged in a different catalog on the same volume. * The file is accessible and can be opened with no errors. * I seem to have 2 VVRs for the file, one good - one bad. CONVERTV TEST reports the following: ADR724E (001)-FMSCT(03), ERROR DURING LOCATE OF DATA SET INFORMATION FOR DATA SET VPFDT.CHKORD.MFDM0C0G IN CATALOG TSGDP.CAT.SYSTEST, 01-AM-00012-00068 CMI RETURN INFORMATION IS : AH-4-00120 IGW01068T UNEXPECTED RESULTS FROM A CATALOG LOCATE REQUEST. RETURN CODE WAS 4 . REASON CODE WAS X'0078' To fix this, I've been backing up the file, doing an IDCAMS delete (which takes a non-zero return code), then running a DELVVR on the files. Then I reload the file and all is fine. I verify this by running CONVERTV TEST. Is there an easier way to do a DELVVR for a VVR that points to a non-existent catalog? TIA, *BobL* -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
JES confusion on a specific job
Hi list. This is probably a case of not seeing the forest due to the trees, but here goes. We are z/OS 1.4, JES2, and running control-m for a job scheduler. I have certain jobs that show up differently under SDSF depending on how I look at them. Because of this apparent disparity, job output that is supposed to be going away isn't. In my case, output class H is normally deleted by a JES2 automatic command run every night, if the output is more than 18 hours old. Output class X is cleaned up after 90 days. Here is an example of one such job that is confusing me: Here are a few lines from the job output: -- JES2 JOB STATISTICS -- 09 NOV 2006 JOB EXECUTION DATE 59 CARDS READ 1,258 SYSOUT PRINT RECORDS 0 SYSOUT PUNCH RECORDS 89 SYSOUT SPOOL KBYTES 0.03 MINUTES EXECUTION TIME 1 //WSCSY069 JOB ,BUSSERV, PHOENIX DAILY REPORT PRINTING JOB08907 // CLASS=A,MSGCLASS=H,MSGLEVEL=(1,1),REGION=4096K, // COND=(8,LT) Here is what the DSID list looks like, if I look at it via the SDSF ST screen: SDSF JOB DATA SET DISPLAY - JOB WSCSY069 (JOB08907)LINE 1-5 (5) COMMAND INPUT === SCROLL === CSR PREFIX=WSCSY069 DEST=(ALL) OWNER=* SYSNAME= NP DDNAME StepName ProcStep DSID OwnerC Dest Rec-Cnt Page-CntByte-CntCC JESMSGLG JES2 2 BMCU H LOCAL 19 1,353 1 JESJCL JES2 3 BMCU H LOCAL 154 9,394 1 JESYSMSG JES2 4 BMCU H LOCAL 106 6,127 1 SYSPRINT NONCAT2 CONTROLR 101 BMCU H LOCAL 44 2,382 1 DAPRENV NONCAT2 CONTROLR 118 BMCU H LOCAL 47222,856 1 Here is the same job DSID list if I look at it going through the SDSF O screen: SDSF JOB DATA SET DISPLAY - JOB WSCSY069 (JOB08907)LINE 1-5 (5) COMMAND INPUT === SCROLL === CSR PREFIX=WSCSY069 DEST=(ALL) OWNER=* SYSNAME= NP DDNAME StepName ProcStep DSID OwnerC Dest Rec-Cnt Page-CntByte-CntCC JESMSGLG JES2 2 BMCU X LOCAL 19 1,353 1 1 11 JESJCL JES2 3 BMCU X LOCAL 154 9,394 1 1 11 JESYSMSG JES2 4 BMCU X LOCAL 106 6,127 1 1 11 SYSPRINT NONCAT2 CONTROLR 101 BMCU X LOCAL 44 2,382 1 1 11 DAPRENV NONCAT2 CONTROLR 118 BMCU X LOCAL 47222,856 1 1 11 How is it that the same job shows the output in class H at one point but class X at another? My guess is that it has something to do with control-m, but I can't prove that. If it is control-m, how can I fix it so that the output purges when it is supposed to? TIA Rex -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
XCF Performance Question
We think we may have some performance issue with XCF. We are looking at the RMF reports, but still confused. Can anyone suggest some metric to focus on that would be an indication of goodness or badness? Thanks! NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ps dataset
Hello, These were recently posted in this thread (about things that can go thud when a dataset is allocated but not used). For SMS-managed datasets, this phenomenon goes away as SMS writes an EOF on the first track on the new dataset. and If you did have this under SMS management, you wouldn't have the problem. When the system allocates a PS dataset on SMS dasd, it immediately writes an EOF. You can see recent threads for details on exactly when this does and doesn't happen. If a dataset is allocated under sms management via JCL/IEFBR14 will it ALWAYS raise an end of file on the first read? A physical eof is written even though the dataset was never referenced other than alloc/de-alloc? My confusion is due to the last part of the preceeding quote when this does and doesn't happen. Thanx, d.sch. _ Turn searches into helpful donations. Make your search count. http://click4thecause.live.com/search/charity/default.aspx?source=hmemtagline_donationFORM=WLMTAG -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA and zIIPs
The same with using a zAAP, I'll bet. Curiously, due to an error in my installing Java 1.5, I even know the IBM supplied module which does it. Of course, I don't know how to properly invoke that module. Not exactly. There is NO external interface to the zAAP. You get on it simply by running JAVA code in the IBM JVM. On the other hand, zIIP engines have a set of formal macro interfaces that enable work to run on them. CC -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ps dataset
Ted, While a DATACLAS can be used to provide attributes for a non-SMS dataset, it is the presence of a STORCLAS that actually denotes an SMS managed dataset, which in turn gives you all the good things that come with SMS. Ron -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Ted MacNEIL Sent: Thursday, 15 February 2007 12:11 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: ps dataset If you ONLY do an allocation like an IEFBR14 and do not open it for output, you will not get the eof record, I don't believe that is 100% accurate. If you have a data class (optional under SMS), the file will be opened by SMS, therebye creating an EOF (iirc). - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
Sooner or later, the criminally-inclined will find a steal-around. Let's all go home. Let's all dig a hole in our back-yard. Let's all put food, clothing, hygenic material, and favourite entertainment material in there (free, otherwise they have our contact info). Let's then pull the dirt over us. Then, we are protected from the 'criminally-inclined'. Or, we can live/enjoy our lives and realise there is a risk to everything we do. Yes, there may/will be a steal-around, but as with anything else, we can work with what we have and improve as improvements come. PS: how did describing crooks and crooked activity become politically correct? Criminally-inclined? Steal-around? I mean, REALLY! Crooks and theft? (8-{} Nyuk! Nyuk! Nyuk! - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ps dataset
If a dataset is allocated under sms management via JCL/IEFBR14 will it ALWAYS raise an end of file on the first read? A physical eof is written even though the dataset was never referenced other than alloc/de-alloc? Data Class is the only optional construct under SMS. If you have it defined for the dataset (through the ACS routines) the EOF will be there. SMS opens and closes the data set to ensure the DCB is enforced. Without it, and without SMS, this is not done. Funny, I thought I said this a day or so ago. Either my post didn't go through, or nobody read it. - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ps dataset
While a DATACLAS can be used to provide attributes for a non-SMS dataset, it is the presence of a STORCLAS that actually denotes an SMS managed dataset, which in turn gives you all the good things that come with SMS. Yes. I know that. But, the dataset has to be SMS-Managed and have a data class (optional) for the EOF to be written. I wasn't going into the detail of how a dataset becomes SMS managed, rather what is required when it is SMS managed. There is no EOF written with IEFBR14 allocating a dataset that is not SMS Managed. - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: JES confusion on a specific job
Do you have any OUTPUT cards in the jobs? One of the things we used to do is have print go to two classes. One that automaticaly went to $AVER and one that stayed on the SPOOL for 48 hours. So each print had two output classes. We have stopped this pratice and we did not have SDSF at that time so I am not sure how it would have looked. Pommier, Rex R. wrote: Hi list. This is probably a case of not seeing the forest due to the trees, but here goes. We are z/OS 1.4, JES2, and running control-m for a job scheduler. I have certain jobs that show up differently under SDSF depending on how I look at them. Because of this apparent disparity, job output that is supposed to be going away isn't. In my case, output class H is normally deleted by a JES2 automatic command run every night, if the output is more than 18 hours old. Output class X is cleaned up after 90 days. Here is an example of one such job that is confusing me: Here are a few lines from the job output: -- JES2 JOB STATISTICS -- 09 NOV 2006 JOB EXECUTION DATE 59 CARDS READ 1,258 SYSOUT PRINT RECORDS 0 SYSOUT PUNCH RECORDS 89 SYSOUT SPOOL KBYTES 0.03 MINUTES EXECUTION TIME 1 //WSCSY069 JOB ,BUSSERV, PHOENIX DAILY REPORT PRINTING JOB08907 // CLASS=A,MSGCLASS=H,MSGLEVEL=(1,1),REGION=4096K, // COND=(8,LT) Here is what the DSID list looks like, if I look at it via the SDSF ST screen: SDSF JOB DATA SET DISPLAY - JOB WSCSY069 (JOB08907)LINE 1-5 (5) COMMAND INPUT === SCROLL === CSR PREFIX=WSCSY069 DEST=(ALL) OWNER=* SYSNAME= NP DDNAME StepName ProcStep DSID OwnerC Dest Rec-Cnt Page-Cnt Byte-Cnt CC JESMSGLG JES2 2 BMCU H LOCAL 19 1,353 1 JESJCL JES2 3 BMCU H LOCAL 154 9,394 1 JESYSMSG JES2 4 BMCU H LOCAL 106 6,127 1 SYSPRINT NONCAT2 CONTROLR 101 BMCU H LOCAL 44 2,382 1 DAPRENV NONCAT2 CONTROLR 118 BMCU H LOCAL 47222,856 1 Here is the same job DSID list if I look at it going through the SDSF O screen: SDSF JOB DATA SET DISPLAY - JOB WSCSY069 (JOB08907)LINE 1-5 (5) COMMAND INPUT === SCROLL === CSR PREFIX=WSCSY069 DEST=(ALL) OWNER=* SYSNAME= NP DDNAME StepName ProcStep DSID OwnerC Dest Rec-Cnt Page-CntByte-CntCC JESMSGLG JES2 2 BMCU X LOCAL 19 1,353 1 1 11 JESJCL JES2 3 BMCU X LOCAL 154 9,394 1 1 11 JESYSMSG JES2 4 BMCU X LOCAL 106 6,127 1 1 11 SYSPRINT NONCAT2 CONTROLR 101 BMCU X LOCAL 44 2,382 1 1 11 DAPRENV NONCAT2 CONTROLR 118 BMCU X LOCAL 47222,856 1 1 11 How is it that the same job shows the output in class H at one point but class X at another? My guess is that it has something to do with control-m, but I can't prove that. If it is control-m, how can I fix it so that the output purges when it is supposed to? TIA Rex -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
ISPF profile PDS
We frequently bring in contract programmers and give each one a TSO userid starting with R followed by contractor's id (my own is RXJ67). The X indicates contractor. If the individual is later hired as a regular employee, the number changes. For individuals on board for several months or even years before the changeover, this sometimes causes significant unhappyness and loss of productivity for a few days to a couple of weeks depending on how heavily they have customized their environments. I shot from the lip and suggested copying the old profile data set to the new account name. After I reviewed my own PDS at the indirect suggestion of the manager of our tech support section, I think less of the idea. My simplest out may be to just stand in front of a mirror and give myself the same horse laugh... oh well. The number of places my old id would appear left me a bit chastened. I suspect some of them would cause little if any problem but others might not let me use certain functions Has anyone addressed/resolved this type of issue. Can a usefull mapping make be made here or am I out of luck. TSO.RXJ67.ISPPROF is my current profile data set mame. Were it to change, under the current scenario, I would limp for SEVERAL weeks. David (glutton for punishment) Speake -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ISPF profile PDS
After I reviewed my own PDS at the indirect suggestion of the manager of our tech support section, I think less of the idea. It's not supported, but do the following: 1. Using your contract ID, copy to the new file. 2. Using your contract ID, edit the PDS (it's FB80 - text). 3. Do a global change in each member to change the ID. Including the first record. Some may wrap, so check it out. 4. Sign on with your new I'd. 5. Repeat as necessary. It may take a half-hour, but it beats a manual re-build. I know. I have done it. I've even used 3.14 to search the PDS to ensure I didn't miss anything. Or, you could rebuild from scratch. And, if it doesn't work the first time, you still have the original source ISPPROF. Copy. Edit. Repeat if necessary. - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ps dataset
Ted, I've searched for a definitive reference on this but nothing turned up quickly. However, every reference I did find specifies that the EOF is written for SMS Managed Datasets. A DATACLAS can be used by both SMS and non-SMS managed datasets, but a dataset is not SMS managed unless it has a STORCLAS and ultimately gets allocated to an SMS Volume. So I'm led to believe that the presence of a DATACLAS does not cause SMS to write an EOF when allocating a non-SMS dataset. Ron Data Class is the only optional construct under SMS. If you have it defined for the dataset (through the ACS routines) the EOF will be there. SMS opens and closes the data set to ensure the DCB is enforced. Without it, and without SMS, this is not done. Funny, I thought I said this a day or so ago. Either my post didn't go through, or nobody read it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ps dataset
ISTR that SMS will put an EOF at the beginning of a newly allocated SMS-managed dataset if/when SMS determines that the dataset's DSORG=PS. It didn't seem to matter if this information came from the DATACLAS or DD statement. I don't remember where it was documented, only that I stumbled across it while on a mission to eliminate datasets that HSM wouldn't migrate because they'd never been opened. Tom This is a PRIVATE message. If you are not the intended recipient, please delete without copying and kindly advise us by e-mail of the mistake in delivery. NOTE: Regardless of content, this e-mail shall not operate to bind CSC to any order or other contract unless pursuant to explicit written agreement or government initiative expressly permitting the use of e-mail for such purpose. Ron Hawkins [EMAIL PROTECTED] LE.COMTo Sent by: IBM IBM-MAIN@BAMA.UA.EDU Mainframe cc Discussion List [EMAIL PROTECTED] Subject .EDU Re: ps dataset 02/14/2007 07:44 PM Please respond to IBM Mainframe Discussion List [EMAIL PROTECTED] .EDU Ted, I've searched for a definitive reference on this but nothing turned up quickly. However, every reference I did find specifies that the EOF is written for SMS Managed Datasets. A DATACLAS can be used by both SMS and non-SMS managed datasets, but a dataset is not SMS managed unless it has a STORCLAS and ultimately gets allocated to an SMS Volume. So I'm led to believe that the presence of a DATACLAS does not cause SMS to write an EOF when allocating a non-SMS dataset. Ron Data Class is the only optional construct under SMS. If you have it defined for the dataset (through the ACS routines) the EOF will be there. SMS opens and closes the data set to ensure the DCB is enforced. Without it, and without SMS, this is not done. Funny, I thought I said this a day or so ago. Either my post didn't go through, or nobody read it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ps dataset
So I'm led to believe that the presence of a DATACLAS does not cause SMS to write an EOF when allocating a non-SMS dataset. I thought that's what I said. If I wasn't clear, I said: It has to be SMS-Managed. It has to have a data class. I never said that a data class would guarantee an EOF for non-SMS. I've checked my posts, and only a typo would say anything different. I never delved in the details of how to get a data set SMS managed. I just stated that it had to be! - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ps dataset
ISTR that SMS will put an EOF at the beginning of a newly allocated SMS-managed dataset if/when SMS determines that the dataset's DSORG=PS. No DCB! No EOF! - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ps dataset
Ted, You said, somewhat ambiguously: If you have a data class (optional under SMS), the file will be opened by SMS, therebye creating an EOF (iirc). This is what I was responding to. You later added that a STORCLAS (SMS Managed) is also required. My understanding is that DATACLAS is not required, only DSORG=PS for an SMS Managed Dataset as posted by Tom Puddicombe. Ron -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Ted MacNEIL Sent: Thursday, 15 February 2007 9:14 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: ps dataset So I'm led to believe that the presence of a DATACLAS does not cause SMS to write an EOF when allocating a non-SMS dataset. I thought that's what I said. If I wasn't clear, I said: It has to be SMS-Managed. It has to have a data class. I never said that a data class would guarantee an EOF for non-SMS. I've checked my posts, and only a typo would say anything different. I never delved in the details of how to get a data set SMS managed. I just stated that it had to be! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ps dataset
If you have a data class (optional under SMS), the file will be opened by SMS, therebye creating an EOF (iirc). I thought I implied SMS. If I missed a step, sorry. Consistency is the hobgoblin of little minds. (8-{} - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ISPF profile PDS
- Original Message - From: David Speake [EMAIL PROTECTED] Newsgroups: bit.listserv.ibm-main Sent: Wednesday, February 14, 2007 7:26 PM Subject: ISPF profile PDS We frequently bring in contract programmers and give each one a TSO userid starting with R followed by contractor's id (my own is RXJ67). The X indicates contractor. If the individual is later hired as a regular employee, the number changes. For individuals on board for several months or even years before the changeover, this sometimes causes significant unhappyness and loss of productivity for a few days to a couple of weeks depending on how heavily they have customized their environments. I shot from the lip and suggested copying the old profile data set to the new account name. After I reviewed my own PDS at the indirect suggestion of the manager of our tech support section, I think less of the idea. My simplest out may be to just stand in front of a mirror and give myself the same horse laugh... oh well. The number of places my old id would appear left me a bit chastened. I suspect some of them would cause little if any problem but others might not let me use certain functions David, The id embedded in the PROFILE table members should not be a problem if it's in the TIR (table information record). If the userid is actually in a profile variable, you could use the PDS (file 182 at www.cbttabe.org) REPLACE function to fix the userid in all members. Wraps could be a problem, you would have to IEBIBALL those or write a Rexx exec to deal with wraps. Email me offline if you have questions. Regards, Tom Conley -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html