Re: What (More) Open Source Software for z/OS?

2009-04-22 Thread Timothy Sipples
I appreciate the responses, but please (also) post them to the comment
thread at The Mainframe Blog:

http://mainframe.typepad.com/blog/2009/04/what-more-open-source-software-do-you-want-for-zos.html

That'll make sure they get read as widely as possible. Unfortunately some
of the people interested in your wishlists aren't reading IBM-MAIN,
including particular open source project leaders.

For what it's worth, I agree that open source for z/OS should actually be
open source. In fact, it would be best if any z/OS-related changes were
maintained in the mainline open source project repository rather than as a
"fork." If at all possible.

Thanks, everybody.

- - - - -
Timothy Sipples
IBM Consulting Enterprise Software Architect
Based in Tokyo, Serving IBM Japan / Asia-Pacific
E-Mail: timothy.sipp...@us.ibm.com
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Servicelink and ActiveX controls

2009-04-22 Thread Barbara Nitz
Skip,

to see what security options you have active, either in control panel/Internet 
options or under the IE tab Tools-Internet options go to the security 
tab-custom level. That shows you how your security options are currently set. 
There are a number of Active X things.

I have disabled "Download unsigned activeX controls", "Initialize and script 
ActiveX controls not marked as save". I also only "Run ActiveX controls and 
plugins" which are "Administrator approved".
In addition, I don't allow "Paste operations via script" and I disabled 
"Scripting of Java Applets". You do need admin rights to your PC to see these.

One or several of these give me a pop-up window for every ETR screen that tells 
me "Your current security settings prohibit execution of ActiveX controls. Some 
content may not display correctly". I am used to that warning, as it usually 
occurs for advertising banners and does not affect the display. But lately and 
now also for servicelink IE terminates, forcing me to re-login. I have to allow 
all of these unsafe settings in order to display the ETRs and make updates to 
them. (Which also makes the screen content change at a disturbing rate for the 
ads - terrible when things are moving back and forth!)

The appearance of the ETR pages has not changed at all, as far as I can see. 
Which makes me think that *something* is spying on me and every ETR user. (No, 
I am not paranoid.:-) ) We had changes (a 'reboot' according to the news pages) 
on April 19th.

This is what the event viewer tells me for this thing:
The description for Event ID ( 1001 ) in Source ( Microsoft Internet Explorer ) 
cannot be found. The local computer may not have the necessary registry 
information or message DLL files to display messages from a remote computer. 
The following information is part of the event: 242546696.
and
The description for Event ID ( 1000 ) in Source ( Microsoft Internet Explorer ) 
cannot be found. The local computer may not have the necessary registry 
information or message DLL files to display messages from a remote computer. 
The following information is part of the event: iexplore.exe; 6.0.2800.1106; 
unknown; 0.0.0.0; 560f7400.
which translates to 'application failure iexplorer at offset 560f700'. 

I guess this restart window is a more modern form of Dr.Watson.
Yes, I complained to Servicelink/IBM, but they tend to ignore me :-( especially 
as I cannot get to those pages!
Regards, Barbara
-- 
Pt! Schon vom neuen GMX MultiMessenger gehört? Der kann`s mit allen: 
http://www.gmx.net/de/go/multimessenger01

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: METAL C: CodeGen defeciency?

2009-04-22 Thread Kirk Wolf
On Wed, Apr 22, 2009 at 6:25 PM, Paul Gilmartin  wrote:
> On Wed, 22 Apr 2009 13:36:13 -0400, Thomas David Rivers wrote:
>
>>Johnny Luo wrote:
>>> Hi,
>>>
>>> I was trying new METAL option of XL C and the following is the HLASM code
>>> generated :
>>>
>>> *  {
>>> *    char a[20]="12345";
>>>          MVC   88(6,13),0(11)
>
> Is that the actual initialization, in which case the next 4
> instructions are incomprehensible?
>
>>>          MVI   @74a+6,0
>>>          MVC   @74a+7(13),@74a+6
>>>          MVI   @74a+6,0
>>>          MVC   @74a+7(13),@74a+6
>>> *   return;
>>> * }
>>>
> I wouldn't expect it to move 13 characters to assign a 5-character
> (well, 6, counting the terminating NUL) in a 20-character buffer.
>

It is initializing the rest of the automatic storage to zeros (twice),
which probably has to do with the compiler options in effect.
I can't say why it is done twice;  seems like a bug to me.

I would suggest that you compile the same thing with the regular XLC
compiler and look at the generated assembler listing to see if it does
the same thing (double zeroing).

Interesting that they didn't use XC, isn't it?   If you spend any time
looking at XLC generated code you will see lots of interesting stuff.
Of particular interest is some of the loop unwinding optimizations.
After a while you start to wonder if you should ever write in
assembler again, since only IBM knows what instruction heuristics
slide through the pipelines the best.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: METAL C: CodeGen defeciency?

2009-04-22 Thread Paul Gilmartin
On Wed, 22 Apr 2009 13:36:13 -0400, Thomas David Rivers wrote:

>Johnny Luo wrote:
>> Hi,
>>
>> I was trying new METAL option of XL C and the following is the HLASM code
>> generated :
>>
>> *  {
>> *char a[20]="12345";
>>  MVC   88(6,13),0(11)

Is that the actual initialization, in which case the next 4
instructions are incomprehensible?

>>  MVI   @74a+6,0
>>  MVC   @74a+7(13),@74a+6
>>  MVI   @74a+6,0
>>  MVC   @74a+7(13),@74a+6
>> *   return;
>> * }
>>
I wouldn't expect it to move 13 characters to assign a 5-character
(well, 6, counting the terminating NUL) in a 20-character buffer.

>> It initialized the buffer twice! I cannot think of why. Is it normal?
>>
>>
>Not to point too many fingers, but since we did it first,
>here's what Systems/C did with Johnny's example:
>
>* *
>* *** char a[20]="12345";
>  LA14,@lit_6_0
>  MVC   96(6,13),0(14)

Wouldn't it work to:
 
   MVC   96(6,13),@lit_6_0

...?  If the LA works you have addressability.  Yah, I know;
I've worked with (simple) code generators.  I probably don't
understand the environmental constraints.  Perhaps as simple
as the optimizer detected a need for R14 subsequently.

>* setting 14 bytes to 0x00
>  XC102(14,13),102(13)
>
You're only trying to help the programmer, but perhaps thereby
thwarting the intent of a deliberate Dirty GETMAIN.

>* *** return;
>* ***   }

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: System REXX usage

2009-04-22 Thread Martinez, Frank J
I pieced together a small routine to bring down my sandbox gracefully, but I 
have yet to try it on the two larger LPARs.  My biggest concern is that there 
is a limit of 30 seconds (I think) for EXEC to run.  


From: IBM Mainframe Discussion List [ibm-m...@bama.ua.edu] On Behalf Of John 
McKown [joa...@swbell.net]
Sent: Wednesday, April 22, 2009 8:53 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: System REXX usage

On Wed, 22 Apr 2009 07:48:11 -0500, Bob   wrote:

>Just wondering if we could get a list going of some interesting SYSTEM REXX
>uses and tools... to get the creative ideas flowing or does this
already exist
>somewhere (haven't found it yet).
>
>Peace,
>
>bob h

I agree. I'm not really "getting" when and how I would use System REXX. Yes,
I've read the chapter in the book.

--
John

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Data masking/data disguise Primer 1) WHY

2009-04-22 Thread Farley, Peter x23353
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Patrick O'Keefe
> Sent: Wednesday, April 22, 2009 4:50 PM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: Data masking/data disguise Primer 1) WHY
> 
> On Wed, 22 Apr 2009 10:39:29 -0400, Farley, Peter x23353
>  wrote:
 
> >Neither the customer nor the USPS appreciate or long tolerate
> >incorrect zip codes.
> 
> Huh?  Neither the customer not the USPS would see output based
> test data.   If you mean that the application would produce incorrect
> zip codes based because it wasn't test enogh using the  test data,
> then that points to a problem with the code or the test data.

I didn't think at that point that I was talking about test data, which
is usually only needed before an application goes live.
Post-implementation production problems are the ones that require
production data to resolve.  You can't fix a problem unless you can
reproduce the problem, and that, of necessity, requires the data that
caused the problem in the first place -- which usually means real
production data.

The idea I was trying to get across there is the case where a glitch has
turned up in the production stream and the programmer is charged with
fixing that glitch.  In my hypothetical zip-code scenario, I presumed
that the problem could be wrong real zip-codes being generated for real
customer addresses, leading to undeliverable mail or complaints from
USPS that mail is being returned as "no such person this address".  My
thesis is that the programmer cannot debug such a glitch without using
the real production data that originally caused the problem.

Zip-code may not be as good an example as I hoped it would be.  You are
right, of course, that in designing how to mask private information in
such an application the keys to the zip-code database would be masked in
the same way as the production data, so that the zip-code could be
looked up without actually knowing or seeing the "real" address
information.  Only the final printing application would unmask the
address to print it for mailing.

I still firmly believe that there are many other examples where "the
real data" needs to be used to successfully debug an application
problem, and therefore "masked" data will of necessity be seen
"unmasked" by the debugging application programmer.  When PII data is
central to the business process at hand, it will be unavoidable for
programmers to be able to see and manipulate such data in order to do
their jobs successfully.

Peter


This message and any attachments are intended only for the use of the addressee 
and
may contain information that is privileged and confidential. If the reader of 
the 
message is not the intended recipient or an authorized representative of the
intended recipient, you are hereby notified that any dissemination of this
communication is strictly prohibited. If you have received this communication in
error, please notify us immediately by e-mail and delete the message and any
attachments from your system.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Servicelink and ActiveX controls

2009-04-22 Thread Skip Robinson
Since reading your post this morning, I went to look at my ETRs. Unless I
turned on A-X some time ago, I didn't see any change today. How would I
know if I had already turned it on in the past? Also I don't see your
symptoms like having to close a window.

.
.
JO.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler
SHARE MVS Program Co-Manager
626-302-7535 Office
323-715-0595 Mobile
jo.skip.robin...@sce.com


   
 Barbara Nitz  
   To 
 Sent by: IBM  IBM-MAIN@bama.ua.edu
 Mainframe  cc 
 Discussion List   
  Servicelink and ActiveX controls
   
   
 04/22/2009 02:27  
 AM
   
   
 Please respond to 
   IBM Mainframe   
  Discussion List  

   
   




Apparently after the last change to Servicelink IBM decided to employ
ActiveX controls when showing me my open ETRs. And these are ActiveX
controls that are unsafe, according to the security options. I am NOT free
in my choice of browser (IE6) nor am I free in the servicelevel of that
browser, I have to use what the corporation gives me. And what I got with
an IBM-enforced ActiveX control is a browser that always closes itself and
asks me if I want to restart it or send a report of the error to whomever,
effectively preventing me from seeing my ETRs.

Is anyone else who is security conscious and had set IE options accordingly
experiencing the same problem? (Or even recognising that silently active
content is executing on your computer?) The pages do NOT look changed.

Regards, Barbara Nitz

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: The PUT FTP not working with large files

2009-04-22 Thread Paul Gilmartin
On Thu, 23 Apr 2009 08:46:57 +1200, Anthony Fletcher wrote:

>Have you checked out APAR PK71695?
>
Looks plausible, except ...

>From:
>Quintupray Burgos Alvaro
>Date:
>23/04/2009 07:48 a.m.
>
>That is the message ..
>
>EZA1485I 736744 bytes transferred - 31 second interval rate 23.34 KB/sec - 
>Overa

That is not 64 Ki tracks.

>EZA2589E Connection to server interrupted or timed out. Sending data
>EZA2590E send error from send_data - EDC5120I Interrupted function call. 
>(errno2=0x76690291)
>EZA1475I Connection with 167.28.131.244 terminated
>EZA2603E Error sending the file
>
Another possible problem is that while a large file
is flowing over the data socket, the control socket
times out for inactivity.  This might even be aggravated
by the circumvention in PK71695, which might lead to
less traffic on the control connection.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What (More) Open Source Software for z/OS?

2009-04-22 Thread Kirk Wolf
All that needs to happen is a few customers telling them that they now read:

http://www.hpl.hp.com/research/papers/

Since it is free electronically.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Data masking/data disguise Primer 1) WHY

2009-04-22 Thread Patrick O'Keefe
On Wed, 22 Apr 2009 10:39:29 -0400, Farley, Peter x23353 
 wrote:

>...
>Many business processes *do* require the "real" data.  Format
>preservation does not help when sort order is affected.  When a 
>business needs to determine a 9-digit zip code from the customer 
>address, format preservation will not do -- the program needs the 
>real street number and address and the real city and state or it 
>gets the wrong zip code.

I (almost) agree, but draw a very different conclusion.  

I assume most business processes can accept realistic but bogus
data and process it accurately.   In your example, the only process
requiring actual addresses (rather than bogus addresses that 
would be in the correct zip code if they were real) are those that 
validate against a registry of real addresses.   For those, part of 
the obfuscated data would have to be a bogus registry.

I think that this really highlights the need for a very sophisticated
obfuscation technique.  The same details that go into a process
design need to go into the data obfuscation design so that the
bogus data actually works.

That, of course, can't help debugging a problem that is sensitive to
only one exact combination of data.
 

>Neither the customer nor the USPS appreciate or long tolerate 
>incorrect zip codes.

Huh?  Neither the customer not the USPS would see output based 
test data.   If you mean that the application would produce incorrect
zip codes based because it wasn't test enogh using the  test data,
then that points to a problem with the code or the test data.

Pat O'keefe

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: The PUT FTP not working with large files

2009-04-22 Thread Anthony Fletcher
Have you checked out APAR PK71695?

regards, 
Anthony Fletcher - MNZCS 
Team Lead NZ SMM 
(AirNZ, Westpac NZ , TelstraClear NZ and NWM AU)

IBM Global Technology Services
Server Systems Operations
Server Management Mainframe
Global Services Delivery Australia and New Zealand 
NZ z/OS Software Program Manager 
z/OS Technical Lead A/NZ

Ph: Direct +64 4 576 8142, tieline 61 929 8142, ITN 
*869298142, mobile +64 21 464 864, Fax +64 4 576 5808.
Internet: flet...@nz1.ibm.com, Sametime: flet...@nz1.ibm.com

 "The biggest threat to effective communication is the belief that it has 
occurred"
 "Winners make commitments, Losers make promises"



From:
Quintupray Burgos Alvaro 
To:
IBM-MAIN@bama.ua.edu
Date:
23/04/2009 07:48 a.m.
Subject:
Re: The PUT FTP not working with large files
Sent by:
IBM Mainframe Discussion List 



Hi.

That is the message ..



EZA1485I 736744 bytes transferred - 31 second interval rate 23.34 KB/sec - 
Overa
EZA2589E Connection to server interrupted or timed out. Sending data
EZA2590E send error from send_data - EDC5120I Interrupted function call. 
(errno2=0x76690291)
EZA1475I Connection with 167.28.131.244 terminated
EZA2603E Error sending the file


Atte.,
 Alvaro



-Mensaje original-
De: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] En nombre 
de Cebell, David
Enviado el: Miércoles, 22 de Abril de 2009 15:34
Para: IBM-MAIN@bama.ua.edu
Asunto: Re: The PUT FTP not working with large files


In your listing, is some of the Data Transmitted?

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Alvaro Quintupray Burgos
Sent: Wednesday, April 22, 2009 2:28 PM
To: IBM-MAIN@bama.ua.edu
Subject: The PUT FTP not working with large files

Hi.

We have getting  the following response when exec a  PUT  FTP with
big
files from  Host Z/OS  1.8   to  Host  Z/OS  1.8

EZA2590E send error from send_data - EDC5120I Interrupted function call.

(errno2=0x76690291)


If we send  a  little file  the FTP  work  O.K.


What are we doing wrong?

Thanks.

Alvaro.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


La información contenida en este correo electrónico, así como en 
cualquiera de sus adjuntos, es confidencial y está dirigida exclusivamente 
a el o los destinatarios indicados. Cualquier uso, reproducción, 
divulgación o distribución por otras personas distintas de el o los 
destinatarios está estrictamente prohibida. Si ha recibido este correo por 
error, por favor notifíquelo inmediatamente al remitente y bórrelo de su 
sistema sin dejar copia del mismo. BancoEstado no acepta responsabilidad 
alguna por cualquier perdida o daño como consecuencia, directa o 
indirecta, del uso indebido de este e-mail o de los adjuntos al mismo.

The information contained in this e-mail message may be privileged, 
confidential and protected from disclosure. If you are not the intended 
recipient, any further disclosure or use, dissemination, distribution or 
copying of this message or any attachment is strictly prohibited. If you 
think you have received this e-mail message in error, please E-mail the 
sender and delete the e-mail. BancoEstado is not liable for any loss or 
damage resulting from illegal use of this E-mail or any attachment.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: The PUT FTP not working with large files

2009-04-22 Thread Randy Gross
You should probably allocate space for the target dataset, something like the 
following FTP command:

SITE CYL PRI=100 SEC=100

use whatevr space allocation is appropriate.

Also, make sure the dataset doesn't already exist on the target system.

Randy 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: The PUT FTP not working with large files

2009-04-22 Thread Hal Merritt
1. There is a firewall terminating the connection. 

2. There is an issue on the target host such as an out of space condition. Make 
sure the target file does not exist before transmission starts. If the target 
file is replaced, then the old allocation will be used no matter what you say 
differently.  

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Alvaro Quintupray Burgos
Sent: Wednesday, April 22, 2009 2:28 PM
To: IBM-MAIN@bama.ua.edu
Subject: The PUT FTP not working with large files

Hi.

We have getting  the following response when exec a  PUT  FTP with big 
files from  Host Z/OS  1.8   to  Host  Z/OS  1.8  

EZA2590E send error from send_data - EDC5120I Interrupted function call. 
(errno2=0x76690291)


If we send  a  little file  the FTP  work  O.K.


What are we doing wrong?

Thanks.

Alvaro.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: The PUT FTP not working with large files

2009-04-22 Thread Quintupray Burgos Alvaro
Hi.

That is the message ..



EZA1485I 736744 bytes transferred - 31 second interval rate 23.34 KB/sec - Overa
EZA2589E Connection to server interrupted or timed out. Sending data
EZA2590E send error from send_data - EDC5120I Interrupted function call. 
(errno2=0x76690291)
EZA1475I Connection with 167.28.131.244 terminated
EZA2603E Error sending the file


Atte.,
 Alvaro



-Mensaje original-
De: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] En nombre de 
Cebell, David
Enviado el: Miércoles, 22 de Abril de 2009 15:34
Para: IBM-MAIN@bama.ua.edu
Asunto: Re: The PUT FTP not working with large files


In your listing, is some of the Data Transmitted?

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Alvaro Quintupray Burgos
Sent: Wednesday, April 22, 2009 2:28 PM
To: IBM-MAIN@bama.ua.edu
Subject: The PUT FTP not working with large files

Hi.

We have getting  the following response when exec a  PUT  FTP with
big
files from  Host Z/OS  1.8   to  Host  Z/OS  1.8

EZA2590E send error from send_data - EDC5120I Interrupted function call.

(errno2=0x76690291)


If we send  a  little file  the FTP  work  O.K.


What are we doing wrong?

Thanks.

Alvaro.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


La información contenida en este correo electrónico, así como en cualquiera de 
sus adjuntos, es confidencial y está dirigida exclusivamente a el o los 
destinatarios indicados. Cualquier uso, reproducción, divulgación o 
distribución por otras personas distintas de el o los destinatarios está 
estrictamente prohibida. Si ha recibido este correo por error, por favor 
notifíquelo inmediatamente al remitente y bórrelo de su sistema sin dejar copia 
del mismo. BancoEstado no acepta responsabilidad alguna por cualquier perdida o 
daño como consecuencia, directa o indirecta, del uso indebido de este e-mail o 
de los adjuntos al mismo.

The information contained in this e-mail message may be privileged, 
confidential and protected from disclosure. If you are not the intended 
recipient, any further disclosure or use, dissemination, distribution or 
copying of this message or any attachment is strictly prohibited. If you think 
you have received this e-mail message in error, please E-mail the sender and 
delete the e-mail. BancoEstado is not liable for any loss or damage resulting 
from illegal use of this E-mail or any attachment.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What (More) Open Source Software for z/OS?

2009-04-22 Thread Jim McAlpine
On Wed, Apr 22, 2009 at 12:02 PM, P S  wrote:

> On Wed, Apr 22, 2009 at 5:26 AM, Jim McAlpine 
> wrote:
> > Couldn't agree more.  Forget about open source and give us back the
> FLEX-ES
> > offering.
>
> You do realize FLEX-ES wasn't an IBM offering, right?
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>

Yes, but it was IBM that pulled the rug, right !

Jim McAlpine

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: The PUT FTP not working with large files

2009-04-22 Thread Cebell, David
In your listing, is some of the Data Transmitted?

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Alvaro Quintupray Burgos
Sent: Wednesday, April 22, 2009 2:28 PM
To: IBM-MAIN@bama.ua.edu
Subject: The PUT FTP not working with large files

Hi.

We have getting  the following response when exec a  PUT  FTP with
big 
files from  Host Z/OS  1.8   to  Host  Z/OS  1.8  

EZA2590E send error from send_data - EDC5120I Interrupted function call.

(errno2=0x76690291)


If we send  a  little file  the FTP  work  O.K.


What are we doing wrong?

Thanks.

Alvaro.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


The PUT FTP not working with large files

2009-04-22 Thread Alvaro Quintupray Burgos
Hi.

We have getting  the following response when exec a  PUT  FTP with big 
files from  Host Z/OS  1.8   to  Host  Z/OS  1.8  

EZA2590E send error from send_data - EDC5120I Interrupted function call. 
(errno2=0x76690291)


If we send  a  little file  the FTP  work  O.K.


What are we doing wrong?

Thanks.

Alvaro.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Java on z/OS JNI Sample Wanted - Preferably HLASM

2009-04-22 Thread John McKown
The only thing that I've really found is C/C++ oriented in the Redbook:
"Java Stand Alone Applications on z/OS Volume II"


JNI was originally designed to be used in combination with C/C++, but you can
also achieve interlanguage interoperability with Java through COBOL. This
function is part of Enterprise COBOL for z/OS V3R4. This method is fairly new
and until recently, using JNI was only possible in a combination of Java and
C/C++.

So, in most cases JNI is still used in combination with C/C++. Through C/C++
you can access a huge number of z/OS UNIX Assembler Callable Services,
which in turn enables you to reach resources that may not be accessible directly
through Java code. In that situation you could decide to use a native
language to
achieve your goal. There is also the possibility of using an indirect
interface. By
“indirect” we mean, for example, a piece of C/C++ code that provides a link
to an
Assembler module. That way you can use the JNI to integrate Assembler in your
Java application.


http://www.redbooks.ibm.com/abstracts/sg247291.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Data masking/data disguise Primer 1) WHY

2009-04-22 Thread Clark Morris
On 21 Apr 2009 09:28:35 -0700, in bit.listserv.ibm-main you wrote:

>I have noticed a couple of questions in the last couple of months
>concerning issues along the lines of data disguise/data masking/data
>obfuscation (a lot of different words for the same issue Protecting PII
>(personal identifiable information)) from being 'released'
>
>My plan, unless there is a backlash, is to create a series of threads
>discussing the issues, provide some 'interesting' studies, some
>resources available to IT professionals etc.
>
>The first in the series is WHY.
>
>This maybe one of the easiest and hardest subjects to deal with. Easy
>because in most case people have seen what happens when production data
>gets 'out'. Those who have read the newspaper reports of MAJOR companies
>being embarrassed in the press (as well as sued, loss of customers, etc)
>because of data breaches. A study of the Ponemon Institute sates the
>average cost per lost customer record was $197 U.S. in 2007. Now
>multiply that by 10,000 customer records...  'Loss of face'/confidence
>of the customer etc. it adds up.
>
>The hard part is the same as the above. That is convincing management
>that there is a issue in the first place. Typical responses are (and
>this may or may not be relevant to your organisation) is 'we have non
>disclose agreements', 'our files are secured by, RACF, TOP SECREAT,
>WINDOWS AUTHICATION, ACF2, etc. While these types of security are
>important, they do not solve the whole issue.
>
>Example, 
>
>Application require 'good' quality of test data for QA/user
>acceptance/system testing. Right now the QA department/group/team  copy
>production data. The reasoning is that the quality of the production
>data is the 'best'  An QA analyst runs a report as part of his/her test
>case senerio. The report is printed and after verified, thrown out in a
>recycle/garbage bin. It lands up in a dumpster where someone finds
>it
>

It gets interesting when personally identifiable data is needed for
validation of the routines.  If there is a street address / postal
code validation routine, the real addresses are needed.  Various name
matching and validation routines could need the real names.  For these
and other cases, the test / QA environments have to be guarded as
closely as the production environment AND the people cleared on the
need to know and reliability basis.  All copies, hard and soft, have
to be handled appropriately.  

Test data should have both weird but valid information and
pathological information (the error routines must be validated so
erroneous data is needed).  

One of the things that an organization must consider is whether it can
adequately protect the information entrusted to it.  It must
understand the liabilities and consequences of delegating the handling
of sensitive information to other organizations.  It must understand
the laws of all of the jurisdictions where that data can be accesses
and updated.  

In short obfuscation can work for some things but not all. Responsible
data handling is a core obligation for ALL organizations so delegation
of any of the duties should be done carefully.  All organizations will
have to decide who they will trust and what safeguards are both needed
and viable.
>Another example
>
>A customer service rep (CSR) who is responsible to access clients who's
>last name starts with the letter 'A'. Given most security set ups,
>she/he has access to the query application and has access to the entire
>DB. She/he access clients through out the DB, which she sells their
>info. How do you track/verify/prove/correct that? (Application auditing)
>
>And it goes on (note these are actual cases)
>
>And while this is not a direct concern to IT, there are legal
>restriction/requirements concerning protection PII. Depending on where
>your company operates certain safe guards/process/agreements needed to
>be executed/observed. And since a lot of companies are operate in many
>jurisdictions, there maybe may different laws that have to be observed,
>even when there is no actual 'brick and mortar' building there.
>
>While I am sure many of you already 'get' this, the idea is to open a
>discussion on the listserv so others, as well as ourselves, can see
>other opinion on this matter
>
>While this subject id extensive, my idea is to just give everyone a
>little taste of the 'WHY.
>
>PLEASE let me know if you are interested in reading more. Otherwise I
>will stop.
>
>
>THE VIEWS EXPRESSED WITHIN THIS EAMIL ARE MINE AND MINE ALONE. 
>
>
>
>Robert Galambos CIPP/IT CIPP/C 
>IBM Certified Database Associate 
>IBM Certified DB2 9 for z/OS Database Administration
>Certified Information Privacy Professional/Canada
>Certified Information Privacy Professional/Information Technology
>
>Compuware Corp. Of Canada 
>
> Service is our best product
>
> 
>Le contenu de ce courriel s'adresse au destinataire seulement. Il contient de 
>l'information pouvant etre confidentielle. Vous ne devez ni le copier ni 
>l'utiliser

Re: Java on z/OS JNI Sample Wanted - Preferably HLASM

2009-04-22 Thread Steve Comstock

Martin Packer wrote:
Could someone point me to a good simple sample of a HLASM JNI method being 
called from Java on z/OS? Failing a HLASM one I'd accept some other 
language.


Pointer to a basic doc also appreciated.

(Project involves also getting Jython to call a JNI method.)

Thanks, Martin

Martin Packer
Performance Consultant
IBM United Kingdom Ltd
+44-20-8832-5167
+44-7802-245-584

email: martin_pac...@uk.ibm.com

Twitter ID: MartinPacker

"They're figuring out that collaboration isn't a productivity hit, it 
makes them smarter." Sam Palmisano on BlogCentral, 26 November 2008


I seem to recall a session on this in a past SHARE, but I
can't find the reference to it. You might check the proceedings
of recent SHAREs (2003-present), or maybe someone else can
recall / find the info.



Kind regards,

-Steve Comstock
The Trainer's Friend, Inc.

303-393-8716
http://www.trainersfriend.com

  z/OS Application development made easier
* Our classes include
   + How things work
   + Programming examples with realistic applications
   + Starter / skeleton code
   + Complete working programs
   + Useful utilities and subroutines
   + Tips and techniques

==> Check out the Trainer's Friend Store to purchase z/OS  <==
==> application developer toolkits. Sample code in four<==
==> programming languages, JCL to Assemble or compile, <==
==> bind and test. <==
==>   http://www.trainersfriend.com/TTFStore/index.html<==

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Data masking/data disguise Primer 1) WHY

2009-04-22 Thread P S
Yeah, the $200/card probably reflects the fact that if a stolen card
gets used, it likely get used for several under-$500 purchases (I
believe that's the current level to increase the card provider's
interest in verification). So if a stolen card that gets used costs
$2,000 on average, that means that even if only 1 in 10 stolen cards
gets used, that $200 is correct.

I still doubt that it applies to Heartland, however -- action was
taken and I doubt that the black hats managed to use 10M cards before
they were all cut off. But who knows...!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What (More) Open Source Software for z/OS?

2009-04-22 Thread John McKown
On Wed, 22 Apr 2009 13:15:45 -0500, Ron Wells  wrote:

>Unfortunately there still needs to be lower costs on the software ...
>Still run up against cost cheaper on another platform it's the same
>application.. but since it runs on the M/F it costs more .. There are
>Vendors out there that are reasonable .. like MacKinney .. but not enough
>of them to make a dent ..
>

This is the case where "n" smaller servers are "better" than the mainframe.
Most, if not all, z shops upgrade their processors due to the increase in
their application workload. That is, they are running the same software, but
more data or running more CPU intensive software that they wrote themselves.
However, every  vendor assumes that when you upgrade your CPU it is
simply to run their software even more. So the software bill goes up through
the roof. 

On the distributed side, you get a new box and only license the software you
need on that one box. I.e. if you get a new Windows box, running IIS, you
get those two licenses. You don't need to get a better Oracle license, or a
new license for every Windows CA product that you have, and so on. So adding
processing power can be very much cheaper, especially in the short term.
Which is the only way that management thinks. They rarely consider
infrastructure support cost increase (just let the current people work
longer hours, silly!)

--
John

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What (More) Open Source Software for z/OS?

2009-04-22 Thread Ron Wells
Unfortunately there still needs to be lower costs on the software ... 
Still run up against cost cheaper on another platform it's the same 
application.. but since it runs on the M/F it costs more .. There are 
Vendors out there that are reasonable .. like MacKinney .. but not enough 
of them to make a dent ..

--
Email Disclaimer
This  E-mail  contains  confidential  information  belonging to the sender, 
which  may be legally privileged information.  This information is intended 
only  for  the use of the individual or entity addressed above.  If you are not 
 the  intended  recipient, or  an  employee  or  agent responsible for 
delivering it to the intended recipient, you are hereby notified that any 
disclosure,  copying, distribution, or the taking of any action in reliance on 
the contents of the E-mail or attached files is strictly prohibited.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What (More) Open Source Software for z/OS?

2009-04-22 Thread Howard Brazee
On 22 Apr 2009 10:01:45 -0700, tz...@attglobal.net (Tony Harminc)
wrote:

>Well, Tim's original post was about "What (More) Open Source Software
>Do You Want for z/OS?". I can speak only for myself, but when I think
>of open source software, I don't mean what IBM has mostly done with
>things like the Ported Tools, which is to take open source software
>and provide OCO versions for z/OS. What I expect is ported versions
>*with source*. Without source, they're only shadows of their former
>Open Source selves, that will atrophy unless kept up to date by IBM,
>which has notably happened to a number of earlier ports to OCO. While
>IBM has unquestionably contributed a huge amount to the open source
>community, they have also done their fair share of closing off
>existing open source code. IBM has on occasion even hidden such
>activities behind the banner of open source, which leaves a bad taste.

Agreed.   But selfishly, what I want is for the marketplace to start
believing that mainframe computers will be a cost-effective option for
much of the software that they are thinking about moving to.   For the
projected life of that software.

More importantly, I want a company that has moved towards "new"
technology to believe that his current setup of multiple *nix servers
can be upgraded in a cost effective manner to a more secure and faster
mainframe system.

I don't think most prospective customers even think of mainframes for
these technologies, even though they might read that IBM offers *nix.

So how will that perception be changed?   Maybe Open Source software
will help.   Maybe it will be an advertisement campaign.   (I always
wonder how much it helps when IBM or EDS had a great Superbowl ad -
when the product costs millions.But I've also seen ads for
prescription medicines such as Plavix).

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: can SMS managed VSAM file be deleted while allocated

2009-04-22 Thread Ron Hawkins
Otto,

Patient to Doctor: If I do this it hurts.
Doctor to Patient: Then don't do it.

That's why we don't put SMS volumes online across SYSPLEXES. In this case
the enqueue on the dataset is the protection mechanism, but SYSPLEX1 didn't
know about it.

Guilty of the same thing - I blew up my JCL.CNTL a few months ago.

Ron

> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of
> Schumacher, Otto
> Sent: Tuesday, April 21, 2009 6:43 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: [IBM-MAIN] can SMS managed VSAM file be deleted while
allocated
> 
> We just had a incident where a 121,000,000 record multi volume file lost
> 25,000,000 records. What occurred is that the volume was erroneously
> setup in HSM to be managed from SYSPLEX1. The file should have been
> setup for a read only with no management.  The file was actually opened
> and was being written to from SYSPLEX2.  HSM running on SYSPLEX1
> actually freed what it believed to be a empty extent.  There was no
> indication that this was done in SMF. The only place this showed up was
> in the HSM log. We are running GRS and do not have MIM DASD.
> 
> Regards
> 
> Otto Schumacher
> Technical  Support, CICS
> 
> EDS, an HP Company
> Ahold Account
> 2000 Wade Hampton Blvd.
> LC1-302
> Greenville,  South Carolina, 29615
> 
> Tel: 864 987-1417
> Fax: 864 987-4500
> E-mail: otto.schumac...@eds.com
> 
> We deliver on our commitments
> so you can deliver on yours.
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Burrell, C. Todd (CDC/OCOO/ITSO) (CTR)
> Sent: Tuesday, April 21, 2009 9:19 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: can SMS managed VSAM file be deleted while allocated
> 
> I believe referenced usually means OPENED.  I had a similar problem a
> few years back when we IPL'ed a system that had not been down in about 6
> months.  HSM came up first, and deleted some files related to Netview.
> 
> 
> C. Todd Burrell, PMP, MCP
> Lead z/OS Systems Programmer
> ITSO
> (404) 723-2017 (Cell)
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Barkow, Eileen
> Sent: Monday, April 20, 2009 2:23 PM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: can SMS managed VSAM file be deleted while allocated
> 
> we found the answer but it seems that something is still wrong.
> apparently, the file was under a SMS management class which checks for
> 'unreferenced' datasets older then 999 days and in the brief period that
> the started task using it was down (right before an ipl which is the
> only time it comes down), HSM decided to delete the file.
> 
>  But the question is what does SMS consider to be 'unreferenced' -
> clearly the file is getting allocated but I am not sure if it is
> actually opened (this is a vendor product and the file usage may be
> optional).
> SMS claimed that the last time the file was 'referenced' was about the
> time I think that it was created.
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Ted MacNEIL
> Sent: Monday, April 20, 2009 2:16 PM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: can SMS managed VSAM file be deleted while allocated
> 
> >that is what i thought - the job would have had to be down at the time
> the file was deleted.
> >Unless there is some weird bug in the system.
> 
> >thanks Ted
> 
> You're welcome.
> Get DAF from the CBT, and run it against the SMF data for the time
> period in question.
> That should tell who/when.
> If it does match up with the job running at the same time, then not only
> do you have a weird bug, but you have a data integrity problem.
> 
> But, I strongly doubt it!
> You should find the culprit, then you can use your favourite form of
> persuasion to stop them from doing again.
> 
> -
> Too busy driving to stop for gas!
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send
> email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search
> the archives at http://bama.ua.edu/archives/ibm-main.html
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send
> email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search
> the archives at http://bama.ua.edu/archives/ibm-main.html
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM

Re: What (More) Open Source Software for z/OS?

2009-04-22 Thread Paul Gilmartin
On Wed, 22 Apr 2009 12:16:31 -0500, John McKown wrote:
>
>
>Now, as to what I'd like in z/OS UNIX? Wow, I have a bunch of things. I'd
>like something like Linux's /proc pseudo-filesystem. It would take a lot of
>
+1.  If there were a /proc/self/home, I'd be able to code JCL to
access the user's home directory without knowing the site's
naming conventions.  (There are a couple things wrong with
coding "DD PATH='/u/&SYSUID/'".)

>lines to detail what all I'd like. But, just as some examples, an interface
>to the SPOOL so that I can see what jobs are in the SPOOL (subject to
>security). Perhaps even access their SPOOL files, if I have appropriate
>
Would this be better done by mounting the JES spool as a UNIX FS
(permissions subject to security), or with an OUTPUT JCL option
to direct specified data sets to the existing UNIX FS?

>authority. An interface to the RMF information (read-only). And, I still
>want /dev/intrdr to do job submission. Yes, I have a REXX program which
>submits JCL from a file or STDIN (if no file is specified), so piping works.
>But piping uses a second process, which is not as efficient.
>
Ummm.  This would probably involve a daemon, which is the process
you'd like to avoid.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: METAL C: CodeGen defeciency?

2009-04-22 Thread Thomas David Rivers

Johnny Luo wrote:

Hi,

I was trying new METAL option of XL C and the following is the HLASM code
generated :

*  {
*char a[20]="12345";
 MVC   88(6,13),0(11)
 MVI   @74a+6,0
 MVC   @74a+7(13),@74a+6
 MVI   @74a+6,0
 MVC   @74a+7(13),@74a+6
*   return;
* }

It initialized the buffer twice! I cannot think of why. Is it normal?





Not to point too many fingers, but since we did it first,
here's what Systems/C did with Johnny's example:

* *
* *** char a[20]="12345";
 LA14,@lit_6_0
 MVC   96(6,13),0(14)
* setting 14 bytes to 0x00
 XC102(14,13),102(13)
* *** return;
* ***   }


- Dave Rivers -


--
riv...@dignus.comWork: (919) 676-0847
Get your mainframe programming tools at http://www.dignus.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What (More) Open Source Software for z/OS?

2009-04-22 Thread Jerry Whitteridge
I'd like to see bash better implemented/supported as a shell. (I'm
constantly using keystrokes that I am used to in Linux that don't work
in USS - best example is the arrow key to autofill dataset or path
names)

Jerry Whitteridge
Mainframe Engineering
Safeway Inc
925 951 4184
jerry.whitteri...@safeway.com
If everything seems under control, you're just not going fast enough. 
 

> -Original Message-
> From: IBM Mainframe Discussion List 
> [mailto:ibm-m...@bama.ua.edu] On Behalf Of John McKown
> Sent: Wednesday, April 22, 2009 10:17 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: What (More) Open Source Software for z/OS?
> 
> On Wed, 22 Apr 2009 12:50:49 -0400, Tony Harminc 
>  wrote:
> 
> >
> >Well, Tim's original post was about "What (More) Open Source Software
> >Do You Want for z/OS?". I can speak only for myself, but when I think
> >of open source software, I don't mean what IBM has mostly done with
> >things like the Ported Tools, which is to take open source software
> >and provide OCO versions for z/OS. What I expect is ported versions
> >*with source*. Without source, they're only shadows of their former
> >Open Source selves, that will atrophy unless kept up to date by IBM,
> >which has notably happened to a number of earlier ports to OCO. While
> >IBM has unquestionably contributed a huge amount to the open source
> >community, they have also done their fair share of closing off
> >existing open source code. IBM has on occasion even hidden such
> >activities behind the banner of open source, which leaves a 
> bad taste.
> >
> >Asking what open source software is wanted on z/OS, with the
> >likelihood that it's going to arrive OCO, is really just asking what
> >new function people want in z/OS. Which is a perfectly fine question,
> >of course, but the answers are likely to have rather a different
> >flavour.
> >
> >Tony H.
> 
> I totally agree. I like the fact that IBM ported OpenSSH to 
> run on z/OS. But
> I hate the fact that, for whatever reason, they decided to 
> not share the
> updated source. Given the license on OpenSSH, this is 
> perfectly legal. But
> if IBM should someday decide that they want to develop a 
> competing product
> and discontinue maintaining OpenSSH, then I'm up a creek.
> 
> This is, again, why I like the GPL license over other OSI 
> licenses. Not that
> I want to start a license war here, too.
> 
> Now, as to what I'd like in z/OS UNIX? Wow, I have a bunch of 
> things. I'd
> like something like Linux's /proc pseudo-filesystem. It would 
> take a lot of
> lines to detail what all I'd like. But, just as some 
> examples, an interface
> to the SPOOL so that I can see what jobs are in the SPOOL (subject to
> security). Perhaps even access their SPOOL files, if I have 
> appropriate
> authority. An interface to the RMF information (read-only). 
> And, I still
> want /dev/intrdr to do job submission. Yes, I have a REXX 
> program which
> submits JCL from a file or STDIN (if no file is specified), 
> so piping works.
> But piping uses a second process, which is not as efficient. 
> 
> --
> John
> --
> John
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
> 
> 

"Email Firewall" made the following annotations.
--

Warning: 
All e-mail sent to this address will be received by the corporate e-mail 
system, and is subject to archival and review by someone other than the 
recipient.  This e-mail may contain proprietary information and is intended 
only for the use of the intended recipient(s).  If the reader of this message 
is not the intended recipient(s), you are notified that you have received this 
message in error and that any review, dissemination, distribution or copying of 
this message is strictly prohibited.  If you have received this message in 
error, please notify the sender immediately.   
 
==

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What (More) Open Source Software for z/OS?

2009-04-22 Thread John McKown
On Wed, 22 Apr 2009 12:50:49 -0400, Tony Harminc  wrote:

>
>Well, Tim's original post was about "What (More) Open Source Software
>Do You Want for z/OS?". I can speak only for myself, but when I think
>of open source software, I don't mean what IBM has mostly done with
>things like the Ported Tools, which is to take open source software
>and provide OCO versions for z/OS. What I expect is ported versions
>*with source*. Without source, they're only shadows of their former
>Open Source selves, that will atrophy unless kept up to date by IBM,
>which has notably happened to a number of earlier ports to OCO. While
>IBM has unquestionably contributed a huge amount to the open source
>community, they have also done their fair share of closing off
>existing open source code. IBM has on occasion even hidden such
>activities behind the banner of open source, which leaves a bad taste.
>
>Asking what open source software is wanted on z/OS, with the
>likelihood that it's going to arrive OCO, is really just asking what
>new function people want in z/OS. Which is a perfectly fine question,
>of course, but the answers are likely to have rather a different
>flavour.
>
>Tony H.

I totally agree. I like the fact that IBM ported OpenSSH to run on z/OS. But
I hate the fact that, for whatever reason, they decided to not share the
updated source. Given the license on OpenSSH, this is perfectly legal. But
if IBM should someday decide that they want to develop a competing product
and discontinue maintaining OpenSSH, then I'm up a creek.

This is, again, why I like the GPL license over other OSI licenses. Not that
I want to start a license war here, too.

Now, as to what I'd like in z/OS UNIX? Wow, I have a bunch of things. I'd
like something like Linux's /proc pseudo-filesystem. It would take a lot of
lines to detail what all I'd like. But, just as some examples, an interface
to the SPOOL so that I can see what jobs are in the SPOOL (subject to
security). Perhaps even access their SPOOL files, if I have appropriate
authority. An interface to the RMF information (read-only). And, I still
want /dev/intrdr to do job submission. Yes, I have a REXX program which
submits JCL from a file or STDIN (if no file is specified), so piping works.
But piping uses a second process, which is not as efficient. 

--
John
--
John

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SMPE dependency question

2009-04-22 Thread Chase, John
> -Original Message-
> From: IBM Mainframe Discussion List On Behalf Of Sumi, Joseph J.
> 
> If "product A" has a PTF that requires a PTF from "product B"...
> would you expect "products A's" PTF to have a HOLD indicating to apply
> "product B's" PTF or would you expect a COREQ ?

Occasionally see that situation when a CICS PTF "depends on" a companion
LE PTF to "fully implement" the change.  In all cases so far, the CICS
PTF identifies the dependency with a ++HOLD rather than a ++REQ.  I
don't know if the fact that CICS and LE have different SRELs has
anything to do with that.

-jc-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SMPE dependency question

2009-04-22 Thread Sumi, Joseph J. (CMS/CTR) (CTR)
Thanks.turns out these products are in 2 separate SMP
environments.the one PTF had HOLD info alerting of the other
products PTF.

Rgrds, Joseph Sumi 




-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Tom Marchant
Sent: Wednesday, April 22, 2009 12:32 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: SMPE dependency question

On Wed, 22 Apr 2009 11:25:10 -0500, Tom Marchant wrote:
>
>And IFREQ is most effective if both products are in the same target and
>distribution zones.  Otherwise it is not automatic.

The above is incorrect.  See Mark Zelden's post for details.

Sorry for the error.

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What (More) Open Source Software for z/OS?

2009-04-22 Thread Tony Harminc
2009/4/21 Martin Packer :
> I'm not sure why this turned into another OCO debate, but attempting to 
> return to Tim's original post:

Well, Tim's original post was about "What (More) Open Source Software
Do You Want for z/OS?". I can speak only for myself, but when I think
of open source software, I don't mean what IBM has mostly done with
things like the Ported Tools, which is to take open source software
and provide OCO versions for z/OS. What I expect is ported versions
*with source*. Without source, they're only shadows of their former
Open Source selves, that will atrophy unless kept up to date by IBM,
which has notably happened to a number of earlier ports to OCO. While
IBM has unquestionably contributed a huge amount to the open source
community, they have also done their fair share of closing off
existing open source code. IBM has on occasion even hidden such
activities behind the banner of open source, which leaves a bad taste.

Asking what open source software is wanted on z/OS, with the
likelihood that it's going to arrive OCO, is really just asking what
new function people want in z/OS. Which is a perfectly fine question,
of course, but the answers are likely to have rather a different
flavour.

Tony H.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What (More) Open Source Software for z/OS?

2009-04-22 Thread Rick Fochtman

-
You are allowed take the initiative and think independently/creatively.
---
NOT IN THIS SHOP!!! If you're anything more than an unthinking robot, 
you're likely to become a "former employee" in one heap big hurry.


Common sense, independant thought or creative thinking will earn a 
"Promotion to the sidewalk" so fast that the revolving door at the 
building entrance will give you a bad case of windburn.


It's a stupid way to run an IT shop, but "Them's the conditions that 
prevail" and as long as the Board agrees, what's a guy to do?


--
Rick
--
Remember that if you’re not the lead dog, the view never changes.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SMPE dependency question

2009-04-22 Thread Tom Marchant
On Wed, 22 Apr 2009 11:25:10 -0500, Tom Marchant wrote:
>
>And IFREQ is most effective if both products are in the same target and
>distribution zones.  Otherwise it is not automatic.

The above is incorrect.  See Mark Zelden's post for details.

Sorry for the error.

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SMPE dependency question

2009-04-22 Thread Tom Marchant
On Wed, 22 Apr 2009 19:07:57 +0300, Binyamin Dissen  wrote:

>On Wed, 22 Apr 2009 11:58:42 -0400 "Sumi, Joseph J. (CMS/CTR) (CTR)"
> wrote:
>
>:>If "product A" has a PTF that requires a PTF from "product B"...
>:>would you expect "products A's" PTF to have a HOLD indicating to apply
>:>"product B's" PTF or would you expect a COREQ ?
>
>A tough call as they might be in different GLOBAL zones.
>
>IFREQ is better as it is automatic, but if the products are in global zones
>there is no way that SMP can know from the A CSI that there is product B.

And IFREQ is most effective if both products are in the same target and
distribution zones.  Otherwise it is not automatic.

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SMPE dependency question

2009-04-22 Thread Mark Zelden
On Wed, 22 Apr 2009 19:07:57 +0300, Binyamin Dissen
 wrote:

>On Wed, 22 Apr 2009 11:58:42 -0400 "Sumi, Joseph J. (CMS/CTR) (CTR)"
> wrote:
>
>:>If "product A" has a PTF that requires a PTF from "product B"...
>:>would you expect "products A's" PTF to have a HOLD indicating to apply
>:>"product B's" PTF or would you expect a COREQ ?
>
>A tough call as they might be in different GLOBAL zones.
>
>IFREQ is better as it is automatic, but if the products are in global zones
>there is no way that SMP can know from the A CSI that there is product B.
>

Possibly, but this can all be done automatically with conditional ++IF
assuming SMP/E has been set up correctly. 

See the SMP/E User's Guide under: 
Specifying automatic cross-zone requisite checking

http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/GIMUSR36/3.6.3?SHELF=GIM2BK60&DT=20070428231340

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America / Farmers Insurance Group - ZFUS G-ITO
mailto:mark.zel...@zurichna.com
z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SMPE dependency question

2009-04-22 Thread Paul Gilmartin
On Wed, 22 Apr 2009 19:07:57 +0300, Binyamin Dissen wrote:

>On Wed, 22 Apr 2009 11:58:42 -0400 "Sumi, Joseph J. (CMS/CTR) (CTR)"
>
>:>If "product A" has a PTF that requires a PTF from "product B"...
>:>would you expect "products A's" PTF to have a HOLD indicating to apply
>:>"product B's" PTF or would you expect a COREQ ?
>
>A tough call as they might be in different GLOBAL zones.
>
>IFREQ is better as it is automatic, but if the products are in global zones
>there is no way that SMP can know from the A CSI that there is product B.
>
This depends on the sense of "requires".  If linker JCLIN in "product A"
INCLUDEs a MOD element from "product B", then:

o They should reside in common zones.

o (Co)REQ is the proper relationship.

If a load module in "product A" merely ATTACHes a load module
in "product B", they might reside in different CSIs, and IFREQ
with a HOLD to alert the systems programmer is the best you can do.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Java on z/OS JNI Sample Wanted - Preferably HLASM

2009-04-22 Thread Martin Packer
Could someone point me to a good simple sample of a HLASM JNI method being 
called from Java on z/OS? Failing a HLASM one I'd accept some other 
language.

Pointer to a basic doc also appreciated.

(Project involves also getting Jython to call a JNI method.)

Thanks, Martin

Martin Packer
Performance Consultant
IBM United Kingdom Ltd
+44-20-8832-5167
+44-7802-245-584

email: martin_pac...@uk.ibm.com

Twitter ID: MartinPacker

"They're figuring out that collaboration isn't a productivity hit, it 
makes them smarter." Sam Palmisano on BlogCentral, 26 November 2008





Unless stated otherwise above:
IBM United Kingdom Limited - Registered in England and Wales with number 
741598. 
Registered office: PO Box 41, North Harbour, Portsmouth, Hampshire PO6 3AU






--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hypersockets between LPARs of different sysplexes

2009-04-22 Thread Mark Yuhas
Thanks for the information.  I have passed your comments and suggestions
to my communications colleague.



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SMPE dependency question

2009-04-22 Thread Binyamin Dissen
On Wed, 22 Apr 2009 11:58:42 -0400 "Sumi, Joseph J. (CMS/CTR) (CTR)"
 wrote:

:>If "product A" has a PTF that requires a PTF from "product B"...
:>would you expect "products A's" PTF to have a HOLD indicating to apply
:>"product B's" PTF or would you expect a COREQ ?

A tough call as they might be in different GLOBAL zones.

IFREQ is better as it is automatic, but if the products are in global zones
there is no way that SMP can know from the A CSI that there is product B.

--
Binyamin Dissen 
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


SMPE dependency question

2009-04-22 Thread Sumi, Joseph J. (CMS/CTR) (CTR)
If "product A" has a PTF that requires a PTF from "product B"...
would you expect "products A's" PTF to have a HOLD indicating to apply
"product B's" PTF or would you expect a COREQ ?


Thanks, Joseph Sumi 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Data masking/data disguise Primer 1) WHY

2009-04-22 Thread Galambos, Robert
See below 


 
Robert Galambos CIPP/C CIPP/IT  

Compuware Senior Technical Specialist 
IBM Certified Database Associate 
IBM Certified DB2 9 for z/OS Database Administration
Certified Information Privacy Professional/Canada
Certified Information Privacy Professional/Information Technology
   
robert.galam...@compuware.com
 
Tel: +1 905 886 7000 
Toll Free: +1 800 263 7189
Fax: +1 905 886 7023
Quebec: +1 877-281-1888 
  


 
Le contenu de ce courriel s'adresse au destinataire seulement. Il contient de 
l'information pouvant être confidentielle. Vous ne devez ni le copier ni 
l'utiliser ni le divulguer à qui que ce soit à moins que vous soyez le 
destinataire ou une personne désignée autorisée. Si vous le receviez par 
erreur, veuillez nous aviser immédiatement et le détruire.
 

The contents of this e-mail are intended for the named addressee only. It 
contains information that may be confidential. Unless you are the named 
addressee or an authorized designee, you may not copy or use it, or disclose it 
to anyone else. If you received it in error please notify us immediately and 
then destroy it.

 



 "Service in every product...

 Les renseignements contenus dans le présent message électronique sont 
confidentiels et concernent exclusivement le(s) destinataire(s) désigné(s). Il 
est strictement interdit de distribuer ou de copier ce message. Si vous avez 
reçu ce message par erreur, veuillez répondre par courriel à l'expéditeur et 
effacer ou détruire toutes les copies du présent message.

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Farley, Peter x23353
Sent: April 22, 2009 10:39 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Data masking/data disguise Primer 1) WHY

> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On 
> Behalf Of Phil Smith
> Sent: Tuesday, April 21, 2009 7:51 PM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: Data masking/data disguise Primer 1) WHY
> 
> Why can't you debug a production issue, if you're using
Format-Preserving
> Encryption? Does the application need the "real" data? Most do not. Or
I'm
> not understanding your point.

>Many business processes *do* require the "real" data.  Format preservation 
>does not help when sort order is >affected. 

TRUE BUT THAT IS NOT THE MAJORITY OF ISSUES

> When a business needs to determine a 9-digit zip code from the customer 
> address, format preservation will
>not do -- the program needs the real street number and address and the real 
>city and state or it gets the
>wrong zip code.
>Neither the customer nor the USPS appreciate or long tolerate incorrect zip 
>codes.

TRUE. THEN YOU CAN SUE A TECHNIQUE OF SCRAMBLING THE DATA. IN OTHER WORDS 
TAKING THE ADDRESS FROM PERSON A AND MOVE IT TO PERSON B AND VIS A VERSA

>And once the zip code is determined it must be the "real" zip code that is 
>sorted, or the USPS gets very
>upset, which will cost the company more money.

>My point is that when debugging a production issue with such a process, real 
>customer data is going to be 
>exposed somewhere no matter how much money or CPU time is spent trying to hide 
>it.

>There are many, many such business processes.  They will not be debuggable 
>without real production data.
>Q.E.D.

>I am not saying don't mask at all, just that no one should expect data masking 
>to be a complete protection
>against fraud and theft.  It can and will happen anyway wherever there are 
>clever people with a need for
>money that they can't get legitimately.

TRUE. BUT DUE DILIGENCE IS REQUIRED. NOT DOING ANYTHING IS NOT A SOLUTION

>I do not mean that CICS transactions and batch reports should not mask private 
>data sent to 3270 screens or
>their HTML/SOAP equivalents.
>Indeed, I do not want my private data being shown to anyone unless they have a 
>real need to see it and I have
>authorized them to do so.

>I am saying that prohibitions against programmers using real production data 
>will prevent production problems
>from being resolved, and that no one should be surprised at this.

NO ARUGMENT. ALL I AM SAYING IS THAT SCRUBBING PII SO THAT YOUR NEIGHBOR ON 
YOUR CUBE WON'T ACCEDENTLY SEE YOU HEALTH RECOIRD WHEN TESTING USING REAL DATA. 
HE WILL ONLY SEE 'KERMIT THE FROG' DATA WITHOUT KNOWING WHO KERMIT IS IN REAL 
LIFE

 
> -- far more dangerous
> is the rogue DBA who decides that a private copy of the database would
be
> fun to put on a USB drive.

>Indeed, that one is the far more dangerous threat.  No argument.

> To be blunt, whether you agree with masking or not, the regulations in 
> place and coming WILL NOT allow you to use copies of production data
for
> test. Sure, having honest folks is the norm and A Good Thing, but the 
> regulations don't assume that you've reached that Nirvana. Nor should 
> they.

>I have yet to see a *practical* plan or software architecture that would 
>satisfy the application programmer's
>needs for both realistic data and la

Re: DFDSS QUESTION - PHYSICAL BACKUP OF A VSAM DSN WITH ALTERNATE INDEX

2009-04-22 Thread Matthew Stitt
I would not point directly to the device the file is on.  I don't do that
unless I want to place files on a particular device.

In this case a logical dump will work best.  This way all the parts can be
found even if they are on different devices.


On Wed, 22 Apr 2009 09:50:44 -0400, O'Brien, David W. (NIH/CIT) [C]
 wrote:

>PHYSINDYNAM specifies the input volume that is to be dynamically allocated
>  to a physical copy or dump operation. A nonspecific volume
>  serial number cannot be specified by using an asterisk (*). Only
>  one volume may be specified for a FULL, TRACKS, or DATASET COPY.
>  The device described by the volser must be the same type as the
>  output device specified on the OUTDD or OUTDYNAM keyword.
>
>Suggest you look at the example in the manual.
>
>Dave O'Brien
>NIH Contractor
>
>From: IBM Mainframe Discussion List [ibm-m...@bama.ua.edu] On Behalf Of
esmie moo [esmie_...@yahoo.ca]
>Sent: Wednesday, April 22, 2009 9:44 AM
>To: IBM-MAIN@bama.ua.edu
>Subject: DFDSS QUESTION - PHYSICAL BACKUP OF A VSAM DSN WITH ALTERNATE INDEX
>
>Good Morning Gentle Readers,
>
>I am having a problem trying to backup a VSAM dsn with ALTERNATE index. 
For some reason when I use the SPHERE parm it does not work.  Can the SPHERE
parm be used for a physical dataset backup?  Below are my control cards and
error messages:
>
>- DUMP PHYSINDDNAME(DASD1) OUTDDNAME(TAPE1)-
>   DATASET(INCLUDE(DEOP64.AM2.PAYROLL)) -
>OPT(4) ALLX ALLD(*) SPHERE
> ADR101I (R/I)-RI01 (01), TASKID 001 HAS BEEN ASSIGNED TO COMMAND 'DUMP '
> ADR109I (R/I)-RI01 (01), 2009.112 09:12:25 INITIAL SCAN OF USER CONTROL
STATEME
> ADR139E (001)-RI01 (01), INCONSISTENT PARAMETERS INVOLVING 'PHYSINDDNAME '
> ADR131E (001)-RI03 (01), ABOVE TEXT BYPASSED UNTIL NEXT COMMAND
> ADR017E (001)-CLTSK(01), 2009.112 09:12:25 TASK NOT SCHEDULED DUE TO
ERROR. TASK
>
>Thanks to all
>
>
>
>  __
>Make your browsing faster, safer, and easier with the new Internet
Explorer® 8. Optimized for Yahoo! Get it Now for Free! at
http://downloads.yahoo.com/ca/internetexplorer/
>
>--
>For IBM-MAIN subscribe / signoff / archive access instructions,
>send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
>Search the archives at http://bama.ua.edu/archives/ibm-main.html
>
>--
>For IBM-MAIN subscribe / signoff / archive access instructions,
>send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
>Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Data masking/data disguise Primer 2) HOW

2009-04-22 Thread Galambos, Robert
In the spirit of the first thread, I am introducing the second. that is, HOW do 
we go about protecting/auditing PII (personal identifiable information)
 
The first thing I have to say, don't expect for an average size company 
to be able within a short period of time to completely tackle the issue. Not 
going to happen.
 
In the previous thread we had mention as a short note about the 
differences of encryption/masking techniques. Let me expand on this  in random 
order of importance
 
a) IT industry is notorious on different people using different terms 
for the same thing. the following are some sample techniques for scrubbing of 
data
 
1) Encryption both record and field. reversible
 
2) Data Aging. reversible
 
3) Generating Data. non reversible
 
4) Look-up/translation. depending can be reversible or not
 
each technique (among others) do have their uses for different type of 
data. the type and need depends on analysis and best practices.
 
b) You want to make sure that anything you do on the Dist. environment 
that the same results need to be had on the Mainframe (applicable). (enterprise 
wide) Most application span many environments (windows/red 
hat/UNIX/MVS/Oracle/Excel/DB2/VSAM/MS Access/XML/ etc. (to name but a few) and 
you want to make sure that client 1 in application a is scrubbed the same way 
in application b, c etc. Otherwise items like system/user acceptance/volume 
testing will probably fail
 
c) The process needs to be repeatable. so the same record going in will 
produce the same record going out. The reasoning behind that is not every 
file/db can be always scrubbed at the same time, and for the same frequency.
 
d) The most important. and the most time consuming. The analysis of the 
environment. Where is all the PII info. How are they all related. Which files 
need to be looked at,  what are the business rules for those files/fields. The 
success of the entire project rely on the time spent here. 
 
e) After you initially set up the process, make sure that it is 
implemented as an ongoing bases as this is not a static but a dynamic 
requirement as your business moves forward. How are changes going to be 
applied/monitored. What will the EDP/Internal/external auditors requirements 
(audit trails? logging etc?)
 
f) if you choice a vendor to help you, have they been doing this for 
awhile? what expertise do they bring to the table. Do they have supporting 
tools (HINT The company I work for does not only sell software but provide 
tools to help as well) (sorry for the commercial but they do pay the bills 
). Do they have implementation teams in place with previous expertise 
(ditto). Are their people certified by a publicly recognized association
 
g) Do you have upper management 'buy in'. without this projects like 
this have limited chance for success.
 
I) is there a way to 'monitor' the exact data that the CSR (customer 
service rep) accessed so if there are any questions arising it can be quickly 
discovered/confirmed. The scenario of a banking rep access accounts that she/he 
are not responsible for?
 
as before comments are encouraged. If you want further info fell free 
in contacting me. 
 
these posts are my personnel opinion alone
 
 
 
Robert Galambos CIPP/C CIPP/IT  

Compuware Senior Technical Specialist 
IBM Certified Database Associate 
IBM Certified DB2 9 for z/OS Database Administration
Certified Information Privacy Professional/Canada
Certified Information Privacy Professional/Information Technology
   
robert.galam...@compuware.com
 
Tel: +1 905 886 7000 
Toll Free: +1 800 263 7189
Fax: +1 905 886 7023
Quebec: +1 877-281-1888 
  


 
Le contenu de ce courriel s'adresse au destinataire seulement. Il contient de 
l'information pouvant être confidentielle. Vous ne devez ni le copier ni 
l'utiliser ni le divulguer à qui que ce soit à moins que vous soyez le 
destinataire ou une personne désignée autorisée. Si vous le receviez par 
erreur, veuillez nous aviser immédiatement et le détruire.
 

The contents of this e-mail are intended for the named addressee only. It 
contains information that may be confidential. Unless you are the named 
addressee or an authorized designee, you may not copy or use it, or disclose it 
to anyone else. If you received it in error please notify us immediately and 
then destroy it.

 



 "Service in every product...

 Les renseignements contenus dans le présent message électronique sont 
confidentiels et concernent exclusivement le(s) destinataire(s) désigné(s). Il 
est str

Re: Data masking/data disguise Primer 1) WHY

2009-04-22 Thread Farley, Peter x23353
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Phil Smith
> Sent: Tuesday, April 21, 2009 7:51 PM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: Data masking/data disguise Primer 1) WHY
> 
> Why can't you debug a production issue, if you're using
Format-Preserving
> Encryption? Does the application need the "real" data? Most do not. Or
I'm
> not understanding your point.

Many business processes *do* require the "real" data.  Format
preservation does not help when sort order is affected.  When a business
needs to determine a 9-digit zip code from the customer address, format
preservation will not do -- the program needs the real street number and
address and the real city and state or it gets the wrong zip code.
Neither the customer nor the USPS appreciate or long tolerate incorrect
zip codes.

And once the zip code is determined it must be the "real" zip code that
is sorted, or the USPS gets very upset, which will cost the company more
money.

My point is that when debugging a production issue with such a process,
real customer data is going to be exposed somewhere no matter how much
money or CPU time is spent trying to hide it.

There are many, many such business processes.  They will not be
debuggable without real production data.  Q.E.D.

I am not saying don't mask at all, just that no one should expect data
masking to be a complete protection against fraud and theft.  It can and
will happen anyway wherever there are clever people with a need for
money that they can't get legitimately.

I do not mean that CICS transactions and batch reports should not mask
private data sent to 3270 screens or their HTML/SOAP equivalents.
Indeed, I do not want my private data being shown to anyone unless they
have a real need to see it and I have authorized them to do so.

I am saying that prohibitions against programmers using real production
data will prevent production problems from being resolved, and that no
one should be surprised at this.

 
> -- far more dangerous
> is the rogue DBA who decides that a private copy of the database would
be
> fun to put on a USB drive.

Indeed, that one is the far more dangerous threat.  No argument.

> To be blunt, whether you agree with masking or not, the regulations in
> place and coming WILL NOT allow you to use copies of production data
for
> test. Sure, having honest folks is the norm and A Good Thing, but the
> regulations don't assume that you've reached that Nirvana. Nor should
> they.

I have yet to see a *practical* plan or software architecture that would
satisfy the application programmer's needs for both realistic data and
large volumes of it.  Particularly in larger organizations where the
sysprogs and storage admins and DBA's are all independent groups with
different managements and goals than the applications programmers, the
data that is needed will seldom be there when it is needed, for either
testing or problem resolution.  I see no other choice than to continue
permitting application programmers the use of production data, perhaps
with field-level encryption and decryption for privacy purposes.
Regardless, the dumps and debugging will reveal the data anyway, so
where is the protection then?

I'm willing to be shown that practical and timely solutions exist, but I
haven't seen any yet.

Peter


This message and any attachments are intended only for the use of the addressee 
and
may contain information that is privileged and confidential. If the reader of 
the 
message is not the intended recipient or an authorized representative of the
intended recipient, you are hereby notified that any dissemination of this
communication is strictly prohibited. If you have received this communication in
error, please notify us immediately by e-mail and delete the message and any
attachments from your system.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Propagate systems enq

2009-04-22 Thread Mark Zelden
On Wed, 22 Apr 2009 09:40:50 +0200, Vernooy, C.P. - SPLXM
 wrote:

>
>
>"Victor Zhang"  wrote in message
>news:...
>> Hi experts,
>> One of software will use a dataset to store locking information. The
>> software uses SYSTEMS enq to get exclusive use of the dataset.
>> The software is storagetek's library station, and the manual said:
>> To prevent the corruption of the PDF, LibraryStation issues a SYSTEMS
>ENQ. The
>> ENQ QNAME is the HSC ENQ QNAME specified by the MAJNAME parameter of
>> the HSC LIBGEN. The ENQ RNAME is LS:ACTIVE.
>> If you make LibraryStation software available to more than one host,
>you are
>> responsible for propagating the SYSTEMS ENQ to each host. This can be
>done via
>> Global Resource Serialization (GRS) or a functionally equivalent
>product.
>>
>> My question is:
>> If more than one software instance started up on other lpars which are
>not
>> in same sysplex,  how can systems enq be properly propagating?
>>
>> Regards
>> Victor
>>
>
>The product that can do that is CA-MIM. A MIM-plex can span sysplexes.
>Doesn't is also issue a Reserve? That's how you normally protect your
>datasets over systems.
>

And even if the sharing can be done with MIM, at least for the CDS it
is recommended to use RESERVE (unless you want your tape processing
to slow down and cause a problem).   IOW, don't convert the RESERVE
to an ENQ unless you are in a single sysplex and using GRS STAR or
MIM control file in a CF.  

Since the RNAME is different, you can just propagate that qname/rname,
but it still requires MIM (MII) to do it across sysplex boundaries.  Well,
that isn't really true...you actually can do it with GRS Ring also. How many
systems are involved here?  Do you run GRS already?

So I would check the doc again or ask Oracle/Sun/STK . :-)

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America / Farmers Insurance Group - ZFUS G-ITO
mailto:mark.zel...@zurichna.com
z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Propagate systems enq

2009-04-22 Thread Mark Zelden
On Wed, 22 Apr 2009 09:40:50 +0200, Vernooy, C.P. - SPLXM
 wrote:

>
>
>"Victor Zhang"  wrote in message
>news:...
>> Hi experts,
>> One of software will use a dataset to store locking information. The
>> software uses SYSTEMS enq to get exclusive use of the dataset.
>> The software is storagetek's library station, and the manual said:
>> To prevent the corruption of the PDF, LibraryStation issues a SYSTEMS
>ENQ. The
>> ENQ QNAME is the HSC ENQ QNAME specified by the MAJNAME parameter of
>> the HSC LIBGEN. The ENQ RNAME is LS:ACTIVE.
>> If you make LibraryStation software available to more than one host,
>you are
>> responsible for propagating the SYSTEMS ENQ to each host. This can be
>done via
>> Global Resource Serialization (GRS) or a functionally equivalent
>product.
>>
>> My question is:
>> If more than one software instance started up on other lpars which are
>not
>> in same sysplex,  how can systems enq be properly propagating?
>>
>> Regards
>> Victor
>>
>
>The product that can do that is CA-MIM. A MIM-plex can span sysplexes.
>Doesn't is also issue a Reserve? That's how you normally protect your
>datasets over systems.
>

And even if the sharing can be done with MIM, at least for the CDS it
is recommended to use RESERVE (unless you want your tape processing
to slow down and cause a problem).   IOW, don't convert the RESERVE
to an ENQ unless you are in a single sysplex and using GRS STAR or
MIM control file in a CF.

Since the RNAME is different, you can just propagate that qname/rname,
but it still requires MIM (MII) to do it across sysplex boundaries.

So I would check the doc again or ask Oracle/Sun/STK . :-)

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America / Farmers Insurance Group - ZFUS G-ITO
mailto:mark.zel...@zurichna.com
z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


METAL C: CodeGen defeciency?

2009-04-22 Thread Johnny Luo
Hi,

I was trying new METAL option of XL C and the following is the HLASM code
generated :

*  {
*char a[20]="12345";
 MVC   88(6,13),0(11)
 MVI   @74a+6,0
 MVC   @74a+7(13),@74a+6
 MVI   @74a+6,0
 MVC   @74a+7(13),@74a+6
*   return;
* }

It initialized the buffer twice! I cannot think of why. Is it normal?



-- 
Best Regards,
Johnny Luo

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Data masking/data disguise Primer 1) WHY

2009-04-22 Thread Galambos, Robert
First of I want to thank everyone who either has contributed, or at least read 
this thread. It makes for some eye opening, information gathering, networking 
opportunities for all.

Before I go on, as I stated my intension is a series of threads the first being 
this WHY. Watch for another either latter today or tomorrow (takes me some time 
to correct my own spelling etc ). So far I see this as a series of about 4 
or five different takes on the same subject.

Now for some additional 'notes'

1) For prod supp testing from peter. I don't believe anyone here is thinking 
that every field in every table/file needs to be masked. Only PII (personal 
identifiable information) and the vast majority of cases that type of info does 
NOT effect the business process (the only think I can think of that is not the 
case is if there is a sorting/reports/ on names/SIN/SCN/address etc. issue) 
most times debugging has to do with the business process (insurance rates, 
customer/client options etc) the data typically, when the personal information 
is 'scrubbed', can be used for debugging. Since the PII is no longer refers to 
a 'real person' that the offending record belongs to (and the main reason for 
data scrubbing) debugging can proceed.

2) Studies are about averages. While 20B for the heartland breach maybe a 
little much, I concede, it is more then 100m to client, 'for sure', of both 
hard and soft cost. If a list of publicly confirmed breaches please go to 
www.privacyrights.org/ar/ChronDataBreaches.htm 

3) Total number of known data breaches is 260,211,123. as of April 20 2009. 
(see explanation of the above mentioned web site)

4) Laws. There are a huge number of laws through out the world containing some 
aspects of data privacy. Some very strong, other less so. In some 
countries/communities the laws are very explicit, a good example is the EU 
privacy directive, Canada's PIPEDA, and some US states individual laws, while 
in other areas far less so. Basically the various laws state (a very simplified 
generalization) you can only use the info for what it was intended for/given 
permission for. And you must protect it for disclosure (I know someone here 
will argue about my interpretation but it will work for this general 
discussion). A small partial list follows;

 United States Gramm-Leach-Bliley Act, Sarbanes-Oxley Act
Various US State regulations and laws requiring notification
European Union Personal Data Protection Directive, 1998 
US Health Insurance Portability and Accountability Act (HIPAA) 
Australia Privacy Amendment Act of  2000
Japanese Personal Information Protection Law
Canadian Personal Information Protection and Electronic Documents Act 

5) PCI (Payment card industry). Not a law but a regulation from private 
industry consortium. Basically a global standard that effect any business, 
gov't that accepts credit card payments. Its regulation is to provide safeguard 
protection of PII. An example is 3rd section 6.3.4 that requires that real CC 
number NOT to be used for testing or development


Feel free in contacting me for additional info.




 
Robert Galambos CIPP/C CIPP/IT  

Compuware Senior Technical Specialist 
IBM Certified Database Associate 
IBM Certified DB2 9 for z/OS Database Administration
Certified Information Privacy Professional/Canada
Certified Information Privacy Professional/Information Technology
   
robert.galam...@compuware.com
 
Tel: +1 905 886 7000 
Toll Free: +1 800 263 7189
Fax: +1 905 886 7023
Quebec: +1 877-281-1888 
  


 
Le contenu de ce courriel s'adresse au destinataire seulement. Il contient de 
l'information pouvant être confidentielle. Vous ne devez ni le copier ni 
l'utiliser ni le divulguer à qui que ce soit à moins que vous soyez le 
destinataire ou une personne désignée autorisée. Si vous le receviez par 
erreur, veuillez nous aviser immédiatement et le détruire.
 

The contents of this e-mail are intended for the named addressee only. It 
contains information that may be confidential. Unless you are the named 
addressee or an authorized designee, you may not copy or use it, or disclose it 
to anyone else. If you received it in error please notify us immediately and 
then destroy it.

 



 "Service in every product...

 Les renseignements contenus dans le présent message électronique sont 
confidentiels et concernent exclusivement le(s) destinataire(s) désigné(s). Il 
est strictement interdit de distribuer ou de copier ce message. Si vous avez 
reçu ce message par erreur, veuillez répondre par courriel à l'expéditeur et 
effacer ou détruire toutes les copies du présent message.

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Gerhard Postpischil
Sent: April 21, 2009 10:03 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Data masking/data disguise Primer 1) WHY

Farley, Peter x23353 wrote:
> Data masking may very well be needed to prevent the internal/employee 
> type of data breach (accidental or malic

Re: Lisp (was: insane thought - SMF reformatter?)

2009-04-22 Thread Arthur Gutowski
On Tue, 21 Apr 2009 09:44:36 -0500, Chase, John  
wrote:

>> Yes, I know CoBOL, JCL, & Java, and No, I don't lisp.
>
>"Yeth, I know CoBOL, J-Thee-L & Java, and No, I don't Lithp."  :-)

Whose cruel joke was it to spell "lisp" with an "s", anyway?

Art

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DFDSS QUESTION - PHYSICAL BACKUP OF A VSAM DSN WITH ALTERNATE INDEX

2009-04-22 Thread O'Brien, David W. (NIH/CIT) [C]
PHYSINDYNAM specifies the input volume that is to be dynamically allocated  
  to a physical copy or dump operation. A nonspecific volume
  serial number cannot be specified by using an asterisk (*). Only  
  one volume may be specified for a FULL, TRACKS, or DATASET COPY.  
  The device described by the volser must be the same type as the   
  output device specified on the OUTDD or OUTDYNAM keyword. 

Suggest you look at the example in the manual.

Dave O'Brien
NIH Contractor

From: IBM Mainframe Discussion List [ibm-m...@bama.ua.edu] On Behalf Of esmie 
moo [esmie_...@yahoo.ca]
Sent: Wednesday, April 22, 2009 9:44 AM
To: IBM-MAIN@bama.ua.edu
Subject: DFDSS QUESTION - PHYSICAL BACKUP OF A VSAM DSN WITH ALTERNATE INDEX

Good Morning Gentle Readers,

I am having a problem trying to backup a VSAM dsn with ALTERNATE index.  For 
some reason when I use the SPHERE parm it does not work.  Can the SPHERE parm 
be used for a physical dataset backup?  Below are my control cards and error 
messages:

- DUMP PHYSINDDNAME(DASD1) OUTDDNAME(TAPE1)-
   DATASET(INCLUDE(DEOP64.AM2.PAYROLL)) -
OPT(4) ALLX ALLD(*) SPHERE
 ADR101I (R/I)-RI01 (01), TASKID 001 HAS BEEN ASSIGNED TO COMMAND 'DUMP '
 ADR109I (R/I)-RI01 (01), 2009.112 09:12:25 INITIAL SCAN OF USER CONTROL STATEME
 ADR139E (001)-RI01 (01), INCONSISTENT PARAMETERS INVOLVING 'PHYSINDDNAME '
 ADR131E (001)-RI03 (01), ABOVE TEXT BYPASSED UNTIL NEXT COMMAND
 ADR017E (001)-CLTSK(01), 2009.112 09:12:25 TASK NOT SCHEDULED DUE TO ERROR. 
TASK

Thanks to all



  __
Make your browsing faster, safer, and easier with the new Internet Explorer® 8. 
Optimized for Yahoo! Get it Now for Free! at 
http://downloads.yahoo.com/ca/internetexplorer/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


DFDSS QUESTION - PHYSICAL BACKUP OF A VSAM DSN WITH ALTERNATE INDEX

2009-04-22 Thread esmie moo
Good Morning Gentle Readers,
 
I am having a problem trying to backup a VSAM dsn with ALTERNATE index.  For 
some reason when I use the SPHERE parm it does not work.  Can the SPHERE parm 
be used for a physical dataset backup?  Below are my control cards and error 
messages:
 
- DUMP PHYSINDDNAME(DASD1) OUTDDNAME(TAPE1)    -    
   DATASET(INCLUDE(DEOP64.AM2.PAYROLL)) -   
    OPT(4) ALLX ALLD(*) SPHERE  
 ADR101I (R/I)-RI01 (01), TASKID 001 HAS BEEN ASSIGNED TO COMMAND 'DUMP '   
 ADR109I (R/I)-RI01 (01), 2009.112 09:12:25 INITIAL SCAN OF USER CONTROL STATEME
 ADR139E (001)-RI01 (01), INCONSISTENT PARAMETERS INVOLVING 'PHYSINDDNAME ' 
 ADR131E (001)-RI03 (01), ABOVE TEXT BYPASSED UNTIL NEXT COMMAND    
 ADR017E (001)-CLTSK(01), 2009.112 09:12:25 TASK NOT SCHEDULED DUE TO ERROR. 
TASK
 
Thanks to all 



  __
Make your browsing faster, safer, and easier with the new Internet Explorer® 8. 
Optimized for Yahoo! Get it Now for Free! at 
http://downloads.yahoo.com/ca/internetexplorer/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What (More) Open Source Software for z/OS?

2009-04-22 Thread Mohammad Khan
Yes, but the crucial piece in that bundle came from IBM theoritically at no 
charge. Hardware emulator is not that crucial, I hear IBM has its own and then 
there is Hercules.


On Wed, 22 Apr 2009 07:02:20 -0400, P S  wrote:

>
>You do realize FLEX-ES wasn't an IBM offering, right?
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: System REXX usage

2009-04-22 Thread John McKown
On Wed, 22 Apr 2009 07:48:11 -0500, Bob   wrote:

>Just wondering if we could get a list going of some interesting SYSTEM REXX
>uses and tools... to get the creative ideas flowing or does this
already exist
>somewhere (haven't found it yet).
>
>Peace,
>
>bob h

I agree. I'm not really "getting" when and how I would use System REXX. Yes,
I've read the chapter in the book.

--
John

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


System REXX usage

2009-04-22 Thread Bob
Just wondering if we could get a list going of some interesting SYSTEM REXX 
uses and tools... to get the creative ideas flowing or does this already 
exist 
somewhere (haven't found it yet). 

Peace, 

bob h

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CBR1110I OAM wrong SCRATCH COUNT

2009-04-22 Thread Mike Wood
Rez,  In this book (http://publib.boulder.ibm.com/infocenter/zos/v1r9/index.jsp?
topic=/com.ibm.zos.r9.idao300/stadis.htm) it states 'In an MTL, the scratch 
counts that are displayed reflect the current counts that are maintained in 
the TCDB library record. This is meant to be an approximation. Without having 
an external source to derive the count, the scratch count from that point 
forward may be inaccurate if an update of this count in the catalog fails. 
Periodically check the scratch counts against your tape management system 
or the TCDB volume records.'

OAM does attempt to maintain the scratch counts as tapes are added and the 
status changes. However, if the counts are incorrect you can use IDCAMS 
ALTER LIBRARYENTRY with NUMBERSCRATCHVOLUMES.

When you use CREATE VOLUMEENTRY or IDCAMS ALTER VOLUMEENTRY to add 
or change volumes in the MTL, the counts are not maintained. Only the OAM 
interfaces (CBRXLCS) maintain the counts; for example for manual cartridge 
entry (MCE) and Change Use Attribute (CUA).  Using DFSMSrmm to add and 
manage the volumes you should see correct counts maintained. If you do not 
have rmm the tool SAMPLIB(CBRSPLCS) provides an easy to use and simple 
way to use the CBRXLCS OAM interface, such as for MCE.

Mike Wood RMM Development

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: insane thought - SMF reformatter?

2009-04-22 Thread R.S.

Walt Farrell pisze:

On Tue, 21 Apr 2009 08:55:18 -0500, Walt Farrell  wrote:


Hi, Radoslaw -- I just thought I'd point out that due to a complexity of the
English language you probably meant "not very valuable" rather than
"invaluable".



My sincere apologies to Radoslaw for letting this private note escape to
IBM-MAIN.  Apparently the web interface sends to the list even if you say
not to.  (Or, somehow, I managed to only *think* I had unchecked the box
saying to send to the list.)


Walt,
You don't need to apoligize, there is no offence here. I'd like to thank 
you and thank all who corrected me using offline communication. That's 
very kind of you.


As I already wrote I should use "worthless" instead of "invaluable"


BTW: Word "valuable" can be translated to "wartościowy" or "cenny".
And here is similar gotcha: bezwartościowy = invaluable, and bezcenny = 
worthless.


--
Radoslaw Skorupka
Lodz, Poland


--
BRE Bank SA
ul. Senatorska 18
00-950 Warszawa
www.brebank.pl

Sąd Rejonowy dla m. st. Warszawy 
XII Wydział Gospodarczy Krajowego Rejestru Sądowego, 
nr rejestru przedsiębiorców KRS 025237

NIP: 526-021-50-88
Według stanu na dzień 01.01.2009 r. kapitał zakładowy BRE Banku SA (w całości 
wpłacony) wynosi 118.763.528 złotych. W związku z realizacją warunkowego 
podwyższenia kapitału zakładowego, na podstawie uchwały XXI WZ z dnia 16 marca 
2008r., oraz uchwały XVI NWZ z dnia 27 października 2008r., może ulec 
podwyższeniu do kwoty 123.763.528 zł. Akcje w podwyższonym kapitale zakładowym 
BRE Banku SA będą w całości opłacone.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What (More) Open Source Software for z/OS?

2009-04-22 Thread P S
On Wed, Apr 22, 2009 at 5:26 AM, Jim McAlpine  wrote:
> Couldn't agree more.  Forget about open source and give us back the FLEX-ES
> offering.

You do realize FLEX-ES wasn't an IBM offering, right?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Propagate systems enq

2009-04-22 Thread Ted MacNEIL
>My question is:
>If more than one software instance started up on other lpars which are not
in same sysplex,  how can systems enq be properly propagating?

CA-MIM and GRS-Ring both can do this.
-
Too busy driving to stop for gas!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: FICON Cascade and Brocade 5000

2009-04-22 Thread R.S.

Michael Pratt pisze:

Thanks to everyone who has replied to this point.

We seem to be making very slow progress forward.  

What we have done is isolated the connection to the remote site so that 
every port on the switch is disabled except those associated with a single 
channel connection/single isl to the remote site.  Following this, we were able 
to vary a single device online and could successfully:

 - Display the volume in 3.4
 - Copy a dataset to the volume (plus successfully edit it) 
 - Copy a dataset from this volume to another


There are still some things that are clearly 'not right' - as soon as any other 
ports are enabled the symptoms return...so I suspect that this is a zoning 
issue of sorts.  Further though, we are still having FICON errors reported by 
our DWDM provider - hope to determine the nature of these today.


IMHO it clearly proves the problem is in switch configuration.

--
Radoslaw Skorupka
Lodz, Poland


--
BRE Bank SA
ul. Senatorska 18
00-950 Warszawa
www.brebank.pl

Sd Rejonowy dla m. st. Warszawy 
XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, 
nr rejestru przedsibiorców KRS 025237

NIP: 526-021-50-88
Wedug stanu na dzie 01.01.2009 r. kapita zakadowy BRE Banku SA (w caoci 
wpacony) wynosi 118.763.528 zotych. W zwizku z realizacj warunkowego 
podwyszenia kapitau zakadowego, na podstawie uchway XXI WZ z dnia 16 marca 
2008r., oraz uchway XVI NWZ z dnia 27 padziernika 2008r., moe ulec 
podwyszeniu do kwoty 123.763.528 z. Akcje w podwyszonym kapitale zakadowym 
BRE Banku SA bd w caoci opacone.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: FICON Cascade and Brocade 5000

2009-04-22 Thread Michael Pratt
A bit more progress has been made.

Made the following changes on the Brocade Switches:

1/.Set the APTPOLICY to 'Port Based Routing Policy'.

Mainly did this as it is a requirement for step two (2) which was:

2/.Turn Dynamic Load Sharing OFF.

(The chosen path remains the same if Dynamic Load Sharing (DLS) is not
enabled. If DLS is enabled, then a different path might be chosen on a fabric
event.)

3/.Set the PortcfgISLMode to 'R-RDY'.

(In ISL R_RDY mode, the port sends a primitive signal that the port is ready to 
receive frames. The port sends an exchange link parameter (ELP) with flow 
control mode 02. If a port is ISL R_RDY enabled, it can only receive an ELP 
with flow control mode 02. A received ELP with flow control mode 01 will 
segment the fabric.  This mode cannot detect any inconsistencies in fabric 
operating mode parameters, such as the PID format of connected ports. 
Before enabling ISL R_RDY mode, ensure that all fabric-wide parameters are 
consistent for every switch in the fabric.)

Consistent IO is now occurring over a single path...will expand to (try) and 
use a secondary path when this is validated over a longer period of time.

Cheers all.

Mike.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hypersockets between LPARs of different sysplexes

2009-04-22 Thread Chris Mason
Mark

> XCF is oriented to sysplexes and, as you say, your two LPARs do not belong 
to a sysplex.

This is not quite as clear as it should be. I should have said "do not belong 
to 
the *same* sysplex". You did say that the LPARs belonged to sysplexes, just 
different sysplexes.

While I'm here again, I may as well add that you might be able to survive with 
the default values for the related VTAM definitions but you should be *aware* 
that you are relying on those related VTAM definitions even if the default 
values work with your configuration.

Chris Mason

On Tue, 21 Apr 2009 15:59:47 -0500, Chris Mason 
 wrote:

>Mark
>
>As Lionel Dyck pointed out, the key characteristic of an HiperSockets
>connection is that it is between two LPARs on the same Central Electronic
>Complex (CEC). Since you mentioned that the two LPARs you want to 
connect
>using an HiperSockets connection share an OSA feature, you imply thereby
>that the two LPARs belong to the same CEC. The fact that you share an OSA
>feature in itself is not significant for an HiperSockets connection.
>
>Here is a technical presentation designed to introduce you to HiperSockets
>with z/OS:
>
>http://www-03.ibm.com/support/techdocs/atsmastr.nsf/WebIndex/PRS3120
>
>If you need help with another operating system, z/VM or z/Linux, try the IBM
>pages search box - as I just did.
>
>I'm a little bit familiar with the z/OS use of HiperSockets and, if it's z/OS 
>that
>interests you, you should go to section "HiperSockets concepts and
>connectivity" under "Considerations for networking hardware attachment"
>under Chapter 2, "IP configuration overview" in the Communications Server IP
>Configuration Guide.
>
>You will quickly see that you are encouraged to establish your HiperSockets
>connections using the IPCONFIG statement DYNAMICXCF parameter. This is,
>of course, the second source of confusion with HiperSockets - assuming that
>some imagined association with OSA features was the first! XCF is oriented to
>sysplexes and, as you say, your two LPARs do not belong to a sysplex. This is
>a case of IBM trying to be helpful - and saving themselves the need to create
>new definition structures - but ending up causing quite understandable
>confusion.
>
>So just grit your teeth and use the DYNAMICXCF parameter anyhow!
>
>Be aware that there are two VTAM start options which relate directly to
>HiperSockets, IQDCHPID and IQDIOSTG. Also the use of HiperSockets can
>affect the VTAM buffer pools so the usual monitoring of VTAM buffer pool
>usage will be called into play.
>
>I see at least one responder has eschewed using the DYNAMICXCF parameter
>in favour of specifying all the bits and pieces individually. All the while
>continuing with the confusion caused by associating HiperSockets with
>sysplexes and XCF, you will find assurance in specifying the bits and pieces in
>the section "HiperSockets" under "Dynamic XCF" under "Connectivity in a
>sysplex" under Chapter 8, "TCP/IP in a sysplex" in the Communications Server
>IP Configuration Guide. You will need to read the earlier sections
>under "Dynamic XCF" to appreciate that suitable statements for DEVICE, LINK,
>ROUTE and START and suitable statement entries for HOME and
>BSDROUTINGPARMS are all created for you when you use the DYNAMICXCF
>parameter. This being so you may not need to bother with your own ROUTE
>statements or the OMPROUTE address space. However, you will, as always,
>need to consider the routing implications for the rest of your IP network as
>necessary.
>
>You didn't actually say you were interested in SNA traffic - but then you
>didn't specifically say you were interested in IP traffic either! Allan 
>Staller's
>point that HiperSockets connections cannot be defined for use directly with
>SNA  - as can be the similar but different XCF connections - may be 
important
>for you. If SNA does interest you, as Allan says, you will need to implement
>Enterprise Extender and you *will* be using APPN, and the HPR flavour of
>APPN, and not what Allan calls "xDomain" by which I assume he means 
subarea
>SNA.
>
>You are *not* using QDIO with HiperSockets but rather *i*QDIO,
>aka "internal" QDIO. QDIO involves OSA features whereas iQDIO comes "at no
>extra charge" with the CEC hardware.
>
>Finally John McKown's suggestion to search the manuals with "IQD" as a
>search word turns up another important reference and a poorly labeled
>appendix. In Appendix D, "Using HCD", of the Communications Server IP
>Configuration Guide you will see a discussion of how to define your
>HiperSockets to the "hardware" - and only that as far as I can see with a
>quick glance! I have never had actually to do this so I might have missed the
>reference without John's prompt. Otherwise the only hits for "IQD" are in the
>sections I mentioned already.
>
>Chris Mason
>
>On Tue, 21 Apr 2009 09:34:59 -0700, Mark Yuhas
> wrote:
>
>>We would like to configure the linkage between two LPARs and
>>Hipersockets.  The LPARs are members of two different s

Servicelink and ActiveX controls

2009-04-22 Thread Barbara Nitz
Apparently after the last change to Servicelink IBM decided to employ ActiveX 
controls when showing me my open ETRs. And these are ActiveX controls that are 
unsafe, according to the security options. I am NOT free in my choice of 
browser (IE6) nor am I free in the servicelevel of that browser, I have to use 
what the corporation gives me. And what I got with an IBM-enforced ActiveX 
control is a browser that always closes itself and asks me if I want to restart 
it or send a report of the error to whomever, effectively preventing me from 
seeing my ETRs.

Is anyone else who is security conscious and had set IE options accordingly 
experiencing the same problem? (Or even recognising that silently active 
content is executing on your computer?) The pages do NOT look changed.

Regards, Barbara Nitz
-- 
Pt! Schon vom neuen GMX MultiMessenger gehört? Der kann`s mit allen: 
http://www.gmx.net/de/go/multimessenger01

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What (More) Open Source Software for z/OS?

2009-04-22 Thread Jim McAlpine
On Wed, Apr 22, 2009 at 12:15 AM, Joe Reichman wrote:

> Speaking about open Source would you or any anyone at IBM know when and if
> the flex - es
> ADCD
>
> would start again that would really be helpfull
>
>
>

Couldn't agree more.  Forget about open source and give us back the FLEX-ES
offering.

Jim McAlpine

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Propagate systems enq

2009-04-22 Thread Vernooy, C.P. - SPLXM


"Victor Zhang"  wrote in message
news:...
> Hi experts,
> One of software will use a dataset to store locking information. The
> software uses SYSTEMS enq to get exclusive use of the dataset.
> The software is storagetek's library station, and the manual said:
> To prevent the corruption of the PDF, LibraryStation issues a SYSTEMS
ENQ. The
> ENQ QNAME is the HSC ENQ QNAME specified by the MAJNAME parameter of
> the HSC LIBGEN. The ENQ RNAME is LS:ACTIVE.
> If you make LibraryStation software available to more than one host,
you are
> responsible for propagating the SYSTEMS ENQ to each host. This can be
done via
> Global Resource Serialization (GRS) or a functionally equivalent
product.
> 
> My question is:
> If more than one software instance started up on other lpars which are
not
> in same sysplex,  how can systems enq be properly propagating?
> 
> Regards
> Victor
> 

The product that can do that is CA-MIM. A MIM-plex can span sysplexes.
Doesn't is also issue a Reserve? That's how you normally protect your
datasets over systems.

Kees.
**
For information, services and offers, please visit our web site:
http://www.klm.com. This e-mail and any attachment may contain
confidential and privileged material intended for the addressee
only. If you are not the addressee, you are notified that no part
of the e-mail or any attachment may be disclosed, copied or
distributed, and that any other action related to this e-mail or
attachment is strictly prohibited, and may be unlawful. If you have
received this e-mail by error, please notify the sender immediately
by return e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries
and/or its employees shall not be liable for the incorrect or
incomplete transmission of this e-mail or any attachments, nor
responsible for any delay in receipt.
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal
Dutch Airlines) is registered in Amstelveen, The Netherlands, with
registered number 33014286 
**

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html