Re: Disposition of Log data in ISPF Panel

2007-02-14 Thread Binyamin Dissen
On Wed, 14 Feb 2007 12:28:28 +0530 Jacky Bright [EMAIL PROTECTED]
wrote:

:I want to force all my TSO users to keep TSO Log dataset so that activities
:carried out by all TSO users can be recorded.

What activities?

:AS of now all users are able to delete the datasets while logging off from
:the system.

Also during the run.

The also can turn off logging.

:How to configure this ?

What data are you truly trying to collect?

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


How to delete structure from disconnected CF?

2007-02-14 Thread Vernooy, C.P. - SPLXM
Hello,

 

I ran into an interesting situation: I have a structure in a
disconnected CF and cannot delete it nor remove it from the
administration. 

 

All structures except the IXC Signalling structure were moved to another
CF and the CF lpar was inactivated. The CFRM policy was updated and a
new IXC Signalling structure was allocated. So far so good, except that
I have the old structure in the Pending Deallocation status. The SETXCF
Force command tells me that it will only process the command if it or
another system can connect to the CF. 

 

In this case I can still activate the CF lpar to deallocate the
structure, but I am more interested in the situation when this were not
possible anymore. How do I clean up the Structure administration then,
apart from a cold sysplex start by formatting new CFRM Couple Datasets?

 

Kees.

 



**
For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), 
its subsidiaries and/or its employees shall not be liable for the incorrect or 
incomplete transmission of this e-mail or any attachments, nor responsible for 
any delay in receipt.
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286 
**


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Sorting SMF records

2007-02-14 Thread John Cassidy
Hello all,

need to sort a month of SMF data excluding specific LPAR's and one type of
SMF record. With IFASMFDP I can filter out the SMF records, not however,
the LPAR's I want excluded.


Would anyone have any DFSORT / ICETOOL JCL handy?


TIA and regards,


J.




John Cassidy (Dipl.-Ingr.)

Berninastrasse 9

8057 Zuerich

Europe

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Shane
On Tue, 2007-02-13 at 23:20 -0500, Ed Finnell wrote:

 Wonder if it's correlated to today's announcements?

Limited to locales close to North America only fella ...
What about the rest of us ???.

Shane ...

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: How to delete structure from disconnected CF

2007-02-14 Thread Barbara Nitz
Kees,

as far as I know, you don't. 

About two years back we were in a similar situation. We had to get rid of the 
second CF in the sandbox sysplex, and I ended up with a sysplex CFRM coldstart. 
(Despite IBM saying 'Who cares there are structures in pending deallocate 
state'). 
The IBM opinion at that time was that there had been a mistake in defining the 
CFRM policy and activating it, and unless I could either reproduce the problem 
or produce the joblogs/jcl of the run that defined the administrative policy 
(which of course was gone as that had been several months earlier), it would be 
considered a user error.

So I guess you either have to reactivate the CF to get rid of the structure, 
live with it indefinitely in a pending deallocate state or cold start CFRM.

Regards, Barbara
-- 
Der GMX SmartSurfer hilft bis zu 70% Ihrer Onlinekosten zu sparen! 
Ideal für Modem und ISDN: http://www.gmx.net/de/go/smartsurfer

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Compulsory accounting

2007-02-14 Thread Walter Marguccio
Hello list,

which is the easiest method to make the accounting info in the jobcard
compulsory ? JES2 exit 6 ? RACF ? SMF exit ?


Walter Marguccio
z/OS Systems Programmer
Munich - Germany

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: How to delete structure from disconnected CF

2007-02-14 Thread Shane
On Wed, 2007-02-14 at 11:09 +0100, Barbara Nitz wrote:

 as far as I know, you don't. 

Well, welcome back Barbara.
Allow me to concur. Last CEC upgrade (to new series processor) we had
was done in place. Meant bringing down a CF, moving everything out to
DR, letting the CEs do their bit, define new, and move everything into
the new box.
Same serial number.
For contingency I had defined a new CF so things could be set up in
advance.

Subsequently, the third CF ghost was always with us until the 'plex
was finally dismantled completely.

Learn to live with it Kees.

Shane ...

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Compulsory accounting

2007-02-14 Thread Vernooy, C.P. - SPLXM
Walter Marguccio [EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]...
 Hello list,
 
 which is the easiest method to make the accounting info in the jobcard
 compulsory ? JES2 exit 6 ? RACF ? SMF exit ?
 
 

Much simpler: 
In JES2PARM: JOBCLASS(*) ACCT=YES 

ACCT=Yes|No 
Specifies whether an account number is required (Yes) or not required
(No) on a JCL JOB statement. 

Kees.


**
For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), 
its subsidiaries and/or its employees shall not be liable for the incorrect or 
incomplete transmission of this e-mail or any attachments, nor responsible for 
any delay in receipt.
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286 
**

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Disposition of Log data in ISPF Panel

2007-02-14 Thread Jacky Bright

Like deletion of TSO datasets. Issuing TSO commands etc.

These activities are recorded in log dataset when user logs off from the
system

dataset name like user.SPFLOG1.LIST

When user logs off user gets following option

1. Print data set and delete
2. Delete data set without printing
3. Keep data set - Same
   (allocate same data set in next session)
4. Keep data set - New
   (allocate new data set in next session)

I want to disable 1 , 2 and 4 option.


JAcky



On 2/14/07, Binyamin Dissen [EMAIL PROTECTED] wrote:


On Wed, 14 Feb 2007 12:28:28 +0530 Jacky Bright [EMAIL PROTECTED]
wrote:

:I want to force all my TSO users to keep TSO Log dataset so that
activities
:carried out by all TSO users can be recorded.

What activities?

:AS of now all users are able to delete the datasets while logging off
from
:the system.

Also during the run.

The also can turn off logging.

:How to configure this ?

What data are you truly trying to collect?

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Compulsory accounting

2007-02-14 Thread Binyamin Dissen
On Wed, 14 Feb 2007 02:28:34 -0800 Walter Marguccio
[EMAIL PROTECTED] wrote:

:which is the easiest method to make the accounting info in the jobcard
:compulsory ? JES2 exit 6 ? RACF ? SMF exit ?

The presence or validation?

A C/I parm can set it to required. 

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Russell Witt
Shane, 

From IBM's own web-site;

zIIP is designed to help free-up general computing capacity and lower software 
costs for select workloads such as business intelligence (BI), ERP and CRM on 
the mainframe. IBM will not impose software charges on zIIP capacity1.

Wonder why you believe that select workloads should be limited to DB2 only 
applications? If IBM had wanted the zIIP's to only be for DB2, they probably 
would not have allowed the interface to leave IBM. 

Russell Witt
CA-1 Level-2 Support Manager



From: Shane Ginnane [EMAIL PROTECTED]
Date: 2007/02/13 Tue PM 06:10:11 CST
To: IBM-MAIN@BAMA.UA.EDU
Subject: CA and zIIPs

Had to happen I suppose - zIIP(s) as utility engines, rather than just 
DB2 engines.

http://www3.ca.com/press/PressRelease.aspx?CID=99107

Shane ...


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Disposition of Log data in ISPF Panel

2007-02-14 Thread Binyamin Dissen
On Wed, 14 Feb 2007 17:16:59 +0530 Jacky Bright [EMAIL PROTECTED]
wrote:

:Like deletion of TSO datasets. Issuing TSO commands etc.

The former is easily handled by checking SMF.

As to the latter - They might be recordable in SMF as well. But - why? Which
commands are you interested in? What are special about them?

:These activities are recorded in log dataset when user logs off from the
:system

:dataset name like user.SPFLOG1.LIST

:When user logs off user gets following option

: 1. Print data set and delete
: 2. Delete data set without printing
: 3. Keep data set - Same
:(allocate same data set in next session)
: 4. Keep data set - New
:(allocate new data set in next session)

:I want to disable 1 , 2 and 4 option.

It also can be easily removed by issuing the LOG DELETE command. And, of
course, there is settings.

Also, it can easily be altered to produce whatever one wants it to contain.

It is not intended for the use you wish to make of it. You have to think of
what you truly wish to do, and why.

As a side point - you can use ISPF exits to track much of this. But as ISPF is
a problem state program, it is quite easy to spoof the exits.

:On 2/14/07, Binyamin Dissen [EMAIL PROTECTED] wrote:

: On Wed, 14 Feb 2007 12:28:28 +0530 Jacky Bright [EMAIL PROTECTED]
: wrote:

: :I want to force all my TSO users to keep TSO Log dataset so that
: activities
: :carried out by all TSO users can be recorded.

: What activities?

: :AS of now all users are able to delete the datasets while logging off
: from
: :the system.

: Also during the run.

: The also can turn off logging.

: :How to configure this ?

: What data are you truly trying to collect?

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread David Day
Don't know about the rest of the 'stuff' in the announcement, but the DB2 
Detector item doesn't really mean a whole lot, I don't think.  Detector gets 
it's data  by hooking the SQL PC's.  I would think that that means the 
Detector code has no choice but to run on whatever processor the operating 
system has chosen for the SQL statement.  There may be more to this, but I 
think that part of the announcement is just stating the obvious.


   --Dave


- Original Message - 
From: Shane Ginnane [EMAIL PROTECTED]

Newsgroups: bit.listserv.ibm-main
To: IBM-MAIN@BAMA.UA.EDU
Sent: Tuesday, February 13, 2007 6:10 PM
Subject: CA and zIIPs



Had to happen I suppose - zIIP(s) as utility engines, rather than just
DB2 engines.

http://www3.ca.com/press/PressRelease.aspx?CID=99107

Shane ...

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ps dataset

2007-02-14 Thread Bill Wilkie

Paul:

Arthur is correct. If you delete a dataset then ask for the same allocation, 
the system will find the best fit which is usually the space you just 
deleted so you will get the same space. If you ONLY do an allocation like an 
IEFBR14 and do not open it for output, you will not get the eof record, 
consequently access methods will read the data just fine assuming blocksize 
etc, are correct. The field name in the F1 dscb is DS1LSTAR and is the last 
block pointer.


Bill



From: Arthur T. [EMAIL PROTECTED]
Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: ps dataset
Date: Tue, 13 Feb 2007 22:45:42 -0500

On 13 Feb 2007 19:28:48 -0800, in bit.listserv.ibm-main 
(Message-ID:[EMAIL PROTECTED]) 
[EMAIL PROTECTED] (Paul Jodlowski) wrote:


I have a wierd problem, a programmer runs a job that creates a dsn 
(tst.report) then he ftp's it down to a server and then uncat/deletes it.

Later on he runs the job again expecting the dsn (tst.report) to be empty.
AND IT SHOULD BE.  Well it's not in fact it has the same data as the first 
run.  I go to 3.4 screen an try to browse the dataset but it says it is 
empty. I even ran a IEBGENER and i showed the data  (of cource we DID 
NOT run the uncat/delete step) This is all done on the same volume 
(userb4) and it is NOT sms-managed. In fact We don't HAVE any SMS-managed 
data sets.  We are running of z/os v1r7.


 I've hit this, before.  This feature goes 'way back.  I first hit 
some variation of it more than 25 years back.


 It's caused when the new allocation is in the same exact spot as the 
old (deleted) allocation was.  This is not rare enough.


 Some programs (such as ISPF's 3.4) notice that the VTOC's pointer to 
the last record (I forget its name, but it ends with STAR) is zero.  No 
records means an empty dataset, therefore it won't show any data.


 Most other programs (such as IEBGENER) will read until it hits an 
EOF.


 If you did have this under SMS management, you wouldn't have the 
problem.  When the system allocates a PS dataset on SMS dasd, it 
immediately writes an EOF.  You can see recent threads for details on 
exactly when this does and doesn't happen.



--
I cannot receive mail at the address this was sent from.
To reply directly, send to ar23hur at intergate dot com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


_
FREE online classifieds from Windows Live Expo – buy and sell with people 
you know 
http://clk.atdmt.com/MSN/go/msnnkwex001001msn/direct/01/?href=http://expo.live.com?s_cid=Hotmail_tagline_12/06


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Compulsory accounting

2007-02-14 Thread Walter Marguccio
From: Binyamin Dissen [EMAIL PROTECTED]

 The presence or validation?
 A C/I parm can set it to required. 

Binyamin,

the first thing they're asking here is a way to force people to code accounting 
info into their JCL.
To accomplish such no accont info, then jcl error request, what Kees 
mentioned is enough. 
Maybe at some point we will have the need to check or validate if the 
accounting info follows 
certain rules, i.e.  typing anything like 12345 is not allowed, it must be 
DEPTA789.

Where do you set such C/I parm as required ? 
 
Walter Marguccio
z/OS Systems Programmer
Munich - Germany

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


SHARE Forecast

2007-02-14 Thread John P Kalinich
National Weather Service Zone Forecast
Hillsborough
   
 436 AM EST WED FEB 14 2007 corrected  
 for thursday night winds  
 TODAY 
 Patchy fog early in the   
 morning...then sunny. Highs around 70 
 around tampa bay and 73 to 78 east
 and south of tampa bay. southwest 
 winds around 10 mph becoming west 10  
 to 20 mph with higher gusts by late   
 morning.  
   

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SHARE Forecast

2007-02-14 Thread R.S.

It's amazing how much Americans do care about weather forecasts. It seems to be 
national hobby. g

Disclaimer: It's obviously as off topic as whole thread.
--
Radoslaw Skorupka
Lodz, Poland



John P Kalinich wrote:

National Weather Service Zone Forecast
Hillsborough
   
 436 AM EST WED FEB 14 2007 corrected  
 for thursday night winds  
 TODAY 
 Patchy fog early in the   
 morning...then sunny. Highs around 70 
 around tampa bay and 73 to 78 east
 and south of tampa bay. southwest 
 winds around 10 mph becoming west 10  
 to 20 mph with higher gusts by late   
 morning. 




--
BRE Bank SA
ul. Senatorska 18
00-950 Warszawa
www.brebank.pl

Sd Rejonowy dla m. st. Warszawy 
XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, 
nr rejestru przedsibiorców KRS 025237

NIP: 526-021-50-88
Wedug stanu na dzie 01.01.2007 r. kapita zakadowy BRE Banku SA (w caoci 
opacony) wynosi 118.064.140 z. W zwizku z realizacj warunkowego 
podwyszenia kapitau zakadowego, na podstawie uchwa XVI WZ z dnia 21.05.2003 
r., kapita zakadowy BRE Banku SA moe ulec podwyszeniu do kwoty 118.760.528 
z. Akcje w podwyszonym kapitale zakadowym bd w caoci opacone.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Compulsory accounting

2007-02-14 Thread Binyamin Dissen
On Wed, 14 Feb 2007 04:51:45 -0800 Walter Marguccio
[EMAIL PROTECTED] wrote:

:From: Binyamin Dissen [EMAIL PROTECTED]

: The presence or validation?
: A C/I parm can set it to required. 

:the first thing they're asking here is a way to force people to code 
accounting info into their JCL.
:To accomplish such no accont info, then jcl error request, what Kees 
mentioned is enough. 
:Maybe at some point we will have the need to check or validate if the 
accounting info follows 
:certain rules, i.e.  typing anything like 12345 is not allowed, it must be 
DEPTA789.
:
:Where do you set such C/I parm as required ? 

JES2 - the JOBCLASS statement.
JES3 - the CIPARM statement.

--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SHARE Forecast

2007-02-14 Thread Carol Srna
Detroit, MI
Intermittent snow showers and windy.
Blowing and drifting snow.
High 17; wind makes it feel colder.
Winds N at 20 to 30 mph. 
Chance of snow 70%.

where are you Calgon? Beam me up Scotty, 




John P Kalinich [EMAIL PROTECTED] 
Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
02/14/2007 07:56 AM
Please respond to
IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU


To
IBM-MAIN@BAMA.UA.EDU
cc

Subject
SHARE Forecast






National Weather Service Zone Forecast
Hillsborough
 
 436 AM EST WED FEB 14 2007 corrected 
 for thursday night winds 
 TODAY 
 Patchy fog early in the 
 morning...then sunny. Highs around 70 
 around tampa bay and 73 to 78 east 
 and south of tampa bay. southwest 
 winds around 10 mph becoming west 10 
 to 20 mph with higher gusts by late 
 morning. 
 




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


ENQ management

2007-02-14 Thread Staffan Tylen
Can anyone suggest how one could provide functions similar to CA-MIM's
resource conflict notification and job requeueing without too much
programming efforts? Thanks in advance.
Staffan

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Compulsory accounting

2007-02-14 Thread Walter Marguccio
- Original Message 
From: Binyamin Dissen [EMAIL PROTECTED]

 JES2 - the JOBCLASS statement.
 JES3 - the CIPARM statement.

I have misunderstood your question, since Kees already answered. I did try 
the $TJOBCLASS(5),ACCT=Y and it works.

Thanks.

Walter Marguccio
z/OS Systems Programmer
Munich - Germany

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Chase, John
 -Original Message-
 From: IBM Mainframe Discussion List On Behalf Of Shane Ginnane
 
 Had to happen I suppose - zIIP(s) as utility engines, rather than just
 DB2 engines.
 
 http://www3.ca.com/press/PressRelease.aspx?CID=99107

Hmmm  Doesn't say one way or the other whether presence and use of
zIIPs will affect software licensing costs  Is No news [] good
news?

-jc-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Jeffrey Deaver
If IBM had wanted the zIIP's to only be
for DB2, they probably would not have
allowed the interface to leave IBM.

So how does that work?  Can anyone get the zIIP interface code and use it
without having to pay a license fee to IBM?  Or is CA paying IBM for access
to the ZIIP and that cost will eventually get passed on in their software
cost?   Just seems like both CA and IBM are giving up money for nothing
since so many of their products are MIPS or MSU based and off-loading
cycles to zIIP processors will have us staying on 'smaller' machines
longer.  Or are they just starting to realize a new cost model?

Jeffrey Deaver, Engineer
Systems Engineering
[EMAIL PROTECTED]
651-665-4231(v)
651-610-7670(p)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ENQ management

2007-02-14 Thread R.S.

Staffan Tylen wrote:

Can anyone suggest how one could provide functions similar to CA-MIM's
resource conflict notification and job requeueing without too much
programming efforts? Thanks in advance.


Do you mean ENQ management or notification of ENQ contentions ?
For management you have GRS, built in z/OS (no additional fee).
For notification you can use/modify one of the GRS samples (SYS1.SAMPLIB). It's 
called ISGECMON - ENQ contention Monitor.

Of course you can also use some auto-operator, because messages job waiting for 
dataset are sent to syslog.

--
Radoslaw Skorupka
Lodz, Poland


--
BRE Bank SA
ul. Senatorska 18
00-950 Warszawa
www.brebank.pl

Sd Rejonowy dla m. st. Warszawy 
XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, 
nr rejestru przedsibiorców KRS 025237

NIP: 526-021-50-88
Wedug stanu na dzie 01.01.2007 r. kapita zakadowy BRE Banku SA (w caoci 
opacony) wynosi 118.064.140 z. W zwizku z realizacj warunkowego 
podwyszenia kapitau zakadowego, na podstawie uchwa XVI WZ z dnia 21.05.2003 
r., kapita zakadowy BRE Banku SA moe ulec podwyszeniu do kwoty 118.760.528 
z. Akcje w podwyszonym kapitale zakadowym bd w caoci opacone.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Craddock, Chris
 Don't know about the rest of the 'stuff' in the announcement, but the
DB2
 Detector item doesn't really mean a whole lot, I don't think.
Detector
 gets
 it's data  by hooking the SQL PC's.  I would think that that means the
 Detector code has no choice but to run on whatever processor the
operating
 system has chosen for the SQL statement.  There may be more to this,
but I
 think that part of the announcement is just stating the obvious.

You're correct about that part. For Detector, it's just stating the
obvious. The whole announcement is a lot more comprehensive though.
There are products that merely observe the behavior of work on the zIIP.
They would be used for planning and tuning and other vendors have
similar function too. 

However, the real meat of the announcement is that several of our
products really are exploiting zIIP engines to offload work from the
general purpose engines. They are using the formal IBM interfaces that
allow them to run on a zIIP. So that's considerably different than just
being a casual bystander. And there will be more coming. Maybe it's not
your father's CA after all?

CC

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Disposition of Log data in ISPF Panel

2007-02-14 Thread Alan Schwartz
Depending on the size initially allocated these files will reach 16 
extents quickly.  What are you prepared to do to save and reallocate?

Alan Schwartz
Assurant Shared Business Services
Lead Systems Programmer
Phone:  651-361-4758
Fax:   651-361-5625



Jacky Bright [EMAIL PROTECTED] 
Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
02/14/2007 05:46 AM
Please respond to
IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU


To
IBM-MAIN@BAMA.UA.EDU
cc

Subject
Re: Disposition of Log data in ISPF Panel






Like deletion of TSO datasets. Issuing TSO commands etc.

These activities are recorded in log dataset when user logs off from the
system

dataset name like user.SPFLOG1.LIST

When user logs off user gets following option

 1. Print data set and delete
 2. Delete data set without printing
 3. Keep data set - Same
(allocate same data set in next session)
 4. Keep data set - New
(allocate new data set in next session)

I want to disable 1 , 2 and 4 option.


JAcky



**
This e-mail message and all attachments transmitted with it may contain legally 
privileged and/or confidential information intended solely for the use of the 
addressee(s). If the reader of this message is not the intended recipient, you 
are hereby notified that any reading, dissemination, distribution, copying, 
forwarding or other use of this message or its attachments is strictly 
prohibited. If you have received this message in error, please notify the 
sender immediately and delete this message and all copies and backups thereof.

Thank you.
**

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Patrick . Falcone
I thought that the zIIP was proprietary to IBM, I guess not anymore.  A 
couple of snippets from the DBTA 5 Minute Briefing. 
Among the CA solutions announced today is Unicenter NetMaster Network 
Management for TCP/IP, which offloads statistical analysis of packet flows 
by its Packet Analyzer component and the trace processing performed by its 
SmartTrace component to one or more zIIP engines. Another product, 
BrightStor CA-Vtape Virtual Tape System, frees up capacity on general 
purpose processors by offloading its processing to zIIP engines, thereby 
reducing the cost of tape storage while adding greater scalability and 
reliability to virtual tape implementations, CA said. Also announced was 
BrightStor Tape Encryption, which employs zIIP engines to reduce general 
processor capacity requirements, enabling customers to protect data with 
existing hardware. CA also unveiled Unicenter NeuMICS Resource Management, 
which enables system administrators to determine workloads that will 
deliver maximum ROI through the zIIP processor. 
Additional CA solutions, including the CA IDMS and CA DATACOM database 
management systems, will exploit zIIP over the next 12 to 18 months, 
according to the company. It is kind of a slow, steady build towards 
serious exploitation of the zIIP, said Re. I think where we would like 
to end up is that the customer could think of that zIIP engine almost as 
an embedded management appliance. All of the management function runs 
there, all of the stuff that you really don't want to use general 
mainframe MIPS for ends up on that zIIP engine - it saves the customer a 
lot of money and gives him a lot of flexibility about where to put these 
different product functions.




Craddock, Chris [EMAIL PROTECTED] 
Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
02/14/2007 08:45 AM
Please respond to
IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU


To
IBM-MAIN@BAMA.UA.EDU
cc

Subject
Re: CA and zIIPs






 Don't know about the rest of the 'stuff' in the announcement, but the
DB2
 Detector item doesn't really mean a whole lot, I don't think.
Detector
 gets
 it's data  by hooking the SQL PC's.  I would think that that means the
 Detector code has no choice but to run on whatever processor the
operating
 system has chosen for the SQL statement.  There may be more to this,
but I
 think that part of the announcement is just stating the obvious.

You're correct about that part. For Detector, it's just stating the
obvious. The whole announcement is a lot more comprehensive though.
There are products that merely observe the behavior of work on the zIIP.
They would be used for planning and tuning and other vendors have
similar function too. 

However, the real meat of the announcement is that several of our
products really are exploiting zIIP engines to offload work from the
general purpose engines. They are using the formal IBM interfaces that
allow them to run on a zIIP. So that's considerably different than just
being a casual bystander. And there will be more coming. Maybe it's not
your father's CA after all?

CC



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Craddock, Chris
Jeffrey Deaver asks 

 If IBM had wanted the zIIP's to only be
 for DB2, they probably would not have
 allowed the interface to leave IBM.
 
 So how does that work?  Can anyone get the zIIP interface code and use
it
 without having to pay a license fee to IBM? 

Yes. If you are an IBM PartnerWorld member you can get a license from
IBM. The license is free because in essence the vendor is offering to
provide a benefit to IBM customers. These days anything that helps
attract or retain work on the platform is in both IBM's interests and
the vendor's interests.

Once you have signed the license agreement you get access to the
interface spec. It is a pretty simple document and there are only a
small number of macro calls required to get it going. I do want to
emphasize that we are using the formal interfaces and not sneaking in
through the back door.

 Or is CA paying IBM for access to the ZIIP and that cost will
eventually
 get passed on in their software cost? 

No, we're not paying anything so there is nothing to be passed along. 

 Just seems like both CA and IBM are giving up money for nothing
 since so many of their products are MIPS or MSU based and off-loading
 cycles to zIIP processors will have us staying on 'smaller' machines
 longer.  Or are they just starting to realize a new cost model?

IBM says offload engines don't count for software MSUs and the vendor
community has a gentleman's agreement to follow suit. As far as I know
everyone is sticking by that. 

The bottom line on all of the offload engines is that the whole industry
needed a new cost model to remain competitive. There is nothing sinister
about it and IBM has given all of the vendors access to the same
resources and capabilities. A level playing field is good for everyone.

CC

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: How to delete structure from disconnected CF

2007-02-14 Thread Mark Zelden
On Wed, 14 Feb 2007 11:09:57 +0100, Barbara Nitz [EMAIL PROTECTED] wrote:

Kees,

as far as I know, you don't.

About two years back we were in a similar situation. We had to get rid of
the second CF in the sandbox sysplex, and I ended up with a sysplex CFRM
coldstart. (Despite IBM saying 'Who cares there are structures in pending
deallocate state').
The IBM opinion at that time was that there had been a mistake in defining
the CFRM policy and activating it, and unless I could either reproduce the
problem or produce the joblogs/jcl of the run that defined the
administrative policy (which of course was gone as that had been several
months earlier), it would be considered a user error.

So I guess you either have to reactivate the CF to get rid of the
structure, live with it indefinitely in a pending deallocate state or cold
start CFRM.


This is exactly why we always start with a newly formatted CFRM (and 
XCF) couple data set for disaster recovery.

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America / Farmers Insurance Group:  G-ITO
mailto:[EMAIL PROTECTED]
z/OS and OS390 expert at http://searchDataCenter.com/ateExperts/
Systems Programming expert at http://expertanswercenter.techtarget.com/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:[EMAIL PROTECTED] On Behalf Of Howard Brazee
 Sent: Tuesday, February 13, 2007 1:11 PM
 To: IBM-MAIN@BAMA.UA.EDU
 Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
 
 
 On 13 Feb 2007 10:49:55 -0800, [EMAIL PROTECTED] wrote:
 
 Or are you saying that mixed-case increases security in those rare
 shops that haven't implemented revoking IDs on wrong passwords?
 
 I think he is - but it might be more secure than in shops that require
 passwords that are so strong that people don't remember them, but
 write them down on yellow post notes.

This is easy to stop. Restrict distribution and use of yellow
post-it(tm) note paper. 

Use of post-it note paper will be considered a security violation and
subject to disciplinary action up to and including immediate
termination.

--
John McKown
Senior Systems Programmer
HealthMarkets
Keeping the Promise of Affordable Coverage
Administrative Services Group
Information Technology

The information contained in this e-mail message may be privileged
and/or confidential.  It is for intended addressee(s) only.  If you are
not the intended recipient, you are hereby notified that any disclosure,
reproduction, distribution or other use of this communication is
strictly prohibited and could, in certain circumstances, be a criminal
offense.  If you have received this e-mail in error, please notify the
sender by reply and delete this message without copying or disclosing
it. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Chase, John
 -Original Message-
 From: IBM Mainframe Discussion List On Behalf Of Craddock, Chris
 
 [ snip ]
 
 IBM says offload engines don't count for software MSUs and 
 the vendor community has a gentleman's agreement to follow 
 suit. As far as I know everyone is sticking by that. 
 
 The bottom line on all of the offload engines is that the 
 whole industry needed a new cost model to remain competitive. 
 There is nothing sinister about it and IBM has given all of 
 the vendors access to the same resources and capabilities. A 
 level playing field is good for everyone.

How about VWLC?  (Or is it there and I'm missing it?)

Any other vendor reps (ASG, Compuware, etc.) care to chime in on this?

-jc-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Disposition of Log data in ISPF Panel

2007-02-14 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:[EMAIL PROTECTED] On Behalf Of Jacky Bright
 Sent: Wednesday, February 14, 2007 5:47 AM
 To: IBM-MAIN@BAMA.UA.EDU
 Subject: Re: Disposition of Log data in ISPF Panel
 
 
 Like deletion of TSO datasets. Issuing TSO commands etc.
 
 These activities are recorded in log dataset when user logs 
 off from the
 system
 
 dataset name like user.SPFLOG1.LIST
 
 When user logs off user gets following option
 
  1. Print data set and delete
  2. Delete data set without printing
  3. Keep data set - Same
 (allocate same data set in next session)
  4. Keep data set - New
 (allocate new data set in next session)
 
 I want to disable 1 , 2 and 4 option.
 
 
 JAcky

Silly, IMO. The person can still use the LOG command to force ISPF to
switch to a new log. Then use option 3.4 to find the old log and delete
it from there.

Oh, and I doubt there is a way to stop this. At least with RACF, if the
HLQ of a dataset is the same as the user's RACF id, then the implicit
authority is ALTER, even if there exists a RACF profile which says
something else. The dataset profile is ignored in this case.

--
John McKown
Senior Systems Programmer
HealthMarkets
Keeping the Promise of Affordable Coverage
Administrative Services Group
Information Technology

The information contained in this e-mail message may be privileged
and/or confidential.  It is for intended addressee(s) only.  If you are
not the intended recipient, you are hereby notified that any disclosure,
reproduction, distribution or other use of this communication is
strictly prohibited and could, in certain circumstances, be a criminal
offense.  If you have received this e-mail in error, please notify the
sender by reply and delete this message without copying or disclosing
it. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Chase, John
 -Original Message-
 From: IBM Mainframe Discussion List On Behalf Of McKown, John
 
  -Original Message-
  From: IBM Mainframe Discussion List On Behalf Of Howard Brazee
  
  On 13 Feb 2007 10:49:55 -0800, pauls2272 wrote:
  
  Or are you saying that mixed-case increases security in those rare 
  shops that haven't implemented revoking IDs on wrong passwords?
  
  I think he is - but it might be more secure than in shops that
require 
  passwords that are so strong that people don't remember them, but 
  write them down on yellow post notes.
 
 This is easy to stop. Restrict distribution and use of yellow
 post-it(tm) note paper. 
 
 Use of post-it note paper will be considered a security 
 violation and subject to disciplinary action up to and 
 including immediate termination.

That would go over like exhaust pipe resonance in an elevator.

-jc-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: How to delete structure from disconnected CF?

2007-02-14 Thread Vernooy, C.P. - SPLXM
Vernooy, C.P. - SPLXM [EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]
t...
 Hello,
 
  
 
 I ran into an interesting situation: I have a structure in a
 disconnected CF and cannot delete it nor remove it from the
 administration. 
 
  
 

Thanks to all who replied. 
I was indeed lucky to be able to activate the CF one more time and this
cleared up the pending structure.

Kees.


**
For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), 
its subsidiaries and/or its employees shall not be liable for the incorrect or 
incomplete transmission of this e-mail or any attachments, nor responsible for 
any delay in receipt.
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286 
**

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Jeffrey Deaver
zIIP and chargeback.

So what are people doing with their internal chargeback models and the
cycles that get moved to these speciality engines?  Charging the same as CP
cycles? Some reduced amount?  Free?

Seems like they ought to perhaps still get charged something, but that it
would perhaps be quite a bit less since it seems that quite a bit of
capacity drivers are based on CP MIPS and their ripple effects on other
charges.  But how much?

Thanks.

Jeffrey Deaver, Engineer
Systems Engineering
[EMAIL PROTECTED]
651-665-4231(v)
651-610-7670(p)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Craddock, Chris
John Chase asks 
 How about VWLC?  (Or is it there and I'm missing it?)
 
 Any other vendor reps (ASG, Compuware, etc.) care to chime in on this?

Honestly I have no idea. I don't do pricing at all. That's a black art
and I would probably be hung before dawn for even having an opinion on
it.

CC

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: HSM : CHANGING TO VSAM EXTENDED

2007-02-14 Thread Friske, Michael
Since z/OS 1.5, VSAM RLS is not required in order to make the HSM MCDS,
BCDS, and OCDS an Extended Addressability data set, but as another
poster pointed out RLS provides some very nice performance benefits in a
multi-system sysplex.

You should re-consider your policy to reorganize your HSM CDS's weekly.
The article at http://www.mainstar.com/pdf/000-0112_HSM-CDS-Tng.PDF does
a good job of describing the problem you are creating by reorganizing
once a week.

You also have the option to split the MCDS into 2, 3, or 4 MCDS data
sets.  Check
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/DGT2I440/1.3.
1.13?DT=20050712201502 for more information.

Information about converting to Extended Addressability can be found at
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/DGT2I440/1.3.
1.15?DT=20050712201502.
 

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Elizabeth Black
Sent: Tuesday, February 13, 2007 8:01 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: HSM : CHANGING TO VSAM EXTENDED

It used to be a requirement that to go EA with the CDS' required that
you 
go RLS first.  We followed that route and actually found some
significant 
improvement in HSM processing times due to the RLS conversion, however,
I 
believe that now you can go EA without having to first convert to RLS 
processing.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Sorting SMF records

2007-02-14 Thread Blaicher, Chris
Look at the INCLUDE/OMIT control cards.  You should be able to do it all
in one pass of the data and skip the IFASMFDP process.

Christopher Y. Blaicher
BMC Software, Inc.
Austin Development Labs
(512) 340-6154
The comments made are my personal opinions. BMC Software, Inc. makes no
representations or promises regarding the reliability, completeness, or
accuracy of the information provided in this discussion; all readers
agree not to rely on this information or take any action against BMC
Software in response to this information.


-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of John Cassidy
Sent: Wednesday, February 14, 2007 2:45 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Sorting SMF records

Hello all,

need to sort a month of SMF data excluding specific LPAR's and one type
of
SMF record. With IFASMFDP I can filter out the SMF records, not however,
the LPAR's I want excluded.


Would anyone have any DFSORT / ICETOOL JCL handy?


TIA and regards,


J.




John Cassidy (Dipl.-Ingr.)

Berninastrasse 9

8057 Zuerich

Europe

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Ed Finnell
 
In a message dated 2/14/2007 8:57:21 A.M. Central Standard Time,  
[EMAIL PROTECTED] writes:

Honestly  I have no idea. I don't do pricing at all. That's a black art
and I would  probably be hung before dawn for even having an opinion  on
it.




I had a curiosity question. How does WLM handle zIIP'd workloads? Or if  
you're really sneaky could you run zIIPs only? Back to the Weather  Channel.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Gray, Larry - Larry A
NOTICE:
All information in and attached to the e-mail(s) below may be proprietary, 
confidential, privileged and otherwise protected from improper or erroneous 
disclosure.  If you are not the sender's intended recipient, you are not 
authorized to intercept, read, print, retain, copy, forward, or disseminate 
this message.  If you have erroneously received this communication, please 
notify the sender immediately by phone (704-758-1000) or by e-mail and destroy 
all copies of this message (electronic, paper, or otherwise).  Thank you.

You have to have at least one real CP for each zIIP CP, so you still
have to have some workload.

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Ed Finnell
Sent: Wednesday, February 14, 2007 10:08 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: CA and zIIPs

 
In a message dated 2/14/2007 8:57:21 A.M. Central Standard Time,  
[EMAIL PROTECTED] writes:

Honestly  I have no idea. I don't do pricing at all. That's a black art
and I would  probably be hung before dawn for even having an opinion  on
it.




I had a curiosity question. How does WLM handle zIIP'd workloads? Or if

you're really sneaky could you run zIIPs only? Back to the Weather
Channel.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Fault Analyzer...

2007-02-14 Thread Gibbons, Mark
Hi Thomas,

  I've got one exit working.  We had problems because maintenance (2
years ago) moved exit parameters from one input structure (stem
variable) to another.  The change was documented in the ptf but not in
the manuals at the time.  Here's the idicnf00 parms relevant to rexx  I
use to invoke the exit.

DATASETS(
  ...
  IDIEXEC (SYS1.SIDIEXEC)  /* added this library and maintain it with
umod 
*/
...
)
EXITS(CONTROL(REXX(NORIDICT)))


Beyond that the manual works pretty well.  My systems are z/os 1.7,
fault analyzer manuals are v6r1.  The books seem to match the call parms
now.

Mark


Date:Tue, 13 Feb 2007 19:42:56 +0100
From:[EMAIL PROTECTED]
Subject: Fault Analyzer...

I have some problems with IBM's Fault Analyzer regarding rexx user
exits
(manual doesn't match examples or experience, unexpected and
undocumented error messages, etc.).
I wondering if there are any good web resources (other than the manual)
or maybe even a mailing list (regarding FA) ?
Or anyone with experience and time to help me ?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Walter Farrell

On 2/13/2007 1:49 PM, [EMAIL PROTECTED] wrote:

I believe that allowing mixed-case does increase security, as it makes
the number of possible passwords of any given length much greater, and
increases the amount of time needed for brute-force password guessing.


How can you do a brute-force password guess when you have a max of 3
password attempts before the ID is revoked?

Or are you saying that mixed-case increases security in those rare
shops that haven't implemented revoking IDs on wrong passwords?




Revocation based on number of invalid attempts should (for the most 
part) prevent attacks from people actually trying to login.  It does not 
stop attacks from people who have acquired a copy of your database, and 
can thus see the encrypted data in the password fields.


Given the encrypted authentication data, and the user ID, the brute 
force attack would involve examining all possible passwords until you 
find one that generates that same encrypted data.


With mixed-case that brute force process needs to cover more possible 
passwords, and thus will take longer, on average.  You have a possible 
password space (for 8-character passwords) of 65**8 rather than 39**8.


Walt Farrell, CISSP
z/OS Security Design, IBM

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Disposition of Log data in ISPF Panel

2007-02-14 Thread Ted MacNEIL
I want to disable 1 , 2 and 4 option.

Why?
Most of that activity is journalled in SMF.

What are you going to do with the logs?
Read them; archive them?

-
Too busy driving to stop for gas!  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Fault Analyzer...

2007-02-14 Thread Gibbons, Mark
Connecting the response to the thread. Sorry.

-Original Message-
From: Gibbons, Mark 
Sent: Wednesday, February 14, 2007 7:15 AM
To: 'IBM Mainframe Discussion List'
Subject: Fault Analyzer...

Hi Thomas,

  I've got one exit working.  We had problems because maintenance (2
years ago) moved exit parameters from one input structure (stem
variable) to another.  The change was documented in the ptf but not in
the manuals at the time.  Here's the idicnf00 parms relevant to rexx  I
use to invoke the exit.

DATASETS(
  ...
  IDIEXEC (SYS1.SIDIEXEC)  /* added this library and maintain it with
umod 
*/
...
)
EXITS(CONTROL(REXX(NORIDICT)))


Beyond that the manual works pretty well.  My systems are z/os 1.7,
fault analyzer manuals are v6r1.  The books seem to match the call parms
now.

Mark


Date:Tue, 13 Feb 2007 19:42:56 +0100
From:[EMAIL PROTECTED]
Subject: Fault Analyzer...

I have some problems with IBM's Fault Analyzer regarding rexx user
exits
(manual doesn't match examples or experience, unexpected and
undocumented error messages, etc.).
I wondering if there are any good web resources (other than the manual)
or maybe even a mailing list (regarding FA) ?
Or anyone with experience and time to help me ?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


SV: Fault Analyzer...

2007-02-14 Thread thomas . berg
Hi Mark,

I have no problem with getting the exit to run (I do like You do), but I have 
these problems:

1.  When displaing program areas using EVALUATE  ADDRESS(259AC050) 
LENGTH(4000)   REXX(STORAGE(RXVAR) UNFORMATTED) and then IDIWRITE 'DATA 
4000(raw data)' I'm sometimes getting (typically one of several similar 
displays for a dump): FAULTA: Syntax error, one or more closing parenthesis 
missing - command terminated 
 +++ RC(8) +++  
   
Since I don't find this error message in the manual (or elsewhere) and the 
message don't makes sense for me I have a problem.
 
2.  In the manual the syntax of the IDIWRITE command is IDIWRITE varname (or 
just IDIWRITE plus buffer usage).
But in the examples from IBM they solely uses the format (example): IDIWRITE 
'LInvalid TCB at Address ADDR TCB/ADDR/L'.
Furthermore, when I tried to use the format from the manual I got error 
messages.

The second is of course no showstopper but still irritating. 

TIA

Thomas Berg   IT Utveckling   Swedbank AB (Publ) 
 

 -Ursprungligt meddelande-
 Från: IBM Mainframe Discussion List 
 [mailto:[EMAIL PROTECTED] För Gibbons, Mark
 Skickat: den 14 februari 2007 16:15
 Till: IBM-MAIN@BAMA.UA.EDU
 Ämne: Fault Analyzer...
 
 Hi Thomas,
 
   I've got one exit working.  We had problems because 
 maintenance (2 years ago) moved exit parameters from one 
 input structure (stem
 variable) to another.  The change was documented in the ptf 
 but not in the manuals at the time.  Here's the idicnf00 
 parms relevant to rexx  I use to invoke the exit.
 
 DATASETS(
   ...
   IDIEXEC (SYS1.SIDIEXEC)  /* added this library and maintain 
 it with umod */ ...
 )
 EXITS(CONTROL(REXX(NORIDICT)))
 
 
 Beyond that the manual works pretty well.  My systems are z/os 1.7,
 fault analyzer manuals are v6r1.  The books seem to match the 
 call parms
 now.
 
 Mark
 
 
 Date:Tue, 13 Feb 2007 19:42:56 +0100
 From:[EMAIL PROTECTED]
 Subject: Fault Analyzer...
 
 I have some problems with IBM's Fault Analyzer regarding rexx user
 exits
 (manual doesn't match examples or experience, unexpected and
 undocumented error messages, etc.).
 I wondering if there are any good web resources (other than 
 the manual)
 or maybe even a mailing list (regarding FA) ?
 Or anyone with experience and time to help me ?
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ps dataset

2007-02-14 Thread Ted MacNEIL
If you ONLY do an allocation like an 
IEFBR14 and do not open it for output, you will not get the eof record,

I don't believe that is 100% accurate.
If you have a data class (optional under SMS),
the file will be opened by SMS, therebye creating an EOF (iirc).

-
Too busy driving to stop for gas!  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: EMC's DASD replication

2007-02-14 Thread Bruce Black
EMCSAFI is an EMC low-level API module.  There is a large manual that 
describes how to use it.


Are they suggesting that you write your own API calls instead of using 
the EMC high-level programs?  That seems like an extreme solution.


--
Bruce Black
Senior Software Developer
Innovation Data Processing

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Ed Finnell
 
In a message dated 2/14/2007 8:44:43 A.M. Central Standard Time,  
[EMAIL PROTECTED] writes:

That  would go over like exhaust pipe resonance in an  elevator.




Shoot, we got fixes for everything
_http://www.jcwhitney.com/autoparts/Product/tf-Browse/s-10101/Pr-p_Product.CAT
ENTRY_ID:2012155/p-2012155/N-111+10201+600015810/c-10101_ 
(http://www.jcwhitney.com/autoparts/Product/tf-Browse/s-10101/Pr-p_Product.CATENTRY_ID:2012155/p-2
012155/N-111+10201+600015810/c-10101) 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Hal Merritt
(Soap box deployed) 

You can make such policies, but folks will find ways to cope. We point a
fire hose of passwords to manage at the poor user. 

I argue it is best to attack a root problem rather than try to pile on
fix after fix. 

In response to Walt's wise words: yes the *individual* password may be
technically stronger, but we have to consider the larger picture. It is
one thing if that were the *only* password the user had to manage, but
quite another if the user has to fumble with many. 

Same goes for those tokens. Those are wonderful gadgets and offer a
strong solution. But just how many do we expect the average user to
carry? Two? Ten? The solution does not look to scale well. 

(Soap box secured)  

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of McKown, John
Sent: Wednesday, February 14, 2007 8:31 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
 
 I think he is - but it might be more secure than in shops that require
 passwords that are so strong that people don't remember them, but
 write them down on yellow post notes.

This is easy to stop. Restrict distribution and use of yellow
post-it(tm) note paper. 

Use of post-it note paper will be considered a security violation and
subject to disciplinary action up to and including immediate
termination.

--
John McKown
Senior Systems Programmer
HealthMarkets
Keeping the Promise of Affordable Coverage
Administrative Services Group
Information Technology
 
NOTICE: This electronic mail message and any files transmitted with it are 
intended exclusively
for the individual or entity to which it is addressed. The message, together 
with any attachment, may contain confidential and/or privileged
information. Any unauthorized review, use, printing, saving, copying, 
disclosure 
or distribution is strictly prohibited. If you have received this message in 
error, please immediately
advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


ESP under Z/os 1.7 Heads up

2007-02-14 Thread Hal Merritt
We run the ESP scheduler formally offered by Cybermation, now by CA. We
upgraded one of two LPARs in a basic sysplex from z/os 1.4 to 1.7. 

A mission critical feature of the scheduler is detecting when data sets
are created or modified (dataset triggers).  That feature does not seem
to be working under 1.7. 

We are working with CA for a resolution.  

HTH. 
 

NOTICE: This electronic mail message and any files transmitted with it are 
intended exclusively
for the individual or entity to which it is addressed. The message, together 
with any attachment, may contain confidential and/or privileged
information. Any unauthorized review, use, printing, saving, copying, 
disclosure 
or distribution is strictly prohibited. If you have received this message in 
error, please immediately
advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Paul Gilmartin
In a recent note, Walter Farrell said:

 Date: Tue, 13 Feb 2007 12:57:00 -0500
 
 You're right, though, that all the applications that are passing the
 password along need to know to leave it as the user entered it.  That
 makes migrating to mixed-case passwords harder than it would have been
 if we'd made the security product do the upper-casing of the input many
 years ago.
 
A similar principle should have been applied to data set and member
name transformation and enforcement -- this should have been done
in a single common component at a low layer.  If the intent of the
Data Management design was to have a mixed case file system, all
names should be taken as-is.  If the intent was to have a single-case
file system, any attempted use of the other case should result
in a syntax error.  If the intent was to have a case-insensitive
file system, a low level component should perform the translation.

Alas, Conway's law took its pernicious toll.  The design groups
didn't communicate and did not form a common objective.  In
consequence, allocation assumes mixed-case and takes names as-is.
JCL and Catalog assume single-case and treat most uses of lower
case as syntax errors.  And TSO et. al. assume case-insensitive
and convert to upper before calling lower level layers.

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: EMC's DASD replication

2007-02-14 Thread Liliane L. Clever
I am not familiar with the module you mention 
beyond the fact that it is a SAF interface.  If 
the EMC software you are using for the RESTORE 
does not provide you with an automatic way to 
bypass the WTOR, you might want to create an MPF 
exit to automatically answer the prompt.


Liliane

At 05:43 PM 2/13/2007, Ping Chiao wrote:

We are a CA's ACF2 shop under z/OS and using EMC's DASD replication for
Disaster Recovery purposes.
When issue 'RESTORE' of thousands of DASD devices, you need to respond
to prompt messages of each and every single one of the DASD device.  We
asked EMC on 'Bypassing' those prompt messages and replies, EMC gave us
a module called 'EMCSAFI'.
Does anybody have any knowledge of working on this module?
Things I'd like to find out are:
1.ACF2 set up, such as CLASMAP, SAFDEF, …, etc.
2.Changes in this assembler source module on BYPASS-WTOR in FULL
   or PARTIAL-RESTORE
 I'd appreciate if someone would share the experience with me.

Regards,
Ping Chiao


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Liliane Clever
SunGard Higher Education/Temple University
Lead Systems Programmer
1-215-204-6411 (Office) ; 1-215-204-1817 (Fax)
[EMAIL PROTECTED] ; [EMAIL PROTECTED]
www.sungardhe.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Howard Brazee
On 14 Feb 2007 06:31:32 -0800, [EMAIL PROTECTED] (McKown, John)
wrote:

 I think he is - but it might be more secure than in shops that require
 passwords that are so strong that people don't remember them, but
 write them down on yellow post notes.

This is easy to stop. Restrict distribution and use of yellow
post-it(tm) note paper. 

Use of post-it note paper will be considered a security violation and
subject to disciplinary action up to and including immediate
termination.

LOL!

Trouble is, that's almost as bad as what is actually happening.

Individual shops can (but don't) spend the money for fingerprint
readers - I'm not sure if that solution would work universally (if
Microsoft, Apple, and Red Hat included standard ID software in their
operating systems).

It could be that everybody's waiting for someone else to solve the
problem for the Net instead of fixing their in-shop problem now.   The
payback time for getting fingerprint readers isn't that large for
those with desktop computers.And if they are combined with good
cryptology, the security advantage for laptops is tremendous.

VPN software companies should be offering integration now.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: EMC's DASD replication

2007-02-14 Thread Tom Moulder
Ping

Perhaps it would help if we knew what you were trying to accomplish in
disaster recovery and the reason that EMC displays the WTOR and requires a
reply.  There may be another way to accomplish your purpose that does not
require the replies.

Two general observations might also help you.  The customers that I have
worked with for disaster recovery operations have used some form of SRDF and
that process does not require any operator replies to function properly.
Especially not for thousands of individual devices.  Also, the restore
operation when it is used as a full volume restore is a destructive
operation that requires verifying the VOLSER.  You want to think carefully
before you overwrite standard volumes without some process to verify that
the source and target were actually paired together at one time and
represent the same volume.

Tom Moulder


-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Ping Chiao
Sent: Tuesday, February 13, 2007 4:43 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: EMC's DASD replication

We are a CA's ACF2 shop under z/OS and using EMC's DASD replication for
Disaster Recovery purposes.
When issue 'RESTORE' of thousands of DASD devices, you need to respond
to prompt messages of each and every single one of the DASD device.  We
asked EMC on 'Bypassing' those prompt messages and replies, EMC gave us
a module called 'EMCSAFI'.
Does anybody have any knowledge of working on this module?
Things I'd like to find out are:
1.ACF2 set up, such as CLASMAP, SAFDEF, …, etc.
2.Changes in this assembler source module on BYPASS-WTOR in FULL
   or PARTIAL-RESTORE
 I'd appreciate if someone would share the experience with me.

Regards,
Ping Chiao


-- 
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.5.441 / Virus Database: 268.17.39/686 - Release Date: 2/14/2007
7:54 AM
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Blaicher, Chris
z/IIP work loads are only enclave SRB mode units of work, and then only
for an enclave that you set up for working in a z/IIP.

One way to get your license to use the z/IIP interface terminated is to
try and dispatch TCB work on a z/IIP.

I didn't say this, but if I know about all this, do you think we aren't
looking at utilizing z/IIP processors?  I don't do marketing or pricing,
but at this point in time, it seems z/IIP mips will not be used in mip
based pricing, at least by BMC.

Christopher Y. Blaicher
BMC Software, Inc.
Austin Development Labs
(512) 340-6154
The comments made are my personal opinions. BMC Software, Inc. makes no
representations or promises regarding the reliability, completeness, or
accuracy of the information provided in this discussion; all readers
agree not to rely on this information or take any action against BMC
Software in response to this information.


-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Ed Finnell
Sent: Wednesday, February 14, 2007 9:08 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: CA and zIIPs

 
In a message dated 2/14/2007 8:57:21 A.M. Central Standard Time,  
[EMAIL PROTECTED] writes:

Honestly  I have no idea. I don't do pricing at all. That's a black art
and I would  probably be hung before dawn for even having an opinion  on
it.




I had a curiosity question. How does WLM handle zIIP'd workloads? Or if

you're really sneaky could you run zIIPs only? Back to the Weather
Channel.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Sorting SMF records

2007-02-14 Thread John Cassidy
Hello all,

need to sort a month of SMF data excluding specific LPAR's and one type of
SMF record. With IFASMFDP I can filter out the SMF records, not however,
the LPAR's I want excluded.


Would anyone have any DFSORT / ICETOOL JCL handy?


TIA and regards,


J.




John Cassidy (Dipl.-Ingr.)

Berninastrasse 9

8057 Zuerich

Europe



John Cassidy (Dipl.-Ingr.)

Berninastrasse 9

8057 Zuerich

Europe

Telephone: +41 (0) 43 300 4602

Mobile:+41 (0) 79 207 3268


E-Mail: [EMAIL PROTECTED]

http://www.JDCassidy.net

http://www.europeunited.org

http://en.wikipedia.org/wiki/Europe_United

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Ted MacNEIL
immediate termination.

With or without prejudice?

-
Too busy driving to stop for gas!  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: VTAM session information - rewording of an earlier question.

2007-02-14 Thread Pommier, Rex R.
Richard,

I'll try to provide more details.   

We have historically been a RUMBA shop, using RUMBA for normal telnet
traffic going to our z9.  We also have an application that uses RUMBA
HLLAPI interfaces for screen scraping into other software packages.
Recently management decided they wanted to switch our emulator from
RUMBA to HOD.  (political decision that I can't do anything about)
Anyway, once the developers started messing with HOD, we have
occasionally had the situation where a block of LUs will become
unavailable to RUMBA.  When this happens, the victim will get a black
screen in RUMBA.  The LUname will show on the RUMBA screen, but our TPX
session manager main screen will fail to appear.  The user will
disconnect/reconnect, getting the next LUname and probably another black
screen.  Eventually they will get a session and TPX will come up.  If,
in the middle of this, the person tries to connect with HOD, they will
get right in.  

I think it is a timing issue of some sort but haven't been able to track
it down.  Hence, I was hoping to get some kind of historical VTAM LU
session start/end records and compare them (brute force) to the SMF 119
records out of TCPIP.  Unfortunately I know nothing about HOD and the
setup they used on it.

Rex

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Richard Peurifoy
Sent: Tuesday, February 13, 2007 5:16 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: VTAM session information - rewording of an earlier
question.

Pommier, Rex R. wrote:
 Unfortunately Netview isn't part of my software mix.  At one time 
 years ago, we had netspy from CA and I would assume it gave me that 
 capability as well.  I was hoping that VTAM would cut SMF records 
 out-of-the-box, but it appears as though it doesn't.
 
 I'm sure mgmt would never allow me the time to build an exit to gather

 the information either.  Thanks for the info.
 

Can you provide more detail on your problem, maybe there is another way
to look at it.

--
Richard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Paul Gilmartin
In a recent note, Howard Brazee said:

 Date: Wed, 14 Feb 2007 09:34:55 -0700
 
 Individual shops can (but don't) spend the money for fingerprint
 readers - I'm not sure if that solution would work universally (if
 Microsoft, Apple, and Red Hat included standard ID software in their
 operating systems).
 
Isn't it merely a matter of time, though, before the technology
arises to spoof fingerprint readers?  Then we'll need to be
concerned not only that a dishonest waiter copies our credit
cards, but that a dishonest busboy lifts our fingerprints from
the water glasses.  Fingerprints don't impress me as a good
secret.

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ps dataset

2007-02-14 Thread Alan Scott
This is exactly correct for a non-sms managed dataset. If you do an 
allocate and never open the dataset you will not get an EOF. Any old data 
at that allocation will be readable with the correct dcb.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Sorting SMF records

2007-02-14 Thread sbarry


The JCL below provides an example with SMF/LPAR selection.  Refer to the DFSORT 
documentation at the DFSORT home page link below for details.


Sincerely,

Scott Barry
SBBWorks, Inc.

http://www-304.ibm.com/jct01004c/systems/support/storage/software/sort/mvs/

//S1   EXEC PGM=SORT,PARM=ABEND
//SYSOUT   DD   SYSOUT=*
//SORTIN   DD   DSN=smf.input,...

//SORTOUT  DD   DSN=smf.output,...
//SYSINDD   *  
OPTION VLSHRT,VLSCMP  
* COPY/SUBSET SMFJOB FILE FOR TYPE 30

SORT FIELDS=(11,4,PD,A,7,4,BI,A)
* SELECT ONLY TYPE 30 and 26.
INCLUDE COND=((6,1,BI,EQ,30,OR,6,1,BI,EQ,26),AND,
 (15,4,SS,EQ,C'SYSA,SYSB,SYSZ')) 
/*



John Cassidy wrote:

Hello all,

need to sort a month of SMF data excluding specific LPAR's and one type of SMF 
record. With IFASMFDP I can filter out the SMF records, not however, the LPAR's 
I want excluded.

Would anyone have any DFSORT / ICETOOL JCL handy?

TIA and regards,

J.

John Cassidy (Dipl.-Ingr.)
Berninastrasse 9
8057 Zuerich
Europe

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Howard Brazee
On 14 Feb 2007 09:14:34 -0800, [EMAIL PROTECTED] (Paul Gilmartin)
wrote:

Isn't it merely a matter of time, though, before the technology
arises to spoof fingerprint readers?  Then we'll need to be
concerned not only that a dishonest waiter copies our credit
cards, but that a dishonest busboy lifts our fingerprints from
the water glasses.  Fingerprints don't impress me as a good
secret.

As with all security needs, the technology will need to improve to
match the moving target of criminals.   We don't know far behind the
8-ball our credit cards technologies or our currency technologies are
- but we trust them enough so they work for our current needs.   I
suspect we are more vulnerable than we would like to admit here.

We know passwords are failing though.And the primary reason is we
need too many passwords all over the place - security needs to work
the way people work.

A couple or a few decades ago I read a SF story - the protagonist
appeared to be a criminal and one thing he did was pull the
fingerprint off a rich person to make a bunch of luxury purchases. It
turns out he worked for the good guys, and was testing the system for
a bet.At the end of the story, he made another bet for 6 months in
the future - after his co-workers changed the technology for such
things as making sure that the fingerprint came from a conscious
person.   In that world, such crime appeared to be rare - but the
process made sense anyway.   (I tend to believe that Vernor Vinge's
example of the danger of ubiquitous law enforcement is more likely to
be true).

What direction do we need to go for logon security? 

The problem of counterfeiting is also a problem that extends beyond
paper money - counterfeiting data can effect us all over.   Google
recently added software to counter Google Bombs (miserable failure).
It's not hard to extrapolate this concept to all Information
Processing.  

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Rick Fochtman

Ed Finnell wrote:



In a message dated 2/14/2007 8:44:43 A.M. Central Standard Time,  
[EMAIL PROTECTED] writes:


That  would go over like exhaust pipe resonance in an  elevator.



 


Shoot, we got fixes for everything
_http://www.jcwhitney.com/autoparts/Product/tf-Browse/s-10101/Pr-p_Product.CAT
ENTRY_ID:2012155/p-2012155/N-111+10201+600015810/c-10101_ 
(http://www.jcwhitney.com/autoparts/Product/tf-Browse/s-10101/Pr-p_Product.CATENTRY_ID:2012155/p-2
012155/N-111+10201+600015810/c-10101) 
 


uh, Ed... ???

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Applications Life Cycle Management

2007-02-14 Thread Mike Brauweiler
Is anyone using a z/OS Applications Life Cycle Management system supplied by
someone other than CA or IBM?

Mike Brauweiler

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Ed Finnell
 
In a message dated 2/14/2007 12:11:50 P.M. Central Standard Time,  
[EMAIL PROTECTED] writes:

uh, Ed...  ???





Just trying to reduce the back pressure on the manifolds. Search  
jcwhitney

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Sorting SMF records

2007-02-14 Thread John Cassidy
Scott,

will give it a whirl tomorrow, appreciate the tip.


Regards,

John


O n Wed, February 14, 2007 18:51, [EMAIL PROTECTED] wrote:


 The JCL below provides an example with SMF/LPAR selection.  Refer to the
 DFSORT documentation at the DFSORT home page link below for details.



 Sincerely,


 Scott Barry
 SBBWorks, Inc.


 http://www-304.ibm.com/jct01004c/systems/support/storage/software/sort/mv
 s/

 //S1   EXEC PGM=SORT,PARM=ABEND
 //SYSOUT   DD   SYSOUT=*
 //SORTIN   DD   DSN=smf.input,...
 //SORTOUT  DD   DSN=smf.output,...
 //SYSINDD   *
 OPTION VLSHRT,VLSCMP
 * COPY/SUBSET SMFJOB FILE FOR TYPE 30
 SORT FIELDS=(11,4,PD,A,7,4,BI,A)
 * SELECT ONLY TYPE 30 and 26.
 INCLUDE COND=((6,1,BI,EQ,30,OR,6,1,BI,EQ,26),AND,
 (15,4,SS,EQ,C'SYSA,SYSB,SYSZ'))
 /*
 



E-Mail: [EMAIL PROTECTED]

http://www.JDCassidy.net

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Hal Merritt
Doesn't anyone watch the Discovery Channel show Mythbusters? There was
one episode where they defeated a fingerprint based lock. 

They did not disclose the details on how they accomplished one critical
step, but, hey, we know it can be done. 


-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Paul Gilmartin
Sent: Wednesday, February 14, 2007 11:14 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

In a recent note, Howard Brazee said:
  
Isn't it merely a matter of time, though, before the technology
arises to spoof fingerprint readers?  Then we'll need to be
concerned not only that a dishonest waiter copies our credit
cards, but that a dishonest busboy lifts our fingerprints from
the water glasses.  Fingerprints don't impress me as a good
secret.

-- gil
-- 
StorageTek
INFORMATION made POWERFUL
 
NOTICE: This electronic mail message and any files transmitted with it are 
intended exclusively
for the individual or entity to which it is addressed. The message, together 
with any attachment, may contain confidential and/or privileged
information. Any unauthorized review, use, printing, saving, copying, 
disclosure 
or distribution is strictly prohibited. If you have received this message in 
error, please immediately
advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Rick Fochtman

-snip---
Doesn't anyone watch the Discovery Channel show Mythbusters? There was 
one episode where they defeated a fingerprint based lock.


They did not disclose the details on how they accomplished one critical 
step, but, hey, we know it can be done.

unsnip--
Let's face it; no matter what security we devise, it will only serve to 
keep honest people out. Sooner or later, the criminally-inclined will 
find a steal-around.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Kirk Talman
And if your token is used with a laptop for remote access, don't store the 
token in the laptop case, even in your own house.

IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU wrote on 02/14/2007 
11:08:34 AM:

 Same goes for those tokens. Those are wonderful gadgets and offer a
 strong solution. But just how many do we expect the average user to
 carry? Two? Ten? The solution does not look to scale well. 


-
The information contained in this communication (including any
attachments hereto) is confidential and is intended solely for the
personal and confidential use of the individual or entity to whom
it is addressed. The information may also constitute a legally
privileged confidential communication. If the reader of this
message is not the intended recipient or an agent responsible for
delivering it to the intended recipient, you are hereby notified
that you have received this communication in error and that any
review, dissemination, copying, or unauthorized use of this
information, or the taking of any action in reliance on the
contents of this information is strictly prohibited. If you have
received this communication in error, please notify us immediately
by e-mail, and delete the original message. Thank you

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


BAD VVRS?

2007-02-14 Thread Lester, Bob
Hi,

 

   I'm converting some volumes to SMS and have a VSAM file that:

 

*   Was created and cataloged on a particular volume.
*   The catalog was then deleted.
*   The file was deleted, but the VVR was not. (?)
*   The file was recreated and cataloged in a different catalog on
the same volume.
*   The file is accessible and can be opened with no errors.
*   I seem to have 2 VVRs for the file, one good - one bad.

 

   CONVERTV TEST reports the following:

 

ADR724E (001)-FMSCT(03), ERROR DURING LOCATE OF DATA SET INFORMATION FOR
DATA SET VPFDT.CHKORD.MFDM0C0G IN CATALOG 

 TSGDP.CAT.SYSTEST, 01-AM-00012-00068


CMI RETURN INFORMATION IS : AH-4-00120


IGW01068T UNEXPECTED RESULTS FROM A CATALOG LOCATE REQUEST. RETURN CODE
WAS 4  

. REASON CODE WAS X'0078'


 

   To fix this, I've been backing up the file, doing an IDCAMS delete
(which takes a non-zero return code), then running a DELVVR on the
files.  Then I reload the file and all is fine.  I verify this by
running CONVERTV TEST.

 

   Is there an easier way to do a DELVVR for a VVR that points to a
non-existent catalog? 

 

TIA,

*BobL*

 


--
This e-mail transmission may contain information that is proprietary, 
privileged and/or confidential and is intended exclusively for the person(s) to 
whom it is addressed. Any use, copying, retention or disclosure by any person 
other than the intended recipient or the intended recipient's designees is 
strictly prohibited. If you are not the intended recipient or their designee, 
please notify the sender immediately by return e-mail and delete all copies. 
OppenheimerFunds may, at its sole discretion, monitor, review, retain and/or 
disclose the content of all email communications.
==

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Anne Lynn Wheeler

Howard Brazee wrote:

As with all security needs, the technology will need to improve to
match the moving target of criminals.   We don't know far behind the
8-ball our credit cards technologies or our currency technologies are
- but we trust them enough so they work for our current needs.   I
suspect we are more vulnerable than we would like to admit here.

We know passwords are failing though.And the primary reason is we
need too many passwords all over the place - security needs to work
the way people work.


collection of posts over the past year about deployment of hardware tokens in 
that market segment ... and some of the related vulnerabilities and exploits
http://www.garlic.com/~lynn/subintegrity.html#yescard

recent thread in crypto list
http://www.garlic.com/~lynn/aadsm26.htm#32 Failure of PKI in messaging
http://www.garlic.com/~lynn/aadsm26.htm#33 Failure of PKI in messaging
http://www.garlic.com/~lynn/aadsm26.htm#34 Failure of PKI in messaging

and somewhat related thread that preceeded it
http://www.garlic.com/~lynn/aadsm26.htm#26 man in the middle, SSL
http://www.garlic.com/~lynn/aadsm26.htm#27 man in the middle, SSL
http://www.garlic.com/~lynn/aadsm26.htm#28 man in the middle, SSL
http://www.garlic.com/~lynn/aadsm26.htm#30 man in the middle, SSL
http://www.garlic.com/~lynn/aadsm26.htm#31 man in the middle, SSL

as repeatedly mentioned in the above ... (SSL) encryption involved hiding the 
account number while it moved thru the internet ... for what came to be called electronic 
commerce.

in the mid-90s, the x9a10 financial standard working group had been given the 
requirement to preserve the integrity of the financial infrastructure for all 
retail payments. this resulted in the x9.59 financial standard
http://www.garlic.com/~lynn/x959.html#x959
http://www.garlic.com/~lynn/subpubkey.html#x959

if you look at the security PAIN acronym

P - privacy (or somethings CAIN for confidentiality, i.e. security by hiding 
information)
A - authentication
I - integrity
N - non-repudiation

in effect, x9.59 financial standard substituted authentication and integrity for 
privacy. part of this was the diametrically opposing requirements placed on account numbers. at 
one end, the requirement to keep account numbers confidential and never allowed to be divulged. at the other 
end, dozens of business processes that require ready and general access to the account number. this led to my 
periodic comment that even if the planet was buried under miles of (information hiding) encryption, it still 
wouldn't be able to prevent account number leakage.

now, part of the password paradigm analysis is from the standpoint of 3-factor 
authentication:
http://www.garlic.com/~lynn/subintegrity.html#3factor

* something you know (i.e. pins and passwords)
* something you have (i.e. hardware tokens)
* something you are (i.e. biometrics)

pins and passwords ... have commoningly been deployed as shared secrets. This 
has resulted in a security requirement for a unique shared secret for every unique 
security domain (as countermeasure to cross domain attacks). Other security requirements 
have required passwords to be impossible to guess (as countermeasure to  guessing 
attacks) ... which also tends to have the side-effect that they are impossible to 
remember.

40-50 years ago, when a person was possibly involved in only a single security domain ... and only 
had a single password to remember ... the password (shared-secret something you 
know) paradigm was somewhat tolerable. However, as typical number of unique security domain 
participation by individuals has grown to scores ... the scores of related passwords have become 
unmanageable.
http://www.garlic.com/~lynn/subintegrity.html#secrets

now, one of the assumptions in the domain of multi-factor authentication ... 
is the security is better based on (frequently implicit) assumption that the different 
factors are subject to independent vulnerabilities. however, there are a number of 
technology attacks that can invalidate such a assumption ... being able to compromise 
multi-factor authentication in a single exploit.

For instance, in the previously mentioned yes card exploit, there is an assumption about multi-factor authentication 
... with a chip-token as a something you have authentication in conjunction with a PIN as something you 
know. However, part of the yes card exploit is being able to counterfeit the YES in response to 
query whether the correct PIN was entered
(i.e. YES is the response regardless of what PIN is entered, negating any 
requirement for actually needing to know the correct PIN).
http://www.garlic.com/~lynn/subintegrity.html#yescard

and a recent somewhat long running general thread
http://www.garlic.com/~lynn/2007.html#0 Securing financial transactions a high 
priority for 2007
http://www.garlic.com/~lynn/2007.html#5 Securing financial transactions a high 
priority for 2007
http://www.garlic.com/~lynn/2007.html#6 Securing financial 

Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Gray, Larry - Larry A
NOTICE:
All information in and attached to the e-mail(s) below may be proprietary, 
confidential, privileged and otherwise protected from improper or erroneous 
disclosure.  If you are not the sender's intended recipient, you are not 
authorized to intercept, read, print, retain, copy, forward, or disseminate 
this message.  If you have erroneously received this communication, please 
notify the sender immediately by phone (704-758-1000) or by e-mail and destroy 
all copies of this message (electronic, paper, or otherwise).  Thank you.

I saw that episode.  Both of the main people using different methods
were able to defeat the fingerprint based lock once they obtained the
fingerprint of the person that programmed the lock.

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Hal Merritt
Sent: Wednesday, February 14, 2007 1:46 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

Doesn't anyone watch the Discovery Channel show Mythbusters? There was
one episode where they defeated a fingerprint based lock. 

They did not disclose the details on how they accomplished one critical
step, but, hey, we know it can be done. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ESP under Z/os 1.7 Heads up

2007-02-14 Thread Neil Duffee
At 14 Feb 2007 16:18:34 GMT, concerning ESP under Z/os 1.7 Heads 
up, Hal Merritt [EMAIL PROTECTED] wrote (to IBM-Main):   

 We run the ESP scheduler formally offered by Cybermation, now by CA.
 We upgraded one of two LPARs in a basic sysplex from z/os 1.4 to 1.7. 
 
 A mission critical feature of the scheduler is detecting when data
 sets are created or modified (dataset triggers).  That feature does not
 seem to be working under 1.7. 
 
 We are working with CA for a resolution.  

Hal:  the problem might be specific to SysPlex as we've been z/OS 
v1.7 here since the fall without problems.  However, we're a 
MonoPlex.  I just cycled our test Cics region and the triggered job 
was run.  I've pasted some information that you might use for 
comparison values with CA.  (Yeah, I wasn't thrilled with the call 
last fall that Cybermation had sold out.)

Misc details:
z/OS v1.7 (MonoPlex), 2-way z890, ESP v5.4.0

d iplinfo:
D IPLINFO
IEE254I  16.03.16 IPLINFO DISPLAY 435
 SYSTEM IPLED AT 08.57.26 ON 01/20/2007
 RELEASE z/OS 01.07.00LICENSE = z/OS
 ARCHLVL = 2   MTLSHARE = N

d m=cpu:
CPC SI = 2086.250.IBM.02.

ESP STC log information:
ESP499I ESP RELEASE 5.4.0 INITIALIZED, SUBSYS ESP
15.39.35 WED 14FEB07 EVENTEX:
ADABAS.NCILOG_GENERIC SCHEDULED, DSTRIG, UNCONDITIONAL

The event definition:
/*/
/* DEFINED BY NDUFFEE  AT 09.54 ON TUE  8OCT2002 */
/*/
EVENT ID(ADABAS.NCILOG_GENERIC)  SYSTEM(UODP)  REPLACE
INVOKE 'DBSP.UTILITY.CNTL(ESPSYMBL)'
SUBMIT 'DBSP.UTILITY.CNTL(NCILOG)'
DSTRIG DBDI.DC07.NCILOG JOB(DC07-) ANYCLOSE
DSTRIG DBDD.DC10.NCILOG JOB(DC10-) ANYCLOSE
DSTRIG DBDD.DC15.NCILOG JOB(DC15-) ANYCLOSE
DSTRIG DBDQ.DCQA.NCILOG JOB(DCQA-) ANYCLOSE
DSTRIG DBDQ.DC25.NCILOG JOB(DC25-) ANYCLOSE
DSTRIG DBDQ.DC26.NCILOG JOB(DC26-) ANYCLOSE
DSTRIG DBDP.DCTO.NCILOG JOB(DCTO-) ANYCLOSE
DSTRIG DBDP.DC51.NCILOG JOB(DC51-) ANYCLOSE
DSTRIG DBDP.DC52.NCILOG JOB(DC52-) ANYCLOSE
DSTRIG DBDP.DC53.NCILOG JOB(DC53-) ANYCLOSE
DSTRIG DBDP.DC54.NCILOG JOB(DC54-) ANYCLOSE
DSTRIG DBDP.DC60.NCILOG JOB(DC60-) ANYCLOSE

From the submitted job:
//* SUBMITTED BY ESP AT 15.39.35 ON WEDNESDAY FEBRUARY 14TH, 2007
//* SYSTEM UODP, SUBSYSTEM ESP
//* REQUESTED BY EVENT ADABAS.NCILOG_GENERIC
//* EVENT TRIGGERED BY USER DC07JOB
//* TRIGGERED ON CREATION BY JOB DC07CICS
//*   OF DATA SET DBDI.DC07.NCILOG
//* JCL FROM DBSP.UTILITY.CNTL(NCILOG)
//*
//**JCLLIB ORDER=(DBSI.UTILITY.CNTL)
//*
//*  ESP variable values
//*  %CICS = 07
//*  %CICSTS13 = .CICSTS13
//*  %DB2HLEV  = INS
//*  %DB2VER   = 610
//*  %ENV  = I
//*  %ESPTRDSN = DBDI.DC07.NCILOG
//*  %ESPUSER  = NDUFFEE
//*

--  signature = 6 lines follows --
Neil Duffee, Joe SysProg, U d'Ottawa, Ottawa, Ont, Canada
telephone:1 613 562 5800 x4585 fax:1 613 562 5161
mailto:NDuffee of uOttawa.ca http:/ /aix1.uottawa.ca/ ~nduffee
How *do* you plan for something like that? Guardian Bob, Reboot
For every action, there is an equal and opposite criticism.
Systems Programming: Guilty, until proven innocent John Norgauer 
2004

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Shane Ginnane
Rus wrote on 14/02/2007 10:35:46 PM:

 
 zIIP is designed to help free-up general computing capacity and 
 lower software costs for select workloads such as business 
 intelligence (BI), ERP and CRM on the mainframe. IBM will not impose
 software charges on zIIP capacity1.
 
 Wonder why you believe that select workloads should be limited to 
 DB2 only applications? If IBM had wanted the zIIP's to only be for 
 DB2, they probably would not have allowed the interface to leave IBM. 

What makes you think I think that ...   :-)
IBM put particular (marketing) effort into projecting the zIIP as a DB2 
benefit. You and I and everybodies dog knew that creating an entity that 
could be dispatched on a zIIP just needed a little (non published) 
interface info.
Not all the people capable of doing that work for ISVs or are Partnerworld 
members.
For a lot of us that info *hasn't* left IBM.

Shane ...

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:[EMAIL PROTECTED] On Behalf Of Shane Ginnane
 Sent: Wednesday, February 14, 2007 3:40 PM
 To: IBM-MAIN@BAMA.UA.EDU
 Subject: Re: CA and zIIPs
 
 
 Rus wrote on 14/02/2007 10:35:46 PM:
 
  
  zIIP is designed to help free-up general computing capacity and 
  lower software costs for select workloads such as business 
  intelligence (BI), ERP and CRM on the mainframe. IBM will not impose
  software charges on zIIP capacity1.
  
  Wonder why you believe that select workloads should be limited to 
  DB2 only applications? If IBM had wanted the zIIP's to only be for 
  DB2, they probably would not have allowed the interface to 
 leave IBM. 
 
 What makes you think I think that ...   :-)
 IBM put particular (marketing) effort into projecting the 
 zIIP as a DB2 
 benefit. You and I and everybodies dog knew that creating an 
 entity that 
 could be dispatched on a zIIP just needed a little (non published) 
 interface info.
 Not all the people capable of doing that work for ISVs or are 
 Partnerworld 
 members.
 For a lot of us that info *hasn't* left IBM.
 
 Shane ...

The same with using a zAAP, I'll bet. Curiously, due to an error in my
installing Java 1.5, I even know the IBM supplied module which does it.
Of course, I don't know how to properly invoke that module.

--
John McKown
Senior Systems Programmer
HealthMarkets
Keeping the Promise of Affordable Coverage
Administrative Services Group
Information Technology

The information contained in this e-mail message may be privileged
and/or confidential.  It is for intended addressee(s) only.  If you are
not the intended recipient, you are hereby notified that any disclosure,
reproduction, distribution or other use of this communication is
strictly prohibited and could, in certain circumstances, be a criminal
offense.  If you have received this e-mail in error, please notify the
sender by reply and delete this message without copying or disclosing
it. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: VTAM session information - rewording of an earlier question.

2007-02-14 Thread Richard Peurifoy

Pommier, Rex R. wrote:

Richard,

I'll try to provide more details.   


We have historically been a RUMBA shop, using RUMBA for normal telnet
traffic going to our z9.  We also have an application that uses RUMBA
HLLAPI interfaces for screen scraping into other software packages.
Recently management decided they wanted to switch our emulator from
RUMBA to HOD.  (political decision that I can't do anything about)
Anyway, once the developers started messing with HOD, we have
occasionally had the situation where a block of LUs will become
unavailable to RUMBA.  When this happens, the victim will get a black
screen in RUMBA.  The LUname will show on the RUMBA screen, but our TPX
session manager main screen will fail to appear.  The user will
disconnect/reconnect, getting the next LUname and probably another black
screen.  Eventually they will get a session and TPX will come up.  If,
in the middle of this, the person tries to connect with HOD, they will
get right in.  


I think it is a timing issue of some sort but haven't been able to track
it down.  Hence, I was hoping to get some kind of historical VTAM LU
session start/end records and compare them (brute force) to the SMF 119
records out of TCPIP.  Unfortunately I know nothing about HOD and the
setup they used on it.



It sounds like the TCP LU is occasionally being left connected to
some application and the RUMBA connection is landing in the middle
of it. Do you have LOSTERM=IMMED coded on the VTAM appl definitions
being used by TCP?

Have you displayed the LU in VTAM when RUMBA gets a dead connection
(D NET,ID=luname,E)? When the user disconnect does it still look the same?

What does TCP show (D TCPIP,tcpjobname,T,CONN,LUN=luname)

The TPX log also shows LOGON, SIGNON, SIGNOFF, and LOGOFF as well as
TPX virtual terminal connect/disconnect. TPX can also be configured
to log this to SMF.

Is TPX your default appl in TCP, or are you using the TCP USS screens
(or some other solicitor)?


--
Richard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: BAD VVRS?

2007-02-14 Thread Friske, Michael
All of the product that help maintain catalogs have the ability to
delete a specific VVR.  The main ones are T-REX from Dino-Software,
Catalog Recovery Plus from Mainstar, and Catalog Solutions from EMC.
 

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Lester, Bob
Sent: Wednesday, February 14, 2007 2:03 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: BAD VVRS?

Hi,

 

   I'm converting some volumes to SMS and have a VSAM file that:

 

*   Was created and cataloged on a particular volume.
*   The catalog was then deleted.
*   The file was deleted, but the VVR was not. (?)
*   The file was recreated and cataloged in a different catalog on
the same volume.
*   The file is accessible and can be opened with no errors.
*   I seem to have 2 VVRs for the file, one good - one bad.

 

   CONVERTV TEST reports the following:

 

ADR724E (001)-FMSCT(03), ERROR DURING LOCATE OF DATA SET INFORMATION FOR
DATA SET VPFDT.CHKORD.MFDM0C0G IN CATALOG 

 TSGDP.CAT.SYSTEST, 01-AM-00012-00068


CMI RETURN INFORMATION IS : AH-4-00120


IGW01068T UNEXPECTED RESULTS FROM A CATALOG LOCATE REQUEST. RETURN CODE
WAS 4  

. REASON CODE WAS X'0078'


 

   To fix this, I've been backing up the file, doing an IDCAMS delete
(which takes a non-zero return code), then running a DELVVR on the
files.  Then I reload the file and all is fine.  I verify this by
running CONVERTV TEST.

 

   Is there an easier way to do a DELVVR for a VVR that points to a
non-existent catalog? 

 

TIA,

*BobL*

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


JES confusion on a specific job

2007-02-14 Thread Pommier, Rex R.
Hi list.  

This is probably a case of not seeing the forest due to the trees, but
here goes.

We are z/OS 1.4, JES2, and running control-m for a job scheduler.  I
have certain jobs that show up differently under SDSF depending on how I
look at them.  Because of this apparent disparity, job output that is
supposed to be going away isn't.  In my case, output class H is
normally deleted by a JES2 automatic command run every night, if the
output is more than 18 hours old.  Output class X is cleaned up after
90 days.

Here is an example of one such job that is confusing me:

Here are a few lines from the job output:

-- JES2 JOB STATISTICS --

  09 NOV 2006 JOB EXECUTION DATE

   59 CARDS READ

1,258 SYSOUT PRINT RECORDS

0 SYSOUT PUNCH RECORDS

   89 SYSOUT SPOOL KBYTES

 0.03 MINUTES EXECUTION TIME

1 //WSCSY069 JOB ,BUSSERV,   PHOENIX DAILY REPORT PRINTING
JOB08907
  // CLASS=A,MSGCLASS=H,MSGLEVEL=(1,1),REGION=4096K,

  // COND=(8,LT)



Here is what the DSID list looks like, if I look at it via the SDSF ST
screen:


SDSF JOB DATA SET DISPLAY - JOB WSCSY069 (JOB08907)LINE 1-5 (5)

COMMAND INPUT ===
SCROLL === CSR  
PREFIX=WSCSY069  DEST=(ALL)  OWNER=*  SYSNAME=

NP  DDNAME   StepName   ProcStep DSID OwnerC Dest
Rec-Cnt Page-CntByte-CntCC 
JESMSGLG JES2 2 BMCU H LOCAL
19 1,353  1 
JESJCL   JES2 3 BMCU H LOCAL
154 9,394  1 
JESYSMSG JES2 4 BMCU H LOCAL
106 6,127  1 
SYSPRINT NONCAT2  CONTROLR  101 BMCU H LOCAL
44 2,382  1 
DAPRENV  NONCAT2  CONTROLR  118 BMCU H LOCAL
47222,856  1 


Here is the same job DSID list if I look at it going through the SDSF O
screen:


SDSF JOB DATA SET DISPLAY - JOB WSCSY069 (JOB08907)LINE 1-5 (5)

COMMAND INPUT ===
SCROLL === CSR  
PREFIX=WSCSY069  DEST=(ALL)  OWNER=*  SYSNAME=

NP  DDNAME   StepName ProcStep DSID OwnerC Dest
Rec-Cnt Page-CntByte-CntCC  
JESMSGLG JES2 2 BMCU X LOCAL
19 1,353  1   1 11  
JESJCL   JES2 3 BMCU X LOCAL
154 9,394  1   1 11  
JESYSMSG JES2 4 BMCU X LOCAL
106 6,127  1   1 11  
SYSPRINT NONCAT2  CONTROLR  101 BMCU X LOCAL
44 2,382  1   1 11  
DAPRENV  NONCAT2  CONTROLR  118 BMCU X LOCAL
47222,856  1   1 11  


How is it that the same job shows the output in class H at one point
but class X at another?   My guess is that it has something to do with
control-m, but I can't prove that.  If it is control-m, how can I fix it
so that the output purges when it is supposed to?

TIA

Rex

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


XCF Performance Question

2007-02-14 Thread Hal Merritt
We think we may have some performance issue with XCF. We are looking at
the RMF reports, but still confused. Can anyone suggest some metric to
focus on that would be an indication of goodness or badness?

Thanks!

 

NOTICE: This electronic mail message and any files transmitted with it are 
intended exclusively
for the individual or entity to which it is addressed. The message, together 
with any attachment, may contain confidential and/or privileged
information. Any unauthorized review, use, printing, saving, copying, 
disclosure 
or distribution is strictly prohibited. If you have received this message in 
error, please immediately
advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ps dataset

2007-02-14 Thread dick scherrer

Hello,

These were recently posted in this thread (about things that can go thud 
when a dataset is allocated but not used).


For SMS-managed datasets, this phenomenon goes away as SMS writes an EOF on
the first track on the new dataset.
and
If you did have this under SMS management, you
wouldn't have the problem.  When the system allocates a PS
dataset on SMS dasd, it immediately writes an EOF.  You can
see recent threads for details on exactly when this does
and doesn't happen.

If a dataset is allocated under sms management via JCL/IEFBR14 will it 
ALWAYS raise an end of file on the first read? A physical eof is written 
even though the dataset was never referenced other than alloc/de-alloc? My 
confusion is due to the last part of the preceeding quote when this does 
and doesn't happen.


Thanx,

d.sch.

_
Turn searches into helpful donations. Make your search count. 
http://click4thecause.live.com/search/charity/default.aspx?source=hmemtagline_donationFORM=WLMTAG


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA and zIIPs

2007-02-14 Thread Craddock, Chris
 
 The same with using a zAAP, I'll bet. Curiously, due to an error in my
 installing Java 1.5, I even know the IBM supplied module which does
it.
 Of course, I don't know how to properly invoke that module.

Not exactly. There is NO external interface to the zAAP. You get on it
simply by running JAVA code in the IBM JVM. On the other hand, zIIP
engines have a set of formal macro interfaces that enable work to run on
them.

CC

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ps dataset

2007-02-14 Thread Ron Hawkins
Ted,

While a DATACLAS can be used to provide attributes for a non-SMS dataset, it
is the presence of a STORCLAS that actually denotes an SMS managed dataset,
which in turn gives you all the good things that come with SMS.

Ron

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
 Behalf Of Ted MacNEIL
 Sent: Thursday, 15 February 2007 12:11 AM
 To: IBM-MAIN@BAMA.UA.EDU
 Subject: Re: ps dataset
 
 If you ONLY do an allocation like an
 IEFBR14 and do not open it for output, you will not get the eof record,
 
 I don't believe that is 100% accurate.
 If you have a data class (optional under SMS),
 the file will be opened by SMS, therebye creating an EOF (iirc).
 
 -
 Too busy driving to stop for gas!
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mixed Case Password on z/OS 1.7 and ACF 2 Version 8

2007-02-14 Thread Ted MacNEIL
Sooner or later, the criminally-inclined will find a steal-around.


Let's all go home.
Let's all dig a hole in our back-yard.
Let's all put food, clothing, hygenic material, and favourite entertainment 
material in there (free, otherwise they have our contact info).
Let's then pull the dirt over us.
Then, we are protected from the 'criminally-inclined'.

Or, we can live/enjoy our lives and realise there is a risk to everything we do.

Yes, there may/will be a steal-around, but as with anything else, we can work 
with what we have and improve as improvements come.

PS: how did describing crooks and crooked activity become politically correct?
Criminally-inclined? Steal-around?
I mean, REALLY!

Crooks and theft?

(8-{}

Nyuk! Nyuk! Nyuk!

-
Too busy driving to stop for gas!  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ps dataset

2007-02-14 Thread Ted MacNEIL
If a dataset is allocated under sms management via JCL/IEFBR14 will it ALWAYS 
raise an end of file on the first read? A physical eof is written even though 
the dataset was never referenced other than alloc/de-alloc?

Data Class is the only optional construct under SMS.
If you have it defined for the dataset (through the ACS routines) the EOF will 
be there.
SMS opens and closes the data set to ensure the DCB is enforced.
Without it, and without SMS, this is not done.

Funny, I thought I said this a day or so ago.
Either my post didn't go through, or nobody read it.


-
Too busy driving to stop for gas!  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ps dataset

2007-02-14 Thread Ted MacNEIL
While a DATACLAS can be used to provide attributes for a non-SMS dataset, it
is the presence of a STORCLAS that actually denotes an SMS managed dataset,
which in turn gives you all the good things that come with SMS.

Yes. I know that.
But, the dataset has to be SMS-Managed and have a data class (optional) for the 
EOF to be written.

I wasn't going into the detail of how a dataset becomes SMS managed, rather 
what is required when it is SMS managed.

There is no EOF written with IEFBR14 allocating a dataset that is not SMS 
Managed.
-
Too busy driving to stop for gas!  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: JES confusion on a specific job

2007-02-14 Thread John S. Giltner, Jr.

Do you have any OUTPUT cards in the jobs?

One of the things we used to do is have print go to two classes.  One 
that automaticaly went to $AVER and one that stayed on the SPOOL for 48 
hours.  So each print had two output  classes.  We have stopped this 
pratice and we did not have SDSF at that time so I am not sure how it 
would have looked.



Pommier, Rex R. wrote:
Hi list.  


This is probably a case of not seeing the forest due to the trees, but
here goes.

We are z/OS 1.4, JES2, and running control-m for a job scheduler.  I
have certain jobs that show up differently under SDSF depending on how I
look at them.  Because of this apparent disparity, job output that is
supposed to be going away isn't.  In my case, output class H is
normally deleted by a JES2 automatic command run every night, if the
output is more than 18 hours old.  Output class X is cleaned up after
90 days.

Here is an example of one such job that is confusing me:

Here are a few lines from the job output:

-- JES2 JOB STATISTICS --

  09 NOV 2006 JOB EXECUTION DATE

   59 CARDS READ

1,258 SYSOUT PRINT RECORDS

0 SYSOUT PUNCH RECORDS

   89 SYSOUT SPOOL KBYTES

 0.03 MINUTES EXECUTION TIME

1 //WSCSY069 JOB ,BUSSERV,   PHOENIX DAILY REPORT PRINTING
JOB08907
  // CLASS=A,MSGCLASS=H,MSGLEVEL=(1,1),REGION=4096K,


  // COND=(8,LT)



Here is what the DSID list looks like, if I look at it via the SDSF ST
screen:


SDSF JOB DATA SET DISPLAY - JOB WSCSY069 (JOB08907)LINE 1-5 (5)

COMMAND INPUT ===
SCROLL === 	CSR  	 
PREFIX=WSCSY069  DEST=(ALL)  OWNER=*  SYSNAME=


NP  DDNAME   StepName   ProcStep DSID OwnerC Dest
Rec-Cnt 	Page-Cnt 	Byte-Cnt 	CC 
 	JESMSGLG JES2 2 BMCU H LOCAL
19 1,353  1 
 	JESJCL   JES2 3 BMCU H LOCAL
154 9,394  1 
 	JESYSMSG JES2 4 BMCU H LOCAL
106 6,127  1 
 	SYSPRINT NONCAT2  CONTROLR  101 BMCU H LOCAL
44 2,382  1 
 	DAPRENV  NONCAT2  CONTROLR  118 BMCU H LOCAL
47222,856  1 



Here is the same job DSID list if I look at it going through the SDSF O
screen:


SDSF JOB DATA SET DISPLAY - JOB WSCSY069 (JOB08907)LINE 1-5 (5)

COMMAND INPUT ===
SCROLL === 	CSR  	 
PREFIX=WSCSY069  DEST=(ALL)  OWNER=*  SYSNAME=


NP  DDNAME   StepName ProcStep DSID OwnerC Dest
Rec-Cnt Page-CntByte-CntCC  
JESMSGLG JES2 2 BMCU X LOCAL
19 1,353  1   1 11  
 	JESJCL   JES2 3 BMCU X LOCAL
154 9,394  1   1 11  
 	JESYSMSG JES2 4 BMCU X LOCAL
106 6,127  1   1 11  
 	SYSPRINT NONCAT2  CONTROLR  101 BMCU X LOCAL
44 2,382  1   1 11  
 	DAPRENV  NONCAT2  CONTROLR  118 BMCU X LOCAL
47222,856  1   1 11  



How is it that the same job shows the output in class H at one point
but class X at another?   My guess is that it has something to do with
control-m, but I can't prove that.  If it is control-m, how can I fix it
so that the output purges when it is supposed to?

TIA

Rex


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


ISPF profile PDS

2007-02-14 Thread David Speake
We frequently bring in contract programmers and give each one a TSO userid
starting with R followed by contractor's id (my own is RXJ67). The X
indicates contractor. If the individual is later hired as a regular
employee, the number  changes. For individuals on board for several months
or even years before the changeover, this sometimes causes significant
unhappyness and loss of productivity for a few days to a couple of weeks
depending on how heavily they have customized their environments.

I shot from the lip and suggested copying the old profile data set to the
new account name. After I reviewed my own PDS at the indirect suggestion of
the  manager of our tech support section, I think less of the idea. My
simplest out may be to just stand in front of a mirror and give myself the
same horse laugh... oh well. The number of places my old id would appear
left me  a bit chastened. I suspect some of them would cause little if any
problem but others might not let me use certain functions

Has anyone addressed/resolved  this type of issue. Can a usefull mapping
make be made here or am I out of luck.
TSO.RXJ67.ISPPROF is my current profile data set mame.
Were it to change, under the current scenario, I would limp for SEVERAL
weeks.

David (glutton for punishment) Speake

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ISPF profile PDS

2007-02-14 Thread Ted MacNEIL
After I reviewed my own PDS at the indirect suggestion of the  manager of our 
tech support section, I think less of the idea.

It's not supported, but do the following:
1. Using your contract ID, copy to the new file.
2. Using your contract ID, edit the PDS (it's FB80 - text).
3. Do a global change in each member to change the ID. Including the first 
record. Some may wrap, so check it out.
4. Sign on with your new I'd.
5. Repeat as necessary.

It may take a half-hour, but it beats a manual re-build.

I know. I have done it.

I've even used 3.14 to search the PDS to ensure I didn't miss anything.

Or, you could rebuild from scratch.

And, if it doesn't work the first time, you still have the original source 
ISPPROF.
Copy. Edit. Repeat if necessary.

-
Too busy driving to stop for gas!  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ps dataset

2007-02-14 Thread Ron Hawkins
Ted,

I've searched for a definitive reference on this but nothing turned up
quickly. However, every reference I did find specifies that the EOF is
written for SMS Managed Datasets.

A DATACLAS can be used by both SMS and non-SMS managed datasets, but a
dataset is not SMS managed unless it has a STORCLAS and ultimately gets
allocated to an SMS Volume.

So I'm led to believe that the presence of a DATACLAS does not cause SMS to
write an EOF when allocating a non-SMS dataset.

Ron

 
 Data Class is the only optional construct under SMS.
 If you have it defined for the dataset (through the ACS routines) the EOF
 will be there.
 SMS opens and closes the data set to ensure the DCB is enforced.
 Without it, and without SMS, this is not done.
 
 Funny, I thought I said this a day or so ago.
 Either my post didn't go through, or nobody read it.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ps dataset

2007-02-14 Thread Thomas H Puddicombe
ISTR that SMS will put an EOF at the beginning of a newly allocated
SMS-managed dataset if/when SMS determines that the dataset's DSORG=PS.  It
didn't seem to matter if this information came from the DATACLAS or DD
statement.

I don't remember where it was documented, only that I stumbled across it
while on a mission to eliminate datasets that HSM wouldn't migrate because
they'd never been opened.

Tom


This is a PRIVATE message. If you are not the intended recipient, please
delete without copying and kindly advise us by e-mail of the mistake in
delivery. NOTE: Regardless of content, this e-mail shall not operate to
bind CSC to any order or other contract unless pursuant to explicit written
agreement or government initiative expressly permitting the use of e-mail
for such purpose.





   
 Ron Hawkins   
 [EMAIL PROTECTED] 
 LE.COMTo 
 Sent by: IBM  IBM-MAIN@BAMA.UA.EDU
 Mainframe  cc 
 Discussion List   
 [EMAIL PROTECTED] Subject 
 .EDU Re: ps dataset  
   
   
 02/14/2007 07:44  
 PM
   
   
 Please respond to 
   IBM Mainframe   
  Discussion List  
 [EMAIL PROTECTED] 
   .EDU   
   
   




Ted,

I've searched for a definitive reference on this but nothing turned up
quickly. However, every reference I did find specifies that the EOF is
written for SMS Managed Datasets.

A DATACLAS can be used by both SMS and non-SMS managed datasets, but a
dataset is not SMS managed unless it has a STORCLAS and ultimately gets
allocated to an SMS Volume.

So I'm led to believe that the presence of a DATACLAS does not cause SMS to
write an EOF when allocating a non-SMS dataset.

Ron


 Data Class is the only optional construct under SMS.
 If you have it defined for the dataset (through the ACS routines) the EOF
 will be there.
 SMS opens and closes the data set to ensure the DCB is enforced.
 Without it, and without SMS, this is not done.

 Funny, I thought I said this a day or so ago.
 Either my post didn't go through, or nobody read it.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ps dataset

2007-02-14 Thread Ted MacNEIL
So I'm led to believe that the presence of a DATACLAS does not cause SMS to
write an EOF when allocating a non-SMS dataset.

I thought that's what I said.
If I wasn't clear, I said:

It has to be SMS-Managed.
It has to have a data class.

I never said that a data class would guarantee an EOF for non-SMS.

I've checked my posts, and only a typo would say anything different.

I never delved in the details of how to get a data set SMS managed.
I just stated that it had to be!

-
Too busy driving to stop for gas!  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ps dataset

2007-02-14 Thread Ted MacNEIL
ISTR that SMS will put an EOF at the beginning of a newly allocated
SMS-managed dataset if/when SMS determines that the dataset's DSORG=PS.

No DCB! No EOF!

-
Too busy driving to stop for gas!  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ps dataset

2007-02-14 Thread Ron Hawkins
Ted,

You said, somewhat ambiguously:

If you have a data class (optional under SMS),
the file will be opened by SMS, therebye creating an EOF (iirc).

This is what I was responding to. You later added that a STORCLAS (SMS
Managed) is also required.

My understanding is that DATACLAS is not required, only DSORG=PS for an SMS
Managed Dataset as posted by Tom Puddicombe.

Ron

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
 Behalf Of Ted MacNEIL
 Sent: Thursday, 15 February 2007 9:14 AM
 To: IBM-MAIN@BAMA.UA.EDU
 Subject: Re: ps dataset
 
 So I'm led to believe that the presence of a DATACLAS does not cause SMS
 to
 write an EOF when allocating a non-SMS dataset.
 
 I thought that's what I said.
 If I wasn't clear, I said:
 
 It has to be SMS-Managed.
 It has to have a data class.
 
 I never said that a data class would guarantee an EOF for non-SMS.
 
 I've checked my posts, and only a typo would say anything different.
 
 I never delved in the details of how to get a data set SMS managed.
 I just stated that it had to be!
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ps dataset

2007-02-14 Thread Ted MacNEIL
If you have a data class (optional under SMS),
the file will be opened by SMS, therebye creating an EOF (iirc).

I thought I implied SMS.

If I missed a step, sorry.

Consistency is the hobgoblin of little minds.

(8-{}

-
Too busy driving to stop for gas!  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ISPF profile PDS

2007-02-14 Thread Pinnacle
- Original Message - 
From: David Speake [EMAIL PROTECTED]

Newsgroups: bit.listserv.ibm-main
Sent: Wednesday, February 14, 2007 7:26 PM
Subject: ISPF profile PDS



We frequently bring in contract programmers and give each one a TSO userid
starting with R followed by contractor's id (my own is RXJ67). The X
indicates contractor. If the individual is later hired as a regular
employee, the number  changes. For individuals on board for several months
or even years before the changeover, this sometimes causes significant
unhappyness and loss of productivity for a few days to a couple of weeks
depending on how heavily they have customized their environments.

I shot from the lip and suggested copying the old profile data set to the
new account name. After I reviewed my own PDS at the indirect suggestion 
of

the  manager of our tech support section, I think less of the idea. My
simplest out may be to just stand in front of a mirror and give myself the
same horse laugh... oh well. The number of places my old id would appear
left me  a bit chastened. I suspect some of them would cause little if any
problem but others might not let me use certain functions


David,

The id embedded in the PROFILE table members should not be a problem if it's 
in the TIR (table information record).  If the userid is actually in a 
profile variable, you could use the PDS (file 182 at www.cbttabe.org) 
REPLACE function to fix the userid in all members.  Wraps could be a 
problem, you would have to IEBIBALL those or write a Rexx exec to deal with 
wraps.  Email me offline if you have questions.


Regards,
Tom Conley 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html