Re: What (More) Open Source Software for z/OS?
I appreciate the responses, but please (also) post them to the comment thread at The Mainframe Blog: http://mainframe.typepad.com/blog/2009/04/what-more-open-source-software-do-you-want-for-zos.html That'll make sure they get read as widely as possible. Unfortunately some of the people interested in your wishlists aren't reading IBM-MAIN, including particular open source project leaders. For what it's worth, I agree that open source for z/OS should actually be open source. In fact, it would be best if any z/OS-related changes were maintained in the mainline open source project repository rather than as a "fork." If at all possible. Thanks, everybody. - - - - - Timothy Sipples IBM Consulting Enterprise Software Architect Based in Tokyo, Serving IBM Japan / Asia-Pacific E-Mail: timothy.sipp...@us.ibm.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Servicelink and ActiveX controls
Skip, to see what security options you have active, either in control panel/Internet options or under the IE tab Tools-Internet options go to the security tab-custom level. That shows you how your security options are currently set. There are a number of Active X things. I have disabled "Download unsigned activeX controls", "Initialize and script ActiveX controls not marked as save". I also only "Run ActiveX controls and plugins" which are "Administrator approved". In addition, I don't allow "Paste operations via script" and I disabled "Scripting of Java Applets". You do need admin rights to your PC to see these. One or several of these give me a pop-up window for every ETR screen that tells me "Your current security settings prohibit execution of ActiveX controls. Some content may not display correctly". I am used to that warning, as it usually occurs for advertising banners and does not affect the display. But lately and now also for servicelink IE terminates, forcing me to re-login. I have to allow all of these unsafe settings in order to display the ETRs and make updates to them. (Which also makes the screen content change at a disturbing rate for the ads - terrible when things are moving back and forth!) The appearance of the ETR pages has not changed at all, as far as I can see. Which makes me think that *something* is spying on me and every ETR user. (No, I am not paranoid.:-) ) We had changes (a 'reboot' according to the news pages) on April 19th. This is what the event viewer tells me for this thing: The description for Event ID ( 1001 ) in Source ( Microsoft Internet Explorer ) cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer. The following information is part of the event: 242546696. and The description for Event ID ( 1000 ) in Source ( Microsoft Internet Explorer ) cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer. The following information is part of the event: iexplore.exe; 6.0.2800.1106; unknown; 0.0.0.0; 560f7400. which translates to 'application failure iexplorer at offset 560f700'. I guess this restart window is a more modern form of Dr.Watson. Yes, I complained to Servicelink/IBM, but they tend to ignore me :-( especially as I cannot get to those pages! Regards, Barbara -- Pt! Schon vom neuen GMX MultiMessenger gehört? Der kann`s mit allen: http://www.gmx.net/de/go/multimessenger01 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: METAL C: CodeGen defeciency?
On Wed, Apr 22, 2009 at 6:25 PM, Paul Gilmartin wrote: > On Wed, 22 Apr 2009 13:36:13 -0400, Thomas David Rivers wrote: > >>Johnny Luo wrote: >>> Hi, >>> >>> I was trying new METAL option of XL C and the following is the HLASM code >>> generated : >>> >>> * { >>> * char a[20]="12345"; >>> MVC 88(6,13),0(11) > > Is that the actual initialization, in which case the next 4 > instructions are incomprehensible? > >>> MVI @74a+6,0 >>> MVC @74a+7(13),@74a+6 >>> MVI @74a+6,0 >>> MVC @74a+7(13),@74a+6 >>> * return; >>> * } >>> > I wouldn't expect it to move 13 characters to assign a 5-character > (well, 6, counting the terminating NUL) in a 20-character buffer. > It is initializing the rest of the automatic storage to zeros (twice), which probably has to do with the compiler options in effect. I can't say why it is done twice; seems like a bug to me. I would suggest that you compile the same thing with the regular XLC compiler and look at the generated assembler listing to see if it does the same thing (double zeroing). Interesting that they didn't use XC, isn't it? If you spend any time looking at XLC generated code you will see lots of interesting stuff. Of particular interest is some of the loop unwinding optimizations. After a while you start to wonder if you should ever write in assembler again, since only IBM knows what instruction heuristics slide through the pipelines the best. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: METAL C: CodeGen defeciency?
On Wed, 22 Apr 2009 13:36:13 -0400, Thomas David Rivers wrote: >Johnny Luo wrote: >> Hi, >> >> I was trying new METAL option of XL C and the following is the HLASM code >> generated : >> >> * { >> *char a[20]="12345"; >> MVC 88(6,13),0(11) Is that the actual initialization, in which case the next 4 instructions are incomprehensible? >> MVI @74a+6,0 >> MVC @74a+7(13),@74a+6 >> MVI @74a+6,0 >> MVC @74a+7(13),@74a+6 >> * return; >> * } >> I wouldn't expect it to move 13 characters to assign a 5-character (well, 6, counting the terminating NUL) in a 20-character buffer. >> It initialized the buffer twice! I cannot think of why. Is it normal? >> >> >Not to point too many fingers, but since we did it first, >here's what Systems/C did with Johnny's example: > >* * >* *** char a[20]="12345"; > LA14,@lit_6_0 > MVC 96(6,13),0(14) Wouldn't it work to: MVC 96(6,13),@lit_6_0 ...? If the LA works you have addressability. Yah, I know; I've worked with (simple) code generators. I probably don't understand the environmental constraints. Perhaps as simple as the optimizer detected a need for R14 subsequently. >* setting 14 bytes to 0x00 > XC102(14,13),102(13) > You're only trying to help the programmer, but perhaps thereby thwarting the intent of a deliberate Dirty GETMAIN. >* *** return; >* *** } -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: System REXX usage
I pieced together a small routine to bring down my sandbox gracefully, but I have yet to try it on the two larger LPARs. My biggest concern is that there is a limit of 30 seconds (I think) for EXEC to run. From: IBM Mainframe Discussion List [ibm-m...@bama.ua.edu] On Behalf Of John McKown [joa...@swbell.net] Sent: Wednesday, April 22, 2009 8:53 AM To: IBM-MAIN@bama.ua.edu Subject: Re: System REXX usage On Wed, 22 Apr 2009 07:48:11 -0500, Bob wrote: >Just wondering if we could get a list going of some interesting SYSTEM REXX >uses and tools... to get the creative ideas flowing or does this already exist >somewhere (haven't found it yet). > >Peace, > >bob h I agree. I'm not really "getting" when and how I would use System REXX. Yes, I've read the chapter in the book. -- John -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Data masking/data disguise Primer 1) WHY
> -Original Message- > From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On > Behalf Of Patrick O'Keefe > Sent: Wednesday, April 22, 2009 4:50 PM > To: IBM-MAIN@bama.ua.edu > Subject: Re: Data masking/data disguise Primer 1) WHY > > On Wed, 22 Apr 2009 10:39:29 -0400, Farley, Peter x23353 > wrote: > >Neither the customer nor the USPS appreciate or long tolerate > >incorrect zip codes. > > Huh? Neither the customer not the USPS would see output based > test data. If you mean that the application would produce incorrect > zip codes based because it wasn't test enogh using the test data, > then that points to a problem with the code or the test data. I didn't think at that point that I was talking about test data, which is usually only needed before an application goes live. Post-implementation production problems are the ones that require production data to resolve. You can't fix a problem unless you can reproduce the problem, and that, of necessity, requires the data that caused the problem in the first place -- which usually means real production data. The idea I was trying to get across there is the case where a glitch has turned up in the production stream and the programmer is charged with fixing that glitch. In my hypothetical zip-code scenario, I presumed that the problem could be wrong real zip-codes being generated for real customer addresses, leading to undeliverable mail or complaints from USPS that mail is being returned as "no such person this address". My thesis is that the programmer cannot debug such a glitch without using the real production data that originally caused the problem. Zip-code may not be as good an example as I hoped it would be. You are right, of course, that in designing how to mask private information in such an application the keys to the zip-code database would be masked in the same way as the production data, so that the zip-code could be looked up without actually knowing or seeing the "real" address information. Only the final printing application would unmask the address to print it for mailing. I still firmly believe that there are many other examples where "the real data" needs to be used to successfully debug an application problem, and therefore "masked" data will of necessity be seen "unmasked" by the debugging application programmer. When PII data is central to the business process at hand, it will be unavoidable for programmers to be able to see and manipulate such data in order to do their jobs successfully. Peter This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail and delete the message and any attachments from your system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Servicelink and ActiveX controls
Since reading your post this morning, I went to look at my ETRs. Unless I turned on A-X some time ago, I didn't see any change today. How would I know if I had already turned it on in the past? Also I don't see your symptoms like having to close a window. . . JO.Skip Robinson Southern California Edison Company Electric Dragon Team Paddler SHARE MVS Program Co-Manager 626-302-7535 Office 323-715-0595 Mobile jo.skip.robin...@sce.com Barbara Nitz To Sent by: IBM IBM-MAIN@bama.ua.edu Mainframe cc Discussion List Servicelink and ActiveX controls 04/22/2009 02:27 AM Please respond to IBM Mainframe Discussion List Apparently after the last change to Servicelink IBM decided to employ ActiveX controls when showing me my open ETRs. And these are ActiveX controls that are unsafe, according to the security options. I am NOT free in my choice of browser (IE6) nor am I free in the servicelevel of that browser, I have to use what the corporation gives me. And what I got with an IBM-enforced ActiveX control is a browser that always closes itself and asks me if I want to restart it or send a report of the error to whomever, effectively preventing me from seeing my ETRs. Is anyone else who is security conscious and had set IE options accordingly experiencing the same problem? (Or even recognising that silently active content is executing on your computer?) The pages do NOT look changed. Regards, Barbara Nitz -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: The PUT FTP not working with large files
On Thu, 23 Apr 2009 08:46:57 +1200, Anthony Fletcher wrote: >Have you checked out APAR PK71695? > Looks plausible, except ... >From: >Quintupray Burgos Alvaro >Date: >23/04/2009 07:48 a.m. > >That is the message .. > >EZA1485I 736744 bytes transferred - 31 second interval rate 23.34 KB/sec - >Overa That is not 64 Ki tracks. >EZA2589E Connection to server interrupted or timed out. Sending data >EZA2590E send error from send_data - EDC5120I Interrupted function call. >(errno2=0x76690291) >EZA1475I Connection with 167.28.131.244 terminated >EZA2603E Error sending the file > Another possible problem is that while a large file is flowing over the data socket, the control socket times out for inactivity. This might even be aggravated by the circumvention in PK71695, which might lead to less traffic on the control connection. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What (More) Open Source Software for z/OS?
All that needs to happen is a few customers telling them that they now read: http://www.hpl.hp.com/research/papers/ Since it is free electronically. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Data masking/data disguise Primer 1) WHY
On Wed, 22 Apr 2009 10:39:29 -0400, Farley, Peter x23353 wrote: >... >Many business processes *do* require the "real" data. Format >preservation does not help when sort order is affected. When a >business needs to determine a 9-digit zip code from the customer >address, format preservation will not do -- the program needs the >real street number and address and the real city and state or it >gets the wrong zip code. I (almost) agree, but draw a very different conclusion. I assume most business processes can accept realistic but bogus data and process it accurately. In your example, the only process requiring actual addresses (rather than bogus addresses that would be in the correct zip code if they were real) are those that validate against a registry of real addresses. For those, part of the obfuscated data would have to be a bogus registry. I think that this really highlights the need for a very sophisticated obfuscation technique. The same details that go into a process design need to go into the data obfuscation design so that the bogus data actually works. That, of course, can't help debugging a problem that is sensitive to only one exact combination of data. >Neither the customer nor the USPS appreciate or long tolerate >incorrect zip codes. Huh? Neither the customer not the USPS would see output based test data. If you mean that the application would produce incorrect zip codes based because it wasn't test enogh using the test data, then that points to a problem with the code or the test data. Pat O'keefe -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: The PUT FTP not working with large files
Have you checked out APAR PK71695? regards, Anthony Fletcher - MNZCS Team Lead NZ SMM (AirNZ, Westpac NZ , TelstraClear NZ and NWM AU) IBM Global Technology Services Server Systems Operations Server Management Mainframe Global Services Delivery Australia and New Zealand NZ z/OS Software Program Manager z/OS Technical Lead A/NZ Ph: Direct +64 4 576 8142, tieline 61 929 8142, ITN *869298142, mobile +64 21 464 864, Fax +64 4 576 5808. Internet: flet...@nz1.ibm.com, Sametime: flet...@nz1.ibm.com "The biggest threat to effective communication is the belief that it has occurred" "Winners make commitments, Losers make promises" From: Quintupray Burgos Alvaro To: IBM-MAIN@bama.ua.edu Date: 23/04/2009 07:48 a.m. Subject: Re: The PUT FTP not working with large files Sent by: IBM Mainframe Discussion List Hi. That is the message .. EZA1485I 736744 bytes transferred - 31 second interval rate 23.34 KB/sec - Overa EZA2589E Connection to server interrupted or timed out. Sending data EZA2590E send error from send_data - EDC5120I Interrupted function call. (errno2=0x76690291) EZA1475I Connection with 167.28.131.244 terminated EZA2603E Error sending the file Atte., Alvaro -Mensaje original- De: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] En nombre de Cebell, David Enviado el: Miércoles, 22 de Abril de 2009 15:34 Para: IBM-MAIN@bama.ua.edu Asunto: Re: The PUT FTP not working with large files In your listing, is some of the Data Transmitted? -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Alvaro Quintupray Burgos Sent: Wednesday, April 22, 2009 2:28 PM To: IBM-MAIN@bama.ua.edu Subject: The PUT FTP not working with large files Hi. We have getting the following response when exec a PUT FTP with big files from Host Z/OS 1.8 to Host Z/OS 1.8 EZA2590E send error from send_data - EDC5120I Interrupted function call. (errno2=0x76690291) If we send a little file the FTP work O.K. What are we doing wrong? Thanks. Alvaro. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html La información contenida en este correo electrónico, así como en cualquiera de sus adjuntos, es confidencial y está dirigida exclusivamente a el o los destinatarios indicados. Cualquier uso, reproducción, divulgación o distribución por otras personas distintas de el o los destinatarios está estrictamente prohibida. Si ha recibido este correo por error, por favor notifíquelo inmediatamente al remitente y bórrelo de su sistema sin dejar copia del mismo. BancoEstado no acepta responsabilidad alguna por cualquier perdida o daño como consecuencia, directa o indirecta, del uso indebido de este e-mail o de los adjuntos al mismo. The information contained in this e-mail message may be privileged, confidential and protected from disclosure. If you are not the intended recipient, any further disclosure or use, dissemination, distribution or copying of this message or any attachment is strictly prohibited. If you think you have received this e-mail message in error, please E-mail the sender and delete the e-mail. BancoEstado is not liable for any loss or damage resulting from illegal use of this E-mail or any attachment. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: The PUT FTP not working with large files
You should probably allocate space for the target dataset, something like the following FTP command: SITE CYL PRI=100 SEC=100 use whatevr space allocation is appropriate. Also, make sure the dataset doesn't already exist on the target system. Randy -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: The PUT FTP not working with large files
1. There is a firewall terminating the connection. 2. There is an issue on the target host such as an out of space condition. Make sure the target file does not exist before transmission starts. If the target file is replaced, then the old allocation will be used no matter what you say differently. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Alvaro Quintupray Burgos Sent: Wednesday, April 22, 2009 2:28 PM To: IBM-MAIN@bama.ua.edu Subject: The PUT FTP not working with large files Hi. We have getting the following response when exec a PUT FTP with big files from Host Z/OS 1.8 to Host Z/OS 1.8 EZA2590E send error from send_data - EDC5120I Interrupted function call. (errno2=0x76690291) If we send a little file the FTP work O.K. What are we doing wrong? Thanks. Alvaro. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: The PUT FTP not working with large files
Hi. That is the message .. EZA1485I 736744 bytes transferred - 31 second interval rate 23.34 KB/sec - Overa EZA2589E Connection to server interrupted or timed out. Sending data EZA2590E send error from send_data - EDC5120I Interrupted function call. (errno2=0x76690291) EZA1475I Connection with 167.28.131.244 terminated EZA2603E Error sending the file Atte., Alvaro -Mensaje original- De: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] En nombre de Cebell, David Enviado el: Miércoles, 22 de Abril de 2009 15:34 Para: IBM-MAIN@bama.ua.edu Asunto: Re: The PUT FTP not working with large files In your listing, is some of the Data Transmitted? -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Alvaro Quintupray Burgos Sent: Wednesday, April 22, 2009 2:28 PM To: IBM-MAIN@bama.ua.edu Subject: The PUT FTP not working with large files Hi. We have getting the following response when exec a PUT FTP with big files from Host Z/OS 1.8 to Host Z/OS 1.8 EZA2590E send error from send_data - EDC5120I Interrupted function call. (errno2=0x76690291) If we send a little file the FTP work O.K. What are we doing wrong? Thanks. Alvaro. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html La información contenida en este correo electrónico, así como en cualquiera de sus adjuntos, es confidencial y está dirigida exclusivamente a el o los destinatarios indicados. Cualquier uso, reproducción, divulgación o distribución por otras personas distintas de el o los destinatarios está estrictamente prohibida. Si ha recibido este correo por error, por favor notifíquelo inmediatamente al remitente y bórrelo de su sistema sin dejar copia del mismo. BancoEstado no acepta responsabilidad alguna por cualquier perdida o daño como consecuencia, directa o indirecta, del uso indebido de este e-mail o de los adjuntos al mismo. The information contained in this e-mail message may be privileged, confidential and protected from disclosure. If you are not the intended recipient, any further disclosure or use, dissemination, distribution or copying of this message or any attachment is strictly prohibited. If you think you have received this e-mail message in error, please E-mail the sender and delete the e-mail. BancoEstado is not liable for any loss or damage resulting from illegal use of this E-mail or any attachment. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What (More) Open Source Software for z/OS?
On Wed, Apr 22, 2009 at 12:02 PM, P S wrote: > On Wed, Apr 22, 2009 at 5:26 AM, Jim McAlpine > wrote: > > Couldn't agree more. Forget about open source and give us back the > FLEX-ES > > offering. > > You do realize FLEX-ES wasn't an IBM offering, right? > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > Yes, but it was IBM that pulled the rug, right ! Jim McAlpine -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: The PUT FTP not working with large files
In your listing, is some of the Data Transmitted? -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Alvaro Quintupray Burgos Sent: Wednesday, April 22, 2009 2:28 PM To: IBM-MAIN@bama.ua.edu Subject: The PUT FTP not working with large files Hi. We have getting the following response when exec a PUT FTP with big files from Host Z/OS 1.8 to Host Z/OS 1.8 EZA2590E send error from send_data - EDC5120I Interrupted function call. (errno2=0x76690291) If we send a little file the FTP work O.K. What are we doing wrong? Thanks. Alvaro. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
The PUT FTP not working with large files
Hi. We have getting the following response when exec a PUT FTP with big files from Host Z/OS 1.8 to Host Z/OS 1.8 EZA2590E send error from send_data - EDC5120I Interrupted function call. (errno2=0x76690291) If we send a little file the FTP work O.K. What are we doing wrong? Thanks. Alvaro. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Java on z/OS JNI Sample Wanted - Preferably HLASM
The only thing that I've really found is C/C++ oriented in the Redbook: "Java Stand Alone Applications on z/OS Volume II" JNI was originally designed to be used in combination with C/C++, but you can also achieve interlanguage interoperability with Java through COBOL. This function is part of Enterprise COBOL for z/OS V3R4. This method is fairly new and until recently, using JNI was only possible in a combination of Java and C/C++. So, in most cases JNI is still used in combination with C/C++. Through C/C++ you can access a huge number of z/OS UNIX Assembler Callable Services, which in turn enables you to reach resources that may not be accessible directly through Java code. In that situation you could decide to use a native language to achieve your goal. There is also the possibility of using an indirect interface. By indirect we mean, for example, a piece of C/C++ code that provides a link to an Assembler module. That way you can use the JNI to integrate Assembler in your Java application. http://www.redbooks.ibm.com/abstracts/sg247291.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Data masking/data disguise Primer 1) WHY
On 21 Apr 2009 09:28:35 -0700, in bit.listserv.ibm-main you wrote: >I have noticed a couple of questions in the last couple of months >concerning issues along the lines of data disguise/data masking/data >obfuscation (a lot of different words for the same issue Protecting PII >(personal identifiable information)) from being 'released' > >My plan, unless there is a backlash, is to create a series of threads >discussing the issues, provide some 'interesting' studies, some >resources available to IT professionals etc. > >The first in the series is WHY. > >This maybe one of the easiest and hardest subjects to deal with. Easy >because in most case people have seen what happens when production data >gets 'out'. Those who have read the newspaper reports of MAJOR companies >being embarrassed in the press (as well as sued, loss of customers, etc) >because of data breaches. A study of the Ponemon Institute sates the >average cost per lost customer record was $197 U.S. in 2007. Now >multiply that by 10,000 customer records... 'Loss of face'/confidence >of the customer etc. it adds up. > >The hard part is the same as the above. That is convincing management >that there is a issue in the first place. Typical responses are (and >this may or may not be relevant to your organisation) is 'we have non >disclose agreements', 'our files are secured by, RACF, TOP SECREAT, >WINDOWS AUTHICATION, ACF2, etc. While these types of security are >important, they do not solve the whole issue. > >Example, > >Application require 'good' quality of test data for QA/user >acceptance/system testing. Right now the QA department/group/team copy >production data. The reasoning is that the quality of the production >data is the 'best' An QA analyst runs a report as part of his/her test >case senerio. The report is printed and after verified, thrown out in a >recycle/garbage bin. It lands up in a dumpster where someone finds >it > It gets interesting when personally identifiable data is needed for validation of the routines. If there is a street address / postal code validation routine, the real addresses are needed. Various name matching and validation routines could need the real names. For these and other cases, the test / QA environments have to be guarded as closely as the production environment AND the people cleared on the need to know and reliability basis. All copies, hard and soft, have to be handled appropriately. Test data should have both weird but valid information and pathological information (the error routines must be validated so erroneous data is needed). One of the things that an organization must consider is whether it can adequately protect the information entrusted to it. It must understand the liabilities and consequences of delegating the handling of sensitive information to other organizations. It must understand the laws of all of the jurisdictions where that data can be accesses and updated. In short obfuscation can work for some things but not all. Responsible data handling is a core obligation for ALL organizations so delegation of any of the duties should be done carefully. All organizations will have to decide who they will trust and what safeguards are both needed and viable. >Another example > >A customer service rep (CSR) who is responsible to access clients who's >last name starts with the letter 'A'. Given most security set ups, >she/he has access to the query application and has access to the entire >DB. She/he access clients through out the DB, which she sells their >info. How do you track/verify/prove/correct that? (Application auditing) > >And it goes on (note these are actual cases) > >And while this is not a direct concern to IT, there are legal >restriction/requirements concerning protection PII. Depending on where >your company operates certain safe guards/process/agreements needed to >be executed/observed. And since a lot of companies are operate in many >jurisdictions, there maybe may different laws that have to be observed, >even when there is no actual 'brick and mortar' building there. > >While I am sure many of you already 'get' this, the idea is to open a >discussion on the listserv so others, as well as ourselves, can see >other opinion on this matter > >While this subject id extensive, my idea is to just give everyone a >little taste of the 'WHY. > >PLEASE let me know if you are interested in reading more. Otherwise I >will stop. > > >THE VIEWS EXPRESSED WITHIN THIS EAMIL ARE MINE AND MINE ALONE. > > > >Robert Galambos CIPP/IT CIPP/C >IBM Certified Database Associate >IBM Certified DB2 9 for z/OS Database Administration >Certified Information Privacy Professional/Canada >Certified Information Privacy Professional/Information Technology > >Compuware Corp. Of Canada > > Service is our best product > > >Le contenu de ce courriel s'adresse au destinataire seulement. Il contient de >l'information pouvant etre confidentielle. Vous ne devez ni le copier ni >l'utiliser
Re: Java on z/OS JNI Sample Wanted - Preferably HLASM
Martin Packer wrote: Could someone point me to a good simple sample of a HLASM JNI method being called from Java on z/OS? Failing a HLASM one I'd accept some other language. Pointer to a basic doc also appreciated. (Project involves also getting Jython to call a JNI method.) Thanks, Martin Martin Packer Performance Consultant IBM United Kingdom Ltd +44-20-8832-5167 +44-7802-245-584 email: martin_pac...@uk.ibm.com Twitter ID: MartinPacker "They're figuring out that collaboration isn't a productivity hit, it makes them smarter." Sam Palmisano on BlogCentral, 26 November 2008 I seem to recall a session on this in a past SHARE, but I can't find the reference to it. You might check the proceedings of recent SHAREs (2003-present), or maybe someone else can recall / find the info. Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-393-8716 http://www.trainersfriend.com z/OS Application development made easier * Our classes include + How things work + Programming examples with realistic applications + Starter / skeleton code + Complete working programs + Useful utilities and subroutines + Tips and techniques ==> Check out the Trainer's Friend Store to purchase z/OS <== ==> application developer toolkits. Sample code in four<== ==> programming languages, JCL to Assemble or compile, <== ==> bind and test. <== ==> http://www.trainersfriend.com/TTFStore/index.html<== -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Data masking/data disguise Primer 1) WHY
Yeah, the $200/card probably reflects the fact that if a stolen card gets used, it likely get used for several under-$500 purchases (I believe that's the current level to increase the card provider's interest in verification). So if a stolen card that gets used costs $2,000 on average, that means that even if only 1 in 10 stolen cards gets used, that $200 is correct. I still doubt that it applies to Heartland, however -- action was taken and I doubt that the black hats managed to use 10M cards before they were all cut off. But who knows...! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What (More) Open Source Software for z/OS?
On Wed, 22 Apr 2009 13:15:45 -0500, Ron Wells wrote: >Unfortunately there still needs to be lower costs on the software ... >Still run up against cost cheaper on another platform it's the same >application.. but since it runs on the M/F it costs more .. There are >Vendors out there that are reasonable .. like MacKinney .. but not enough >of them to make a dent .. > This is the case where "n" smaller servers are "better" than the mainframe. Most, if not all, z shops upgrade their processors due to the increase in their application workload. That is, they are running the same software, but more data or running more CPU intensive software that they wrote themselves. However, every vendor assumes that when you upgrade your CPU it is simply to run their software even more. So the software bill goes up through the roof. On the distributed side, you get a new box and only license the software you need on that one box. I.e. if you get a new Windows box, running IIS, you get those two licenses. You don't need to get a better Oracle license, or a new license for every Windows CA product that you have, and so on. So adding processing power can be very much cheaper, especially in the short term. Which is the only way that management thinks. They rarely consider infrastructure support cost increase (just let the current people work longer hours, silly!) -- John -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What (More) Open Source Software for z/OS?
Unfortunately there still needs to be lower costs on the software ... Still run up against cost cheaper on another platform it's the same application.. but since it runs on the M/F it costs more .. There are Vendors out there that are reasonable .. like MacKinney .. but not enough of them to make a dent .. -- Email Disclaimer This E-mail contains confidential information belonging to the sender, which may be legally privileged information. This information is intended only for the use of the individual or entity addressed above. If you are not the intended recipient, or an employee or agent responsible for delivering it to the intended recipient, you are hereby notified that any disclosure, copying, distribution, or the taking of any action in reliance on the contents of the E-mail or attached files is strictly prohibited. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What (More) Open Source Software for z/OS?
On 22 Apr 2009 10:01:45 -0700, tz...@attglobal.net (Tony Harminc) wrote: >Well, Tim's original post was about "What (More) Open Source Software >Do You Want for z/OS?". I can speak only for myself, but when I think >of open source software, I don't mean what IBM has mostly done with >things like the Ported Tools, which is to take open source software >and provide OCO versions for z/OS. What I expect is ported versions >*with source*. Without source, they're only shadows of their former >Open Source selves, that will atrophy unless kept up to date by IBM, >which has notably happened to a number of earlier ports to OCO. While >IBM has unquestionably contributed a huge amount to the open source >community, they have also done their fair share of closing off >existing open source code. IBM has on occasion even hidden such >activities behind the banner of open source, which leaves a bad taste. Agreed. But selfishly, what I want is for the marketplace to start believing that mainframe computers will be a cost-effective option for much of the software that they are thinking about moving to. For the projected life of that software. More importantly, I want a company that has moved towards "new" technology to believe that his current setup of multiple *nix servers can be upgraded in a cost effective manner to a more secure and faster mainframe system. I don't think most prospective customers even think of mainframes for these technologies, even though they might read that IBM offers *nix. So how will that perception be changed? Maybe Open Source software will help. Maybe it will be an advertisement campaign. (I always wonder how much it helps when IBM or EDS had a great Superbowl ad - when the product costs millions.But I've also seen ads for prescription medicines such as Plavix). -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: can SMS managed VSAM file be deleted while allocated
Otto, Patient to Doctor: If I do this it hurts. Doctor to Patient: Then don't do it. That's why we don't put SMS volumes online across SYSPLEXES. In this case the enqueue on the dataset is the protection mechanism, but SYSPLEX1 didn't know about it. Guilty of the same thing - I blew up my JCL.CNTL a few months ago. Ron > -Original Message- > From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of > Schumacher, Otto > Sent: Tuesday, April 21, 2009 6:43 AM > To: IBM-MAIN@bama.ua.edu > Subject: Re: [IBM-MAIN] can SMS managed VSAM file be deleted while allocated > > We just had a incident where a 121,000,000 record multi volume file lost > 25,000,000 records. What occurred is that the volume was erroneously > setup in HSM to be managed from SYSPLEX1. The file should have been > setup for a read only with no management. The file was actually opened > and was being written to from SYSPLEX2. HSM running on SYSPLEX1 > actually freed what it believed to be a empty extent. There was no > indication that this was done in SMF. The only place this showed up was > in the HSM log. We are running GRS and do not have MIM DASD. > > Regards > > Otto Schumacher > Technical Support, CICS > > EDS, an HP Company > Ahold Account > 2000 Wade Hampton Blvd. > LC1-302 > Greenville, South Carolina, 29615 > > Tel: 864 987-1417 > Fax: 864 987-4500 > E-mail: otto.schumac...@eds.com > > We deliver on our commitments > so you can deliver on yours. > > > -Original Message- > From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On > Behalf Of Burrell, C. Todd (CDC/OCOO/ITSO) (CTR) > Sent: Tuesday, April 21, 2009 9:19 AM > To: IBM-MAIN@bama.ua.edu > Subject: Re: can SMS managed VSAM file be deleted while allocated > > I believe referenced usually means OPENED. I had a similar problem a > few years back when we IPL'ed a system that had not been down in about 6 > months. HSM came up first, and deleted some files related to Netview. > > > C. Todd Burrell, PMP, MCP > Lead z/OS Systems Programmer > ITSO > (404) 723-2017 (Cell) > > > -Original Message- > From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On > Behalf Of Barkow, Eileen > Sent: Monday, April 20, 2009 2:23 PM > To: IBM-MAIN@bama.ua.edu > Subject: Re: can SMS managed VSAM file be deleted while allocated > > we found the answer but it seems that something is still wrong. > apparently, the file was under a SMS management class which checks for > 'unreferenced' datasets older then 999 days and in the brief period that > the started task using it was down (right before an ipl which is the > only time it comes down), HSM decided to delete the file. > > But the question is what does SMS consider to be 'unreferenced' - > clearly the file is getting allocated but I am not sure if it is > actually opened (this is a vendor product and the file usage may be > optional). > SMS claimed that the last time the file was 'referenced' was about the > time I think that it was created. > > -Original Message- > From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On > Behalf Of Ted MacNEIL > Sent: Monday, April 20, 2009 2:16 PM > To: IBM-MAIN@bama.ua.edu > Subject: Re: can SMS managed VSAM file be deleted while allocated > > >that is what i thought - the job would have had to be down at the time > the file was deleted. > >Unless there is some weird bug in the system. > > >thanks Ted > > You're welcome. > Get DAF from the CBT, and run it against the SMF data for the time > period in question. > That should tell who/when. > If it does match up with the job running at the same time, then not only > do you have a weird bug, but you have a data integrity problem. > > But, I strongly doubt it! > You should find the culprit, then you can use your favourite form of > persuasion to stop them from doing again. > > - > Too busy driving to stop for gas! > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, send > email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search > the archives at http://bama.ua.edu/archives/ibm-main.html > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, send > email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search > the archives at http://bama.ua.edu/archives/ibm-main.html > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@bama.ua.edu with the message: GET IBM
Re: What (More) Open Source Software for z/OS?
On Wed, 22 Apr 2009 12:16:31 -0500, John McKown wrote: > > >Now, as to what I'd like in z/OS UNIX? Wow, I have a bunch of things. I'd >like something like Linux's /proc pseudo-filesystem. It would take a lot of > +1. If there were a /proc/self/home, I'd be able to code JCL to access the user's home directory without knowing the site's naming conventions. (There are a couple things wrong with coding "DD PATH='/u/&SYSUID/'".) >lines to detail what all I'd like. But, just as some examples, an interface >to the SPOOL so that I can see what jobs are in the SPOOL (subject to >security). Perhaps even access their SPOOL files, if I have appropriate > Would this be better done by mounting the JES spool as a UNIX FS (permissions subject to security), or with an OUTPUT JCL option to direct specified data sets to the existing UNIX FS? >authority. An interface to the RMF information (read-only). And, I still >want /dev/intrdr to do job submission. Yes, I have a REXX program which >submits JCL from a file or STDIN (if no file is specified), so piping works. >But piping uses a second process, which is not as efficient. > Ummm. This would probably involve a daemon, which is the process you'd like to avoid. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: METAL C: CodeGen defeciency?
Johnny Luo wrote: Hi, I was trying new METAL option of XL C and the following is the HLASM code generated : * { *char a[20]="12345"; MVC 88(6,13),0(11) MVI @74a+6,0 MVC @74a+7(13),@74a+6 MVI @74a+6,0 MVC @74a+7(13),@74a+6 * return; * } It initialized the buffer twice! I cannot think of why. Is it normal? Not to point too many fingers, but since we did it first, here's what Systems/C did with Johnny's example: * * * *** char a[20]="12345"; LA14,@lit_6_0 MVC 96(6,13),0(14) * setting 14 bytes to 0x00 XC102(14,13),102(13) * *** return; * *** } - Dave Rivers - -- riv...@dignus.comWork: (919) 676-0847 Get your mainframe programming tools at http://www.dignus.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What (More) Open Source Software for z/OS?
I'd like to see bash better implemented/supported as a shell. (I'm constantly using keystrokes that I am used to in Linux that don't work in USS - best example is the arrow key to autofill dataset or path names) Jerry Whitteridge Mainframe Engineering Safeway Inc 925 951 4184 jerry.whitteri...@safeway.com If everything seems under control, you're just not going fast enough. > -Original Message- > From: IBM Mainframe Discussion List > [mailto:ibm-m...@bama.ua.edu] On Behalf Of John McKown > Sent: Wednesday, April 22, 2009 10:17 AM > To: IBM-MAIN@bama.ua.edu > Subject: Re: What (More) Open Source Software for z/OS? > > On Wed, 22 Apr 2009 12:50:49 -0400, Tony Harminc > wrote: > > > > >Well, Tim's original post was about "What (More) Open Source Software > >Do You Want for z/OS?". I can speak only for myself, but when I think > >of open source software, I don't mean what IBM has mostly done with > >things like the Ported Tools, which is to take open source software > >and provide OCO versions for z/OS. What I expect is ported versions > >*with source*. Without source, they're only shadows of their former > >Open Source selves, that will atrophy unless kept up to date by IBM, > >which has notably happened to a number of earlier ports to OCO. While > >IBM has unquestionably contributed a huge amount to the open source > >community, they have also done their fair share of closing off > >existing open source code. IBM has on occasion even hidden such > >activities behind the banner of open source, which leaves a > bad taste. > > > >Asking what open source software is wanted on z/OS, with the > >likelihood that it's going to arrive OCO, is really just asking what > >new function people want in z/OS. Which is a perfectly fine question, > >of course, but the answers are likely to have rather a different > >flavour. > > > >Tony H. > > I totally agree. I like the fact that IBM ported OpenSSH to > run on z/OS. But > I hate the fact that, for whatever reason, they decided to > not share the > updated source. Given the license on OpenSSH, this is > perfectly legal. But > if IBM should someday decide that they want to develop a > competing product > and discontinue maintaining OpenSSH, then I'm up a creek. > > This is, again, why I like the GPL license over other OSI > licenses. Not that > I want to start a license war here, too. > > Now, as to what I'd like in z/OS UNIX? Wow, I have a bunch of > things. I'd > like something like Linux's /proc pseudo-filesystem. It would > take a lot of > lines to detail what all I'd like. But, just as some > examples, an interface > to the SPOOL so that I can see what jobs are in the SPOOL (subject to > security). Perhaps even access their SPOOL files, if I have > appropriate > authority. An interface to the RMF information (read-only). > And, I still > want /dev/intrdr to do job submission. Yes, I have a REXX > program which > submits JCL from a file or STDIN (if no file is specified), > so piping works. > But piping uses a second process, which is not as efficient. > > -- > John > -- > John > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > > "Email Firewall" made the following annotations. -- Warning: All e-mail sent to this address will be received by the corporate e-mail system, and is subject to archival and review by someone other than the recipient. This e-mail may contain proprietary information and is intended only for the use of the intended recipient(s). If the reader of this message is not the intended recipient(s), you are notified that you have received this message in error and that any review, dissemination, distribution or copying of this message is strictly prohibited. If you have received this message in error, please notify the sender immediately. == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What (More) Open Source Software for z/OS?
On Wed, 22 Apr 2009 12:50:49 -0400, Tony Harminc wrote: > >Well, Tim's original post was about "What (More) Open Source Software >Do You Want for z/OS?". I can speak only for myself, but when I think >of open source software, I don't mean what IBM has mostly done with >things like the Ported Tools, which is to take open source software >and provide OCO versions for z/OS. What I expect is ported versions >*with source*. Without source, they're only shadows of their former >Open Source selves, that will atrophy unless kept up to date by IBM, >which has notably happened to a number of earlier ports to OCO. While >IBM has unquestionably contributed a huge amount to the open source >community, they have also done their fair share of closing off >existing open source code. IBM has on occasion even hidden such >activities behind the banner of open source, which leaves a bad taste. > >Asking what open source software is wanted on z/OS, with the >likelihood that it's going to arrive OCO, is really just asking what >new function people want in z/OS. Which is a perfectly fine question, >of course, but the answers are likely to have rather a different >flavour. > >Tony H. I totally agree. I like the fact that IBM ported OpenSSH to run on z/OS. But I hate the fact that, for whatever reason, they decided to not share the updated source. Given the license on OpenSSH, this is perfectly legal. But if IBM should someday decide that they want to develop a competing product and discontinue maintaining OpenSSH, then I'm up a creek. This is, again, why I like the GPL license over other OSI licenses. Not that I want to start a license war here, too. Now, as to what I'd like in z/OS UNIX? Wow, I have a bunch of things. I'd like something like Linux's /proc pseudo-filesystem. It would take a lot of lines to detail what all I'd like. But, just as some examples, an interface to the SPOOL so that I can see what jobs are in the SPOOL (subject to security). Perhaps even access their SPOOL files, if I have appropriate authority. An interface to the RMF information (read-only). And, I still want /dev/intrdr to do job submission. Yes, I have a REXX program which submits JCL from a file or STDIN (if no file is specified), so piping works. But piping uses a second process, which is not as efficient. -- John -- John -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMPE dependency question
> -Original Message- > From: IBM Mainframe Discussion List On Behalf Of Sumi, Joseph J. > > If "product A" has a PTF that requires a PTF from "product B"... > would you expect "products A's" PTF to have a HOLD indicating to apply > "product B's" PTF or would you expect a COREQ ? Occasionally see that situation when a CICS PTF "depends on" a companion LE PTF to "fully implement" the change. In all cases so far, the CICS PTF identifies the dependency with a ++HOLD rather than a ++REQ. I don't know if the fact that CICS and LE have different SRELs has anything to do with that. -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMPE dependency question
Thanks.turns out these products are in 2 separate SMP environments.the one PTF had HOLD info alerting of the other products PTF. Rgrds, Joseph Sumi -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Tom Marchant Sent: Wednesday, April 22, 2009 12:32 PM To: IBM-MAIN@bama.ua.edu Subject: Re: SMPE dependency question On Wed, 22 Apr 2009 11:25:10 -0500, Tom Marchant wrote: > >And IFREQ is most effective if both products are in the same target and >distribution zones. Otherwise it is not automatic. The above is incorrect. See Mark Zelden's post for details. Sorry for the error. -- Tom Marchant -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What (More) Open Source Software for z/OS?
2009/4/21 Martin Packer : > I'm not sure why this turned into another OCO debate, but attempting to > return to Tim's original post: Well, Tim's original post was about "What (More) Open Source Software Do You Want for z/OS?". I can speak only for myself, but when I think of open source software, I don't mean what IBM has mostly done with things like the Ported Tools, which is to take open source software and provide OCO versions for z/OS. What I expect is ported versions *with source*. Without source, they're only shadows of their former Open Source selves, that will atrophy unless kept up to date by IBM, which has notably happened to a number of earlier ports to OCO. While IBM has unquestionably contributed a huge amount to the open source community, they have also done their fair share of closing off existing open source code. IBM has on occasion even hidden such activities behind the banner of open source, which leaves a bad taste. Asking what open source software is wanted on z/OS, with the likelihood that it's going to arrive OCO, is really just asking what new function people want in z/OS. Which is a perfectly fine question, of course, but the answers are likely to have rather a different flavour. Tony H. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What (More) Open Source Software for z/OS?
- You are allowed take the initiative and think independently/creatively. --- NOT IN THIS SHOP!!! If you're anything more than an unthinking robot, you're likely to become a "former employee" in one heap big hurry. Common sense, independant thought or creative thinking will earn a "Promotion to the sidewalk" so fast that the revolving door at the building entrance will give you a bad case of windburn. It's a stupid way to run an IT shop, but "Them's the conditions that prevail" and as long as the Board agrees, what's a guy to do? -- Rick -- Remember that if you’re not the lead dog, the view never changes. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMPE dependency question
On Wed, 22 Apr 2009 11:25:10 -0500, Tom Marchant wrote: > >And IFREQ is most effective if both products are in the same target and >distribution zones. Otherwise it is not automatic. The above is incorrect. See Mark Zelden's post for details. Sorry for the error. -- Tom Marchant -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMPE dependency question
On Wed, 22 Apr 2009 19:07:57 +0300, Binyamin Dissen wrote: >On Wed, 22 Apr 2009 11:58:42 -0400 "Sumi, Joseph J. (CMS/CTR) (CTR)" > wrote: > >:>If "product A" has a PTF that requires a PTF from "product B"... >:>would you expect "products A's" PTF to have a HOLD indicating to apply >:>"product B's" PTF or would you expect a COREQ ? > >A tough call as they might be in different GLOBAL zones. > >IFREQ is better as it is automatic, but if the products are in global zones >there is no way that SMP can know from the A CSI that there is product B. And IFREQ is most effective if both products are in the same target and distribution zones. Otherwise it is not automatic. -- Tom Marchant -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMPE dependency question
On Wed, 22 Apr 2009 19:07:57 +0300, Binyamin Dissen wrote: >On Wed, 22 Apr 2009 11:58:42 -0400 "Sumi, Joseph J. (CMS/CTR) (CTR)" > wrote: > >:>If "product A" has a PTF that requires a PTF from "product B"... >:>would you expect "products A's" PTF to have a HOLD indicating to apply >:>"product B's" PTF or would you expect a COREQ ? > >A tough call as they might be in different GLOBAL zones. > >IFREQ is better as it is automatic, but if the products are in global zones >there is no way that SMP can know from the A CSI that there is product B. > Possibly, but this can all be done automatically with conditional ++IF assuming SMP/E has been set up correctly. See the SMP/E User's Guide under: Specifying automatic cross-zone requisite checking http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/GIMUSR36/3.6.3?SHELF=GIM2BK60&DT=20070428231340 Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - ZFUS G-ITO mailto:mark.zel...@zurichna.com z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMPE dependency question
On Wed, 22 Apr 2009 19:07:57 +0300, Binyamin Dissen wrote: >On Wed, 22 Apr 2009 11:58:42 -0400 "Sumi, Joseph J. (CMS/CTR) (CTR)" > >:>If "product A" has a PTF that requires a PTF from "product B"... >:>would you expect "products A's" PTF to have a HOLD indicating to apply >:>"product B's" PTF or would you expect a COREQ ? > >A tough call as they might be in different GLOBAL zones. > >IFREQ is better as it is automatic, but if the products are in global zones >there is no way that SMP can know from the A CSI that there is product B. > This depends on the sense of "requires". If linker JCLIN in "product A" INCLUDEs a MOD element from "product B", then: o They should reside in common zones. o (Co)REQ is the proper relationship. If a load module in "product A" merely ATTACHes a load module in "product B", they might reside in different CSIs, and IFREQ with a HOLD to alert the systems programmer is the best you can do. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Java on z/OS JNI Sample Wanted - Preferably HLASM
Could someone point me to a good simple sample of a HLASM JNI method being called from Java on z/OS? Failing a HLASM one I'd accept some other language. Pointer to a basic doc also appreciated. (Project involves also getting Jython to call a JNI method.) Thanks, Martin Martin Packer Performance Consultant IBM United Kingdom Ltd +44-20-8832-5167 +44-7802-245-584 email: martin_pac...@uk.ibm.com Twitter ID: MartinPacker "They're figuring out that collaboration isn't a productivity hit, it makes them smarter." Sam Palmisano on BlogCentral, 26 November 2008 Unless stated otherwise above: IBM United Kingdom Limited - Registered in England and Wales with number 741598. Registered office: PO Box 41, North Harbour, Portsmouth, Hampshire PO6 3AU -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hypersockets between LPARs of different sysplexes
Thanks for the information. I have passed your comments and suggestions to my communications colleague. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMPE dependency question
On Wed, 22 Apr 2009 11:58:42 -0400 "Sumi, Joseph J. (CMS/CTR) (CTR)" wrote: :>If "product A" has a PTF that requires a PTF from "product B"... :>would you expect "products A's" PTF to have a HOLD indicating to apply :>"product B's" PTF or would you expect a COREQ ? A tough call as they might be in different GLOBAL zones. IFREQ is better as it is automatic, but if the products are in global zones there is no way that SMP can know from the A CSI that there is product B. -- Binyamin Dissen http://www.dissensoftware.com Director, Dissen Software, Bar & Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
SMPE dependency question
If "product A" has a PTF that requires a PTF from "product B"... would you expect "products A's" PTF to have a HOLD indicating to apply "product B's" PTF or would you expect a COREQ ? Thanks, Joseph Sumi -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Data masking/data disguise Primer 1) WHY
See below Robert Galambos CIPP/C CIPP/IT Compuware Senior Technical Specialist IBM Certified Database Associate IBM Certified DB2 9 for z/OS Database Administration Certified Information Privacy Professional/Canada Certified Information Privacy Professional/Information Technology robert.galam...@compuware.com Tel: +1 905 886 7000 Toll Free: +1 800 263 7189 Fax: +1 905 886 7023 Quebec: +1 877-281-1888 Le contenu de ce courriel s'adresse au destinataire seulement. Il contient de l'information pouvant être confidentielle. Vous ne devez ni le copier ni l'utiliser ni le divulguer à qui que ce soit à moins que vous soyez le destinataire ou une personne désignée autorisée. Si vous le receviez par erreur, veuillez nous aviser immédiatement et le détruire. The contents of this e-mail are intended for the named addressee only. It contains information that may be confidential. Unless you are the named addressee or an authorized designee, you may not copy or use it, or disclose it to anyone else. If you received it in error please notify us immediately and then destroy it. "Service in every product... Les renseignements contenus dans le présent message électronique sont confidentiels et concernent exclusivement le(s) destinataire(s) désigné(s). Il est strictement interdit de distribuer ou de copier ce message. Si vous avez reçu ce message par erreur, veuillez répondre par courriel à l'expéditeur et effacer ou détruire toutes les copies du présent message. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Farley, Peter x23353 Sent: April 22, 2009 10:39 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Data masking/data disguise Primer 1) WHY > -Original Message- > From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On > Behalf Of Phil Smith > Sent: Tuesday, April 21, 2009 7:51 PM > To: IBM-MAIN@bama.ua.edu > Subject: Re: Data masking/data disguise Primer 1) WHY > > Why can't you debug a production issue, if you're using Format-Preserving > Encryption? Does the application need the "real" data? Most do not. Or I'm > not understanding your point. >Many business processes *do* require the "real" data. Format preservation >does not help when sort order is >affected. TRUE BUT THAT IS NOT THE MAJORITY OF ISSUES > When a business needs to determine a 9-digit zip code from the customer > address, format preservation will >not do -- the program needs the real street number and address and the real >city and state or it gets the >wrong zip code. >Neither the customer nor the USPS appreciate or long tolerate incorrect zip >codes. TRUE. THEN YOU CAN SUE A TECHNIQUE OF SCRAMBLING THE DATA. IN OTHER WORDS TAKING THE ADDRESS FROM PERSON A AND MOVE IT TO PERSON B AND VIS A VERSA >And once the zip code is determined it must be the "real" zip code that is >sorted, or the USPS gets very >upset, which will cost the company more money. >My point is that when debugging a production issue with such a process, real >customer data is going to be >exposed somewhere no matter how much money or CPU time is spent trying to hide >it. >There are many, many such business processes. They will not be debuggable >without real production data. >Q.E.D. >I am not saying don't mask at all, just that no one should expect data masking >to be a complete protection >against fraud and theft. It can and will happen anyway wherever there are >clever people with a need for >money that they can't get legitimately. TRUE. BUT DUE DILIGENCE IS REQUIRED. NOT DOING ANYTHING IS NOT A SOLUTION >I do not mean that CICS transactions and batch reports should not mask private >data sent to 3270 screens or >their HTML/SOAP equivalents. >Indeed, I do not want my private data being shown to anyone unless they have a >real need to see it and I have >authorized them to do so. >I am saying that prohibitions against programmers using real production data >will prevent production problems >from being resolved, and that no one should be surprised at this. NO ARUGMENT. ALL I AM SAYING IS THAT SCRUBBING PII SO THAT YOUR NEIGHBOR ON YOUR CUBE WON'T ACCEDENTLY SEE YOU HEALTH RECOIRD WHEN TESTING USING REAL DATA. HE WILL ONLY SEE 'KERMIT THE FROG' DATA WITHOUT KNOWING WHO KERMIT IS IN REAL LIFE > -- far more dangerous > is the rogue DBA who decides that a private copy of the database would be > fun to put on a USB drive. >Indeed, that one is the far more dangerous threat. No argument. > To be blunt, whether you agree with masking or not, the regulations in > place and coming WILL NOT allow you to use copies of production data for > test. Sure, having honest folks is the norm and A Good Thing, but the > regulations don't assume that you've reached that Nirvana. Nor should > they. >I have yet to see a *practical* plan or software architecture that would >satisfy the application programmer's >needs for both realistic data and la
Re: DFDSS QUESTION - PHYSICAL BACKUP OF A VSAM DSN WITH ALTERNATE INDEX
I would not point directly to the device the file is on. I don't do that unless I want to place files on a particular device. In this case a logical dump will work best. This way all the parts can be found even if they are on different devices. On Wed, 22 Apr 2009 09:50:44 -0400, O'Brien, David W. (NIH/CIT) [C] wrote: >PHYSINDYNAM specifies the input volume that is to be dynamically allocated > to a physical copy or dump operation. A nonspecific volume > serial number cannot be specified by using an asterisk (*). Only > one volume may be specified for a FULL, TRACKS, or DATASET COPY. > The device described by the volser must be the same type as the > output device specified on the OUTDD or OUTDYNAM keyword. > >Suggest you look at the example in the manual. > >Dave O'Brien >NIH Contractor > >From: IBM Mainframe Discussion List [ibm-m...@bama.ua.edu] On Behalf Of esmie moo [esmie_...@yahoo.ca] >Sent: Wednesday, April 22, 2009 9:44 AM >To: IBM-MAIN@bama.ua.edu >Subject: DFDSS QUESTION - PHYSICAL BACKUP OF A VSAM DSN WITH ALTERNATE INDEX > >Good Morning Gentle Readers, > >I am having a problem trying to backup a VSAM dsn with ALTERNATE index. For some reason when I use the SPHERE parm it does not work. Can the SPHERE parm be used for a physical dataset backup? Below are my control cards and error messages: > >- DUMP PHYSINDDNAME(DASD1) OUTDDNAME(TAPE1)- > DATASET(INCLUDE(DEOP64.AM2.PAYROLL)) - >OPT(4) ALLX ALLD(*) SPHERE > ADR101I (R/I)-RI01 (01), TASKID 001 HAS BEEN ASSIGNED TO COMMAND 'DUMP ' > ADR109I (R/I)-RI01 (01), 2009.112 09:12:25 INITIAL SCAN OF USER CONTROL STATEME > ADR139E (001)-RI01 (01), INCONSISTENT PARAMETERS INVOLVING 'PHYSINDDNAME ' > ADR131E (001)-RI03 (01), ABOVE TEXT BYPASSED UNTIL NEXT COMMAND > ADR017E (001)-CLTSK(01), 2009.112 09:12:25 TASK NOT SCHEDULED DUE TO ERROR. TASK > >Thanks to all > > > > __ >Make your browsing faster, safer, and easier with the new Internet Explorer® 8. Optimized for Yahoo! Get it Now for Free! at http://downloads.yahoo.com/ca/internetexplorer/ > >-- >For IBM-MAIN subscribe / signoff / archive access instructions, >send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO >Search the archives at http://bama.ua.edu/archives/ibm-main.html > >-- >For IBM-MAIN subscribe / signoff / archive access instructions, >send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO >Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Data masking/data disguise Primer 2) HOW
In the spirit of the first thread, I am introducing the second. that is, HOW do we go about protecting/auditing PII (personal identifiable information) The first thing I have to say, don't expect for an average size company to be able within a short period of time to completely tackle the issue. Not going to happen. In the previous thread we had mention as a short note about the differences of encryption/masking techniques. Let me expand on this in random order of importance a) IT industry is notorious on different people using different terms for the same thing. the following are some sample techniques for scrubbing of data 1) Encryption both record and field. reversible 2) Data Aging. reversible 3) Generating Data. non reversible 4) Look-up/translation. depending can be reversible or not each technique (among others) do have their uses for different type of data. the type and need depends on analysis and best practices. b) You want to make sure that anything you do on the Dist. environment that the same results need to be had on the Mainframe (applicable). (enterprise wide) Most application span many environments (windows/red hat/UNIX/MVS/Oracle/Excel/DB2/VSAM/MS Access/XML/ etc. (to name but a few) and you want to make sure that client 1 in application a is scrubbed the same way in application b, c etc. Otherwise items like system/user acceptance/volume testing will probably fail c) The process needs to be repeatable. so the same record going in will produce the same record going out. The reasoning behind that is not every file/db can be always scrubbed at the same time, and for the same frequency. d) The most important. and the most time consuming. The analysis of the environment. Where is all the PII info. How are they all related. Which files need to be looked at, what are the business rules for those files/fields. The success of the entire project rely on the time spent here. e) After you initially set up the process, make sure that it is implemented as an ongoing bases as this is not a static but a dynamic requirement as your business moves forward. How are changes going to be applied/monitored. What will the EDP/Internal/external auditors requirements (audit trails? logging etc?) f) if you choice a vendor to help you, have they been doing this for awhile? what expertise do they bring to the table. Do they have supporting tools (HINT The company I work for does not only sell software but provide tools to help as well) (sorry for the commercial but they do pay the bills ). Do they have implementation teams in place with previous expertise (ditto). Are their people certified by a publicly recognized association g) Do you have upper management 'buy in'. without this projects like this have limited chance for success. I) is there a way to 'monitor' the exact data that the CSR (customer service rep) accessed so if there are any questions arising it can be quickly discovered/confirmed. The scenario of a banking rep access accounts that she/he are not responsible for? as before comments are encouraged. If you want further info fell free in contacting me. these posts are my personnel opinion alone Robert Galambos CIPP/C CIPP/IT Compuware Senior Technical Specialist IBM Certified Database Associate IBM Certified DB2 9 for z/OS Database Administration Certified Information Privacy Professional/Canada Certified Information Privacy Professional/Information Technology robert.galam...@compuware.com Tel: +1 905 886 7000 Toll Free: +1 800 263 7189 Fax: +1 905 886 7023 Quebec: +1 877-281-1888 Le contenu de ce courriel s'adresse au destinataire seulement. Il contient de l'information pouvant être confidentielle. Vous ne devez ni le copier ni l'utiliser ni le divulguer à qui que ce soit à moins que vous soyez le destinataire ou une personne désignée autorisée. Si vous le receviez par erreur, veuillez nous aviser immédiatement et le détruire. The contents of this e-mail are intended for the named addressee only. It contains information that may be confidential. Unless you are the named addressee or an authorized designee, you may not copy or use it, or disclose it to anyone else. If you received it in error please notify us immediately and then destroy it. "Service in every product... Les renseignements contenus dans le présent message électronique sont confidentiels et concernent exclusivement le(s) destinataire(s) désigné(s). Il est str
Re: Data masking/data disguise Primer 1) WHY
> -Original Message- > From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On > Behalf Of Phil Smith > Sent: Tuesday, April 21, 2009 7:51 PM > To: IBM-MAIN@bama.ua.edu > Subject: Re: Data masking/data disguise Primer 1) WHY > > Why can't you debug a production issue, if you're using Format-Preserving > Encryption? Does the application need the "real" data? Most do not. Or I'm > not understanding your point. Many business processes *do* require the "real" data. Format preservation does not help when sort order is affected. When a business needs to determine a 9-digit zip code from the customer address, format preservation will not do -- the program needs the real street number and address and the real city and state or it gets the wrong zip code. Neither the customer nor the USPS appreciate or long tolerate incorrect zip codes. And once the zip code is determined it must be the "real" zip code that is sorted, or the USPS gets very upset, which will cost the company more money. My point is that when debugging a production issue with such a process, real customer data is going to be exposed somewhere no matter how much money or CPU time is spent trying to hide it. There are many, many such business processes. They will not be debuggable without real production data. Q.E.D. I am not saying don't mask at all, just that no one should expect data masking to be a complete protection against fraud and theft. It can and will happen anyway wherever there are clever people with a need for money that they can't get legitimately. I do not mean that CICS transactions and batch reports should not mask private data sent to 3270 screens or their HTML/SOAP equivalents. Indeed, I do not want my private data being shown to anyone unless they have a real need to see it and I have authorized them to do so. I am saying that prohibitions against programmers using real production data will prevent production problems from being resolved, and that no one should be surprised at this. > -- far more dangerous > is the rogue DBA who decides that a private copy of the database would be > fun to put on a USB drive. Indeed, that one is the far more dangerous threat. No argument. > To be blunt, whether you agree with masking or not, the regulations in > place and coming WILL NOT allow you to use copies of production data for > test. Sure, having honest folks is the norm and A Good Thing, but the > regulations don't assume that you've reached that Nirvana. Nor should > they. I have yet to see a *practical* plan or software architecture that would satisfy the application programmer's needs for both realistic data and large volumes of it. Particularly in larger organizations where the sysprogs and storage admins and DBA's are all independent groups with different managements and goals than the applications programmers, the data that is needed will seldom be there when it is needed, for either testing or problem resolution. I see no other choice than to continue permitting application programmers the use of production data, perhaps with field-level encryption and decryption for privacy purposes. Regardless, the dumps and debugging will reveal the data anyway, so where is the protection then? I'm willing to be shown that practical and timely solutions exist, but I haven't seen any yet. Peter This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail and delete the message and any attachments from your system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Propagate systems enq
On Wed, 22 Apr 2009 09:40:50 +0200, Vernooy, C.P. - SPLXM wrote: > > >"Victor Zhang" wrote in message >news:... >> Hi experts, >> One of software will use a dataset to store locking information. The >> software uses SYSTEMS enq to get exclusive use of the dataset. >> The software is storagetek's library station, and the manual said: >> To prevent the corruption of the PDF, LibraryStation issues a SYSTEMS >ENQ. The >> ENQ QNAME is the HSC ENQ QNAME specified by the MAJNAME parameter of >> the HSC LIBGEN. The ENQ RNAME is LS:ACTIVE. >> If you make LibraryStation software available to more than one host, >you are >> responsible for propagating the SYSTEMS ENQ to each host. This can be >done via >> Global Resource Serialization (GRS) or a functionally equivalent >product. >> >> My question is: >> If more than one software instance started up on other lpars which are >not >> in same sysplex, how can systems enq be properly propagating? >> >> Regards >> Victor >> > >The product that can do that is CA-MIM. A MIM-plex can span sysplexes. >Doesn't is also issue a Reserve? That's how you normally protect your >datasets over systems. > And even if the sharing can be done with MIM, at least for the CDS it is recommended to use RESERVE (unless you want your tape processing to slow down and cause a problem). IOW, don't convert the RESERVE to an ENQ unless you are in a single sysplex and using GRS STAR or MIM control file in a CF. Since the RNAME is different, you can just propagate that qname/rname, but it still requires MIM (MII) to do it across sysplex boundaries. Well, that isn't really true...you actually can do it with GRS Ring also. How many systems are involved here? Do you run GRS already? So I would check the doc again or ask Oracle/Sun/STK . :-) Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - ZFUS G-ITO mailto:mark.zel...@zurichna.com z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Propagate systems enq
On Wed, 22 Apr 2009 09:40:50 +0200, Vernooy, C.P. - SPLXM wrote: > > >"Victor Zhang" wrote in message >news:... >> Hi experts, >> One of software will use a dataset to store locking information. The >> software uses SYSTEMS enq to get exclusive use of the dataset. >> The software is storagetek's library station, and the manual said: >> To prevent the corruption of the PDF, LibraryStation issues a SYSTEMS >ENQ. The >> ENQ QNAME is the HSC ENQ QNAME specified by the MAJNAME parameter of >> the HSC LIBGEN. The ENQ RNAME is LS:ACTIVE. >> If you make LibraryStation software available to more than one host, >you are >> responsible for propagating the SYSTEMS ENQ to each host. This can be >done via >> Global Resource Serialization (GRS) or a functionally equivalent >product. >> >> My question is: >> If more than one software instance started up on other lpars which are >not >> in same sysplex, how can systems enq be properly propagating? >> >> Regards >> Victor >> > >The product that can do that is CA-MIM. A MIM-plex can span sysplexes. >Doesn't is also issue a Reserve? That's how you normally protect your >datasets over systems. > And even if the sharing can be done with MIM, at least for the CDS it is recommended to use RESERVE (unless you want your tape processing to slow down and cause a problem). IOW, don't convert the RESERVE to an ENQ unless you are in a single sysplex and using GRS STAR or MIM control file in a CF. Since the RNAME is different, you can just propagate that qname/rname, but it still requires MIM (MII) to do it across sysplex boundaries. So I would check the doc again or ask Oracle/Sun/STK . :-) Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - ZFUS G-ITO mailto:mark.zel...@zurichna.com z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
METAL C: CodeGen defeciency?
Hi, I was trying new METAL option of XL C and the following is the HLASM code generated : * { *char a[20]="12345"; MVC 88(6,13),0(11) MVI @74a+6,0 MVC @74a+7(13),@74a+6 MVI @74a+6,0 MVC @74a+7(13),@74a+6 * return; * } It initialized the buffer twice! I cannot think of why. Is it normal? -- Best Regards, Johnny Luo -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Data masking/data disguise Primer 1) WHY
First of I want to thank everyone who either has contributed, or at least read this thread. It makes for some eye opening, information gathering, networking opportunities for all. Before I go on, as I stated my intension is a series of threads the first being this WHY. Watch for another either latter today or tomorrow (takes me some time to correct my own spelling etc ). So far I see this as a series of about 4 or five different takes on the same subject. Now for some additional 'notes' 1) For prod supp testing from peter. I don't believe anyone here is thinking that every field in every table/file needs to be masked. Only PII (personal identifiable information) and the vast majority of cases that type of info does NOT effect the business process (the only think I can think of that is not the case is if there is a sorting/reports/ on names/SIN/SCN/address etc. issue) most times debugging has to do with the business process (insurance rates, customer/client options etc) the data typically, when the personal information is 'scrubbed', can be used for debugging. Since the PII is no longer refers to a 'real person' that the offending record belongs to (and the main reason for data scrubbing) debugging can proceed. 2) Studies are about averages. While 20B for the heartland breach maybe a little much, I concede, it is more then 100m to client, 'for sure', of both hard and soft cost. If a list of publicly confirmed breaches please go to www.privacyrights.org/ar/ChronDataBreaches.htm 3) Total number of known data breaches is 260,211,123. as of April 20 2009. (see explanation of the above mentioned web site) 4) Laws. There are a huge number of laws through out the world containing some aspects of data privacy. Some very strong, other less so. In some countries/communities the laws are very explicit, a good example is the EU privacy directive, Canada's PIPEDA, and some US states individual laws, while in other areas far less so. Basically the various laws state (a very simplified generalization) you can only use the info for what it was intended for/given permission for. And you must protect it for disclosure (I know someone here will argue about my interpretation but it will work for this general discussion). A small partial list follows; United States Gramm-Leach-Bliley Act, Sarbanes-Oxley Act Various US State regulations and laws requiring notification European Union Personal Data Protection Directive, 1998 US Health Insurance Portability and Accountability Act (HIPAA) Australia Privacy Amendment Act of 2000 Japanese Personal Information Protection Law Canadian Personal Information Protection and Electronic Documents Act 5) PCI (Payment card industry). Not a law but a regulation from private industry consortium. Basically a global standard that effect any business, gov't that accepts credit card payments. Its regulation is to provide safeguard protection of PII. An example is 3rd section 6.3.4 that requires that real CC number NOT to be used for testing or development Feel free in contacting me for additional info. Robert Galambos CIPP/C CIPP/IT Compuware Senior Technical Specialist IBM Certified Database Associate IBM Certified DB2 9 for z/OS Database Administration Certified Information Privacy Professional/Canada Certified Information Privacy Professional/Information Technology robert.galam...@compuware.com Tel: +1 905 886 7000 Toll Free: +1 800 263 7189 Fax: +1 905 886 7023 Quebec: +1 877-281-1888 Le contenu de ce courriel s'adresse au destinataire seulement. Il contient de l'information pouvant être confidentielle. Vous ne devez ni le copier ni l'utiliser ni le divulguer à qui que ce soit à moins que vous soyez le destinataire ou une personne désignée autorisée. Si vous le receviez par erreur, veuillez nous aviser immédiatement et le détruire. The contents of this e-mail are intended for the named addressee only. It contains information that may be confidential. Unless you are the named addressee or an authorized designee, you may not copy or use it, or disclose it to anyone else. If you received it in error please notify us immediately and then destroy it. "Service in every product... Les renseignements contenus dans le présent message électronique sont confidentiels et concernent exclusivement le(s) destinataire(s) désigné(s). Il est strictement interdit de distribuer ou de copier ce message. Si vous avez reçu ce message par erreur, veuillez répondre par courriel à l'expéditeur et effacer ou détruire toutes les copies du présent message. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Gerhard Postpischil Sent: April 21, 2009 10:03 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Data masking/data disguise Primer 1) WHY Farley, Peter x23353 wrote: > Data masking may very well be needed to prevent the internal/employee > type of data breach (accidental or malic
Re: Lisp (was: insane thought - SMF reformatter?)
On Tue, 21 Apr 2009 09:44:36 -0500, Chase, John wrote: >> Yes, I know CoBOL, JCL, & Java, and No, I don't lisp. > >"Yeth, I know CoBOL, J-Thee-L & Java, and No, I don't Lithp." :-) Whose cruel joke was it to spell "lisp" with an "s", anyway? Art -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DFDSS QUESTION - PHYSICAL BACKUP OF A VSAM DSN WITH ALTERNATE INDEX
PHYSINDYNAM specifies the input volume that is to be dynamically allocated to a physical copy or dump operation. A nonspecific volume serial number cannot be specified by using an asterisk (*). Only one volume may be specified for a FULL, TRACKS, or DATASET COPY. The device described by the volser must be the same type as the output device specified on the OUTDD or OUTDYNAM keyword. Suggest you look at the example in the manual. Dave O'Brien NIH Contractor From: IBM Mainframe Discussion List [ibm-m...@bama.ua.edu] On Behalf Of esmie moo [esmie_...@yahoo.ca] Sent: Wednesday, April 22, 2009 9:44 AM To: IBM-MAIN@bama.ua.edu Subject: DFDSS QUESTION - PHYSICAL BACKUP OF A VSAM DSN WITH ALTERNATE INDEX Good Morning Gentle Readers, I am having a problem trying to backup a VSAM dsn with ALTERNATE index. For some reason when I use the SPHERE parm it does not work. Can the SPHERE parm be used for a physical dataset backup? Below are my control cards and error messages: - DUMP PHYSINDDNAME(DASD1) OUTDDNAME(TAPE1)- DATASET(INCLUDE(DEOP64.AM2.PAYROLL)) - OPT(4) ALLX ALLD(*) SPHERE ADR101I (R/I)-RI01 (01), TASKID 001 HAS BEEN ASSIGNED TO COMMAND 'DUMP ' ADR109I (R/I)-RI01 (01), 2009.112 09:12:25 INITIAL SCAN OF USER CONTROL STATEME ADR139E (001)-RI01 (01), INCONSISTENT PARAMETERS INVOLVING 'PHYSINDDNAME ' ADR131E (001)-RI03 (01), ABOVE TEXT BYPASSED UNTIL NEXT COMMAND ADR017E (001)-CLTSK(01), 2009.112 09:12:25 TASK NOT SCHEDULED DUE TO ERROR. TASK Thanks to all __ Make your browsing faster, safer, and easier with the new Internet Explorer® 8. Optimized for Yahoo! Get it Now for Free! at http://downloads.yahoo.com/ca/internetexplorer/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
DFDSS QUESTION - PHYSICAL BACKUP OF A VSAM DSN WITH ALTERNATE INDEX
Good Morning Gentle Readers, I am having a problem trying to backup a VSAM dsn with ALTERNATE index. For some reason when I use the SPHERE parm it does not work. Can the SPHERE parm be used for a physical dataset backup? Below are my control cards and error messages: - DUMP PHYSINDDNAME(DASD1) OUTDDNAME(TAPE1) - DATASET(INCLUDE(DEOP64.AM2.PAYROLL)) - OPT(4) ALLX ALLD(*) SPHERE ADR101I (R/I)-RI01 (01), TASKID 001 HAS BEEN ASSIGNED TO COMMAND 'DUMP ' ADR109I (R/I)-RI01 (01), 2009.112 09:12:25 INITIAL SCAN OF USER CONTROL STATEME ADR139E (001)-RI01 (01), INCONSISTENT PARAMETERS INVOLVING 'PHYSINDDNAME ' ADR131E (001)-RI03 (01), ABOVE TEXT BYPASSED UNTIL NEXT COMMAND ADR017E (001)-CLTSK(01), 2009.112 09:12:25 TASK NOT SCHEDULED DUE TO ERROR. TASK Thanks to all __ Make your browsing faster, safer, and easier with the new Internet Explorer® 8. Optimized for Yahoo! Get it Now for Free! at http://downloads.yahoo.com/ca/internetexplorer/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What (More) Open Source Software for z/OS?
Yes, but the crucial piece in that bundle came from IBM theoritically at no charge. Hardware emulator is not that crucial, I hear IBM has its own and then there is Hercules. On Wed, 22 Apr 2009 07:02:20 -0400, P S wrote: > >You do realize FLEX-ES wasn't an IBM offering, right? > -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: System REXX usage
On Wed, 22 Apr 2009 07:48:11 -0500, Bob wrote: >Just wondering if we could get a list going of some interesting SYSTEM REXX >uses and tools... to get the creative ideas flowing or does this already exist >somewhere (haven't found it yet). > >Peace, > >bob h I agree. I'm not really "getting" when and how I would use System REXX. Yes, I've read the chapter in the book. -- John -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
System REXX usage
Just wondering if we could get a list going of some interesting SYSTEM REXX uses and tools... to get the creative ideas flowing or does this already exist somewhere (haven't found it yet). Peace, bob h -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CBR1110I OAM wrong SCRATCH COUNT
Rez, In this book (http://publib.boulder.ibm.com/infocenter/zos/v1r9/index.jsp? topic=/com.ibm.zos.r9.idao300/stadis.htm) it states 'In an MTL, the scratch counts that are displayed reflect the current counts that are maintained in the TCDB library record. This is meant to be an approximation. Without having an external source to derive the count, the scratch count from that point forward may be inaccurate if an update of this count in the catalog fails. Periodically check the scratch counts against your tape management system or the TCDB volume records.' OAM does attempt to maintain the scratch counts as tapes are added and the status changes. However, if the counts are incorrect you can use IDCAMS ALTER LIBRARYENTRY with NUMBERSCRATCHVOLUMES. When you use CREATE VOLUMEENTRY or IDCAMS ALTER VOLUMEENTRY to add or change volumes in the MTL, the counts are not maintained. Only the OAM interfaces (CBRXLCS) maintain the counts; for example for manual cartridge entry (MCE) and Change Use Attribute (CUA). Using DFSMSrmm to add and manage the volumes you should see correct counts maintained. If you do not have rmm the tool SAMPLIB(CBRSPLCS) provides an easy to use and simple way to use the CBRXLCS OAM interface, such as for MCE. Mike Wood RMM Development -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: insane thought - SMF reformatter?
Walt Farrell pisze: On Tue, 21 Apr 2009 08:55:18 -0500, Walt Farrell wrote: Hi, Radoslaw -- I just thought I'd point out that due to a complexity of the English language you probably meant "not very valuable" rather than "invaluable". My sincere apologies to Radoslaw for letting this private note escape to IBM-MAIN. Apparently the web interface sends to the list even if you say not to. (Or, somehow, I managed to only *think* I had unchecked the box saying to send to the list.) Walt, You don't need to apoligize, there is no offence here. I'd like to thank you and thank all who corrected me using offline communication. That's very kind of you. As I already wrote I should use "worthless" instead of "invaluable" BTW: Word "valuable" can be translated to "wartościowy" or "cenny". And here is similar gotcha: bezwartościowy = invaluable, and bezcenny = worthless. -- Radoslaw Skorupka Lodz, Poland -- BRE Bank SA ul. Senatorska 18 00-950 Warszawa www.brebank.pl Sąd Rejonowy dla m. st. Warszawy XII Wydział Gospodarczy Krajowego Rejestru Sądowego, nr rejestru przedsiębiorców KRS 025237 NIP: 526-021-50-88 Według stanu na dzień 01.01.2009 r. kapitał zakładowy BRE Banku SA (w całości wpłacony) wynosi 118.763.528 złotych. W związku z realizacją warunkowego podwyższenia kapitału zakładowego, na podstawie uchwały XXI WZ z dnia 16 marca 2008r., oraz uchwały XVI NWZ z dnia 27 października 2008r., może ulec podwyższeniu do kwoty 123.763.528 zł. Akcje w podwyższonym kapitale zakładowym BRE Banku SA będą w całości opłacone. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What (More) Open Source Software for z/OS?
On Wed, Apr 22, 2009 at 5:26 AM, Jim McAlpine wrote: > Couldn't agree more. Forget about open source and give us back the FLEX-ES > offering. You do realize FLEX-ES wasn't an IBM offering, right? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Propagate systems enq
>My question is: >If more than one software instance started up on other lpars which are not in same sysplex, how can systems enq be properly propagating? CA-MIM and GRS-Ring both can do this. - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: FICON Cascade and Brocade 5000
Michael Pratt pisze: Thanks to everyone who has replied to this point. We seem to be making very slow progress forward. What we have done is isolated the connection to the remote site so that every port on the switch is disabled except those associated with a single channel connection/single isl to the remote site. Following this, we were able to vary a single device online and could successfully: - Display the volume in 3.4 - Copy a dataset to the volume (plus successfully edit it) - Copy a dataset from this volume to another There are still some things that are clearly 'not right' - as soon as any other ports are enabled the symptoms return...so I suspect that this is a zoning issue of sorts. Further though, we are still having FICON errors reported by our DWDM provider - hope to determine the nature of these today. IMHO it clearly proves the problem is in switch configuration. -- Radoslaw Skorupka Lodz, Poland -- BRE Bank SA ul. Senatorska 18 00-950 Warszawa www.brebank.pl Sd Rejonowy dla m. st. Warszawy XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, nr rejestru przedsibiorców KRS 025237 NIP: 526-021-50-88 Wedug stanu na dzie 01.01.2009 r. kapita zakadowy BRE Banku SA (w caoci wpacony) wynosi 118.763.528 zotych. W zwizku z realizacj warunkowego podwyszenia kapitau zakadowego, na podstawie uchway XXI WZ z dnia 16 marca 2008r., oraz uchway XVI NWZ z dnia 27 padziernika 2008r., moe ulec podwyszeniu do kwoty 123.763.528 z. Akcje w podwyszonym kapitale zakadowym BRE Banku SA bd w caoci opacone. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: FICON Cascade and Brocade 5000
A bit more progress has been made. Made the following changes on the Brocade Switches: 1/.Set the APTPOLICY to 'Port Based Routing Policy'. Mainly did this as it is a requirement for step two (2) which was: 2/.Turn Dynamic Load Sharing OFF. (The chosen path remains the same if Dynamic Load Sharing (DLS) is not enabled. If DLS is enabled, then a different path might be chosen on a fabric event.) 3/.Set the PortcfgISLMode to 'R-RDY'. (In ISL R_RDY mode, the port sends a primitive signal that the port is ready to receive frames. The port sends an exchange link parameter (ELP) with flow control mode 02. If a port is ISL R_RDY enabled, it can only receive an ELP with flow control mode 02. A received ELP with flow control mode 01 will segment the fabric. This mode cannot detect any inconsistencies in fabric operating mode parameters, such as the PID format of connected ports. Before enabling ISL R_RDY mode, ensure that all fabric-wide parameters are consistent for every switch in the fabric.) Consistent IO is now occurring over a single path...will expand to (try) and use a secondary path when this is validated over a longer period of time. Cheers all. Mike. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hypersockets between LPARs of different sysplexes
Mark > XCF is oriented to sysplexes and, as you say, your two LPARs do not belong to a sysplex. This is not quite as clear as it should be. I should have said "do not belong to the *same* sysplex". You did say that the LPARs belonged to sysplexes, just different sysplexes. While I'm here again, I may as well add that you might be able to survive with the default values for the related VTAM definitions but you should be *aware* that you are relying on those related VTAM definitions even if the default values work with your configuration. Chris Mason On Tue, 21 Apr 2009 15:59:47 -0500, Chris Mason wrote: >Mark > >As Lionel Dyck pointed out, the key characteristic of an HiperSockets >connection is that it is between two LPARs on the same Central Electronic >Complex (CEC). Since you mentioned that the two LPARs you want to connect >using an HiperSockets connection share an OSA feature, you imply thereby >that the two LPARs belong to the same CEC. The fact that you share an OSA >feature in itself is not significant for an HiperSockets connection. > >Here is a technical presentation designed to introduce you to HiperSockets >with z/OS: > >http://www-03.ibm.com/support/techdocs/atsmastr.nsf/WebIndex/PRS3120 > >If you need help with another operating system, z/VM or z/Linux, try the IBM >pages search box - as I just did. > >I'm a little bit familiar with the z/OS use of HiperSockets and, if it's z/OS >that >interests you, you should go to section "HiperSockets concepts and >connectivity" under "Considerations for networking hardware attachment" >under Chapter 2, "IP configuration overview" in the Communications Server IP >Configuration Guide. > >You will quickly see that you are encouraged to establish your HiperSockets >connections using the IPCONFIG statement DYNAMICXCF parameter. This is, >of course, the second source of confusion with HiperSockets - assuming that >some imagined association with OSA features was the first! XCF is oriented to >sysplexes and, as you say, your two LPARs do not belong to a sysplex. This is >a case of IBM trying to be helpful - and saving themselves the need to create >new definition structures - but ending up causing quite understandable >confusion. > >So just grit your teeth and use the DYNAMICXCF parameter anyhow! > >Be aware that there are two VTAM start options which relate directly to >HiperSockets, IQDCHPID and IQDIOSTG. Also the use of HiperSockets can >affect the VTAM buffer pools so the usual monitoring of VTAM buffer pool >usage will be called into play. > >I see at least one responder has eschewed using the DYNAMICXCF parameter >in favour of specifying all the bits and pieces individually. All the while >continuing with the confusion caused by associating HiperSockets with >sysplexes and XCF, you will find assurance in specifying the bits and pieces in >the section "HiperSockets" under "Dynamic XCF" under "Connectivity in a >sysplex" under Chapter 8, "TCP/IP in a sysplex" in the Communications Server >IP Configuration Guide. You will need to read the earlier sections >under "Dynamic XCF" to appreciate that suitable statements for DEVICE, LINK, >ROUTE and START and suitable statement entries for HOME and >BSDROUTINGPARMS are all created for you when you use the DYNAMICXCF >parameter. This being so you may not need to bother with your own ROUTE >statements or the OMPROUTE address space. However, you will, as always, >need to consider the routing implications for the rest of your IP network as >necessary. > >You didn't actually say you were interested in SNA traffic - but then you >didn't specifically say you were interested in IP traffic either! Allan >Staller's >point that HiperSockets connections cannot be defined for use directly with >SNA - as can be the similar but different XCF connections - may be important >for you. If SNA does interest you, as Allan says, you will need to implement >Enterprise Extender and you *will* be using APPN, and the HPR flavour of >APPN, and not what Allan calls "xDomain" by which I assume he means subarea >SNA. > >You are *not* using QDIO with HiperSockets but rather *i*QDIO, >aka "internal" QDIO. QDIO involves OSA features whereas iQDIO comes "at no >extra charge" with the CEC hardware. > >Finally John McKown's suggestion to search the manuals with "IQD" as a >search word turns up another important reference and a poorly labeled >appendix. In Appendix D, "Using HCD", of the Communications Server IP >Configuration Guide you will see a discussion of how to define your >HiperSockets to the "hardware" - and only that as far as I can see with a >quick glance! I have never had actually to do this so I might have missed the >reference without John's prompt. Otherwise the only hits for "IQD" are in the >sections I mentioned already. > >Chris Mason > >On Tue, 21 Apr 2009 09:34:59 -0700, Mark Yuhas > wrote: > >>We would like to configure the linkage between two LPARs and >>Hipersockets. The LPARs are members of two different s
Servicelink and ActiveX controls
Apparently after the last change to Servicelink IBM decided to employ ActiveX controls when showing me my open ETRs. And these are ActiveX controls that are unsafe, according to the security options. I am NOT free in my choice of browser (IE6) nor am I free in the servicelevel of that browser, I have to use what the corporation gives me. And what I got with an IBM-enforced ActiveX control is a browser that always closes itself and asks me if I want to restart it or send a report of the error to whomever, effectively preventing me from seeing my ETRs. Is anyone else who is security conscious and had set IE options accordingly experiencing the same problem? (Or even recognising that silently active content is executing on your computer?) The pages do NOT look changed. Regards, Barbara Nitz -- Pt! Schon vom neuen GMX MultiMessenger gehört? Der kann`s mit allen: http://www.gmx.net/de/go/multimessenger01 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What (More) Open Source Software for z/OS?
On Wed, Apr 22, 2009 at 12:15 AM, Joe Reichman wrote: > Speaking about open Source would you or any anyone at IBM know when and if > the flex - es > ADCD > > would start again that would really be helpfull > > > Couldn't agree more. Forget about open source and give us back the FLEX-ES offering. Jim McAlpine -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Propagate systems enq
"Victor Zhang" wrote in message news:... > Hi experts, > One of software will use a dataset to store locking information. The > software uses SYSTEMS enq to get exclusive use of the dataset. > The software is storagetek's library station, and the manual said: > To prevent the corruption of the PDF, LibraryStation issues a SYSTEMS ENQ. The > ENQ QNAME is the HSC ENQ QNAME specified by the MAJNAME parameter of > the HSC LIBGEN. The ENQ RNAME is LS:ACTIVE. > If you make LibraryStation software available to more than one host, you are > responsible for propagating the SYSTEMS ENQ to each host. This can be done via > Global Resource Serialization (GRS) or a functionally equivalent product. > > My question is: > If more than one software instance started up on other lpars which are not > in same sysplex, how can systems enq be properly propagating? > > Regards > Victor > The product that can do that is CA-MIM. A MIM-plex can span sysplexes. Doesn't is also issue a Reserve? That's how you normally protect your datasets over systems. Kees. ** For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html