Re: VTAM security issue

2009-08-11 Thread Maarten Slegtenhorst
Almost correct ;)

Systems Network Architecture

http://www-01.ibm.com/software/globalization/terminology/s.jsp#s18 
http://en.wikipedia.org/wiki/IBM_Systems_Network_Architecture

-- 
Maarten

-Oorspronkelijk bericht-
Van: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] Namens
Gibney, Dave
Verzonden: zondag 9 augustus 2009 23:46
Aan: IBM-MAIN@BAMA.UA.EDU
Onderwerp: Re: VTAM security issue


  Isn't the A Architecture? And the S Synchronous :) 

 
 Now I'm confused.  What does the initialism SNA stand for?
 
-
ATTENTION:
The information in this electronic mail message is private and
confidential, and only intended for the addressee. Should you
receive this message by mistake, you are hereby notified that
any disclosure, reproduction, distribution or use of this
message is strictly prohibited. Please inform the sender by
reply transmission and delete the message without copying or
opening it.

Messages and attachments are scanned for all viruses known.
If this message contains password-protected attachments, the
files have NOT been scanned for viruses by the ING mail domain.
Always scan attachments before opening them.
-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Concatenations and blocksizes

2009-08-11 Thread Ron Hawkins
Paul,

I believe your problem occurs because you now have SYS1.MACLIB concatenated
with SYS1.MACLIB, except the first one in the concatenation has DCB in the
JCL that does not match the actual dataset - hence your error.

The override X/ on statement 6 and before statement 7 is the clue.

Ron

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of
 Paul Gilmartin
 Sent: Monday, August 10, 2009 4:19 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: [IBM-MAIN] Concatenations and blocksizes
 
 On Mon, 10 Aug 2009 17:48:31 -0500, Richard Peurifoy wrote:
 
 Paul Gilmartin wrote:
  On Mon, 10 Aug 2009 16:52:59 -0500, Patrick O'Keefe wrote:
  I'm just puzzled that the enhancement limited itself to QSAM.
  No mention of BPAM.
 
  I had hoped this was an oversight in the doc, but apparently
  not.  An assembly with:
 
  //SYSLIBDD  UNIT=SYSALLDA,SPACE=(80,(1,1)),
  //  RECFM=FB,LRECL=80,BLKSIZE=80
  //  DD  DISP=SHR,DSN=SYS1.MACLIB
 
 Unless there is a typo, you concatenated a seq file (no directories)
 with the PDS.
 
 You mean I need _two_ commas, not just one?
 
 Why does OPEN let me do that, and not just ABEND?
 
 OK.  I changed to:
 
6 //SYSLIBDD  UNIT=SYSALLDA,SPACE=(80,(1,,1)),
  //  DISP=NEW,DSN=amp;MAC,
  //  RECFM=FB,LRECL=80,BLKSIZE=80
  X/SYSLIB   DD  DSN=SYS1.MACLIB,DISP=SHR
7 //  DD  DISP=SHR,DSN=SYS1.MACLIB
 
 I needed to specify DISP and DSN to override those in the
 library proc.
 
 And it fails the same with:
 
 * TOP OF DATA
 **
 ** ASMA999U Assembly terminated - SYNAD Exit taken - Permanent I/O error
on
 SYSL
  ,HELLO   ,C   ,4140,D,SYSLIB
 ,UNKOWN,WRNG.LEN.RECORD,1F7100030
  BOTTOM OF DATA
 
 
 Experimental control: if I change BLKSIZE from 80 to 32760,
 it assembles with no errors, and library macros are fetched
 from the second catenand.
 
 -- gil
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Concatenations and blocksizes

2009-08-11 Thread Paul Gilmartin
On Mon, 10 Aug 2009 23:35:47 -0700, Ron Hawkins wrote:

I believe your problem occurs because you now have SYS1.MACLIB concatenated
with SYS1.MACLIB, except the first one in the concatenation has DCB in the
JCL that does not match the actual dataset - hence your error.

The override X/ on statement 6 and before statement 7 is the clue.

It appears that line displays the content of the overridden statement,
not the overriding.  When I change only the BLKSIZE:

6 //SYSLIBDD  UNIT=SYSALLDA,SPACE=(80,(1,,1)),
  //  DISP=NEW,DSN=amp;MAC,
  //  RECFM=FB,LRECL=80,BLKSIZE=32760
  X/SYSLIB   DD  DSN=SYS1.MACLIB,DISP=SHR
7 //  DD  DISP=SHR,DSN=SYS1.MACLIB

the assembly succeeds with no messages.  The Assembler Summary in
SYSPRINT shows a temp DSN as the first catenand:

   Diagnostic Cross Reference and Assembler Summ

  No Statements Flagged in this Assembly
 HIGH LEVEL ASSEMBLER, 5696-234, RELEASE 5.0, PTF UK10754
 SYSTEM: z/OS 01.07.00  JOBNAME: HELLO   STEPNAME: DOIT   PR
 Data Sets Allocated for this Assembly
  Con DDname   Data Set NameVolume  Member
   P1 SYSINuser.HELLO.JOB05565.D101.?
   L1 SYSLIB   SYS09222.T170822.RA000.HELLO.MAC.H01 WORK02
   L2  SYS1.MACLIB  MVS3RS
  SYSLIN   SYS09222.T170822.RA000.HELLO.OBJ.H01
  SYSPRINT user.HELLO.JOB05565.D102.?
  SYSTERM  user.HELLO.JOB05565.D104.?

 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of
 Paul Gilmartin
 Sent: Monday, August 10, 2009 4:19 PM

 OK.  I changed to:

6 //SYSLIBDD  UNIT=SYSALLDA,SPACE=(80,(1,,1)),
  //  DISP=NEW,DSN=amp;amp;MAC,
  //  RECFM=FB,LRECL=80,BLKSIZE=80
  X/SYSLIB   DD  DSN=SYS1.MACLIB,DISP=SHR
7 //  DD  DISP=SHR,DSN=SYS1.MACLIB

 I needed to specify DISP and DSN to override those in the
 library proc.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Sending z/OS Messages to external syslog server

2009-08-11 Thread גדי בן אבי
Hi,

Does anyone know of a way to send messages from the  z/OS log to an external 
syslog server.

I have CA-OPS/MVS.

Gadi


לשימת לבך, בהתאם לנהלי החברה וזכויות החתימה בה, כל הצעה, התחייבות או מצג מטעם 
החברה, מחייבים מסמך נפרד וחתום על ידי מורשי החתימה של החברה, הנושא את לוגו 
החברה או שמה המודפס ובצירוף חותמת החברה. בהעדר מסמך כאמור (לרבות מסמך סרוק) 
המצורף להודעת דואר אלקטרוני זאת, אין לראות באמור בהודעה אלא משום טיוטה לדיון, 
ואין להסתמך עליה לביצוע פעולה עסקית או משפטית כלשהי.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Mainframe tape encryption

2009-08-11 Thread Robert Fake
Hi all,

 

Anyone using mainframe tape encryption to selectively encrypt DSN's on tape
volumes or entire volumes?  Successes?  Issues?

 

Bob

Robert B. Fake

InfoSec, Inc.   http://infosecinc.com/PSU%20Form.html (click here for info
on the InfoSec PSU program!)

703-825-1202 (o)

571-241-5492 (c)

949-203-0406 (efax)

 mailto:rf...@infosecinc.com rf...@infosecinc.com

Visit us at  http://www.infosecinc.com/ www.infosecinc.com

Click here for the
http://www.facebook.com/pages/Centreville-VA/InfoSec-Inc/43693760902?ref=s
InfoSec, Inc. Face book page

 

The information contained in this e-mail message may be proprietary and/or
confidential.  It is for intended addressee(s) only.  If you are not the
intended recipient, you are hereby notified that any disclosure,
reproduction, distribution or other use of this communication is strictly
prohibited and could, in certain circumstances, be a criminal offense.  If
you have received this e-mail in error, please notify the sender by reply
and delete this message without copying or disclosing it. 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hyper-PAVs

2009-08-11 Thread R.S.

gsg pisze:
Anyone using Hyper PAvs with EMC DMX or know where to find information on 
implementing Hyper PAVs?  We are currently using Dynamic PAVs on z/OS 1.9 
and EMC DMX-3.

AFAIK HyperPAV is available in DMX-4, but not DMX-3.

--
Radoslaw Skorupka
Lodz, Poland


--
BRE Bank SA
ul. Senatorska 18
00-950 Warszawa
www.brebank.pl

Sd Rejonowy dla m. st. Warszawy 
XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, 
nr rejestru przedsibiorców KRS 025237

NIP: 526-021-50-88
Wedug stanu na dzie 01.01.2009 r. kapita zakadowy BRE Banku SA (w caoci 
wpacony) wynosi 118.763.528 zotych. W zwizku z realizacj warunkowego 
podwyszenia kapitau zakadowego, na podstawie uchway XXI WZ z dnia 16 marca 
2008r., oraz uchway XVI NWZ z dnia 27 padziernika 2008r., moe ulec 
podwyszeniu do kwoty 123.763.528 z. Akcje w podwyszonym kapitale zakadowym 
BRE Banku SA bd w caoci opacone.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe tape encryption

2009-08-11 Thread Vernooij, CP - SPLXM


Robert Fake rf...@infosecinc.com wrote in message
news:01a601ca1a59$1fb6ddd0$5f2499...@com...
 Hi all,
 
  
 
 Anyone using mainframe tape encryption to selectively encrypt DSN's on
tape
 volumes or entire volumes?  Successes?  Issues?
 
  
 
 Bob
 

Before the issue could arise here, we went to a TS7700 VTS, so nothing
physical comes out of the box anymore and that also eliminated any
transportation security issues.

Kees.
**
For information, services and offers, please visit our web site:
http://www.klm.com. This e-mail and any attachment may contain
confidential and privileged material intended for the addressee
only. If you are not the addressee, you are notified that no part
of the e-mail or any attachment may be disclosed, copied or
distributed, and that any other action related to this e-mail or
attachment is strictly prohibited, and may be unlawful. If you have
received this e-mail by error, please notify the sender immediately
by return e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries
and/or its employees shall not be liable for the incorrect or
incomplete transmission of this e-mail or any attachments, nor
responsible for any delay in receipt.
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal
Dutch Airlines) is registered in Amstelveen, The Netherlands, with
registered number 33014286 
**

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe tape encryption

2009-08-11 Thread Lizette Koehler
Robert,

It is going to depend on what you are using or looking at doing.

If you are already down this road, provide some details and we can help
provide some guidance.

Is this hardware encryption?  (TS1120 E05 or E06 tape drives, using ICSF)
Is this software encryption?  (IBM TIVOLI, CA TAPE, FDR CRYPT) --  I am
sure if I indicated the wrong software, some kind soul will 
correct me :-D)

When you ask about tape datasets are they individual, one per tape, or are
you asking about multiple files on one tape?

Here is my config with tape encryption.

We are using a TS1120 E05 tape drives in a TS3500 ATL.  I use EKM from IBM
for the tape encryption software.  We have Top Secret managing the KEYS for
the encryption.

With this setup when on file on the tape is encrypted ALL files on the same
tape are encrypted.  If I add a new file to the end of an encrypted tape it
is automatically encrypted because it happens to be on the encrypted tape.

From what I understand I cannot encrypt one file on a tape - it is all or
nothing.  The encryption will apply to all files on the tape regardless.
Also, for my shop, our encryption is done at the hardware level.  So over
all easy to maintain and support.

Was it easy to implement - NO.  Did I get it done - Yes.  The main problem
is pieces that need to be put together to make it work.  
Our costs were the upgrade to E05 drives, we do not use ICSF nor did we get
any other software except EKM which is free.  Now that I have gone through
this process, I can see why there can be a struggle to implement it.

Lizette


 Hi all,
 
 
 
 Anyone using mainframe tape encryption to selectively encrypt DSN's on
tape
 volumes or entire volumes?  Successes?  Issues?
 
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Sending z/OS Messages to external syslog server

2009-08-11 Thread Lizette Koehler
Gadi 
What is an external syslog?  I have not heard that expression before.  Is
that just a flat file?  Or something else?

OPS/MVS can filter and action just about anything that goes to SYSLOG.

Lizette


 
 Does anyone know of a way to send messages from the  z/OS log to an
external syslog
 server.
 
 I have CA-OPS/MVS.
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


HSM duplexing for ML2 Tapes

2009-08-11 Thread Gilbert Cardenas
Hello all, we are on z/OS 1.9 using CA/TLMS and I want to turn on ML2 
duplexing to reduce the amount of time and effort needed to recover an 
ML2 volume (not really for offsite backups).

I have read most of the HSM duplex posts and the manuals to try to 
formulate how this function works and from what I've read, if I want to 
turn on HSM duplexing for existing ML2 tapes (not backups),
it's as easy as adding SETSYS DUPLEX(MIGRATION(Y)) to the 
ARCCMD00 parmlib member.

The part that I (and apparently others) were confused about is the 
partialtape setting.

Question 1 (Is this correct?)
If you specify MIGRATION(REUSE) an ML2 tape is not selected for 
duplexing.  If you want an ML2 to be duplexed, you need to either 
specify SETSYS PARTIALTAPE(MIGRATION(MARKFULL)) or generate a list 
of partialtapes
LIST TTOC SELECT(ML2 NOTFULL) ODS(OUTPUT.DATASET) and mark 
them full so that TAPECOPY will automatically duplex them.  

Question 2 (Is this also correct?)
If the above is correct, then by marking an ML2 volume full before it is 
actually full will probably triple the number of scratch tapes required.  
An extra tape for each duplex copy and since all of a tape will not be 
used, more tapes will be needed.

Can someone please help clarify this area for me.


Many thanks,
Gil.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: HSM duplexing for ML2 Tapes

2009-08-11 Thread O'Brien, David W. (NIH/CIT) [C]
Gilbert,

Your assumption in question 1 is incorrect. Use of Reuse does not preclude use 
of Duplexing.

Thank You,
Dave O'Brien
NIH Contractor

From: IBM Mainframe Discussion List [ibm-m...@bama.ua.edu] On Behalf Of Gilbert 
Cardenas [gilbertcarde...@grocerybiz.com]
Sent: Tuesday, August 11, 2009 8:29 AM
To: IBM-MAIN@bama.ua.edu
Subject: HSM duplexing for ML2 Tapes

Hello all, we are on z/OS 1.9 using CA/TLMS and I want to turn on ML2
duplexing to reduce the amount of time and effort needed to recover an
ML2 volume (not really for offsite backups).

I have read most of the HSM duplex posts and the manuals to try to
formulate how this function works and from what I've read, if I want to
turn on HSM duplexing for existing ML2 tapes (not backups),
it's as easy as adding SETSYS DUPLEX(MIGRATION(Y)) to the
ARCCMD00 parmlib member.

The part that I (and apparently others) were confused about is the
partialtape setting.

Question 1 (Is this correct?)
If you specify MIGRATION(REUSE) an ML2 tape is not selected for
duplexing.  If you want an ML2 to be duplexed, you need to either
specify SETSYS PARTIALTAPE(MIGRATION(MARKFULL)) or generate a list
of partialtapes
LIST TTOC SELECT(ML2 NOTFULL) ODS(OUTPUT.DATASET) and mark
them full so that TAPECOPY will automatically duplex them.

Question 2 (Is this also correct?)
If the above is correct, then by marking an ML2 volume full before it is
actually full will probably triple the number of scratch tapes required.
An extra tape for each duplex copy and since all of a tape will not be
used, more tapes will be needed.

Can someone please help clarify this area for me.


Many thanks,
Gil.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: HSM duplexing for ML2 Tapes

2009-08-11 Thread Gilbert Cardenas
That's great news.  That means that my scratch pool will only double 
for the extra duplex copy.

Thanks,
Gil.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Sending z/OS Messages to external syslog server

2009-08-11 Thread carlos roberto visconde
You can use JES2 OFFLOAD, create a file and then input to a syslog server
like NetIQ.



2009/8/11 גדי בן אבי gad...@malam.com

 Hi,

 Does anyone know of a way to send messages from the  z/OS log to an
 external syslog server.

 I have CA-OPS/MVS.

 Gadi

 
 לשימת לבך, בהתאם לנהלי החברה וזכויות החתימה בה, כל הצעה, התחייבות או מצג
 מטעם החברה, מחייבים מסמך נפרד וחתום על ידי מורשי החתימה של החברה, הנושא את
 לוגו החברה או שמה המודפס ובצירוף חותמת החברה. בהעדר מסמך כאמור (לרבות מסמך
 סרוק) המצורף להודעת דואר אלקטרוני זאת, אין לראות באמור בהודעה אלא משום טיוטה
 לדיון, ואין להסתמך עליה לביצוע פעולה עסקית או משפטית כלשהי.

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: DFHSM QUESTION - HIGHLEVEL QUALIFIERS

2009-08-11 Thread Gilbert Cardenas
Hi Willie, I believe I believe this is covered in Chapter 2 of the Admin 
guide.


The MIGRATEPREFIX parameter of the SETSYS command specifies the 
prefix (high-level qualifier) of the generated name. If you do not specify 
a migrate prefix, DFSMShsm uses the UID that you specified in the 
startup procedure.


SETSYS MIGRATEPREFIX(??)
SETSYS BACKUPPREFIX(??)
etc.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DFHSM QUESTION - HIGHLEVEL QUALIFIERS

2009-08-11 Thread Patrick Lyon
On Tue, 11 Aug 2009 05:32:25 -0700, willie bunter 
williebun...@yahoo.com wrote:

Besides issuing a MIGRATE or DUMP or BACKDS commands to find the HLQ is 
there something else?
 
Thanks

Willie - On the console try issuing the command F DFHSM,QUERY SETSYS and 
then on the log or in the HSM address space do a find on PREFIX.  

HTH,
Pat L.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hyper-PAVs

2009-08-11 Thread Mark Zelden
On Mon, 10 Aug 2009 16:46:14 -0500, gsg gsg_...@yahoo.com wrote:

Anyone using Hyper PAvs with EMC DMX or know where to find information on
implementing Hyper PAVs?  We are currently using Dynamic PAVs on z/OS 1.9
and EMC DMX-3.


What type of information?  For the hardware or z/OS?  For z/OS you gen
them just like dynamic but you should need less aliases and you enable it
with the HYPERPAV=YES option in IECIOSxx and/or a sSET / SETIOS
command.

I didn't think DMX-3 supported HyperPAV, or are you planning a DMX-4 
migration?

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America / Farmers Insurance Group - ZFUS G-ITO
mailto:mark.zel...@zurichna.com
z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Sending z/OS Messages to external syslog server

2009-08-11 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Lizette Koehler
 Sent: Tuesday, August 11, 2009 7:29 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Sending z/OS Messages to external syslog server
 
 Gadi 
 What is an external syslog?  I have not heard that expression 
 before.  Is
 that just a flat file?  Or something else?
 
 OPS/MVS can filter and action just about anything that goes to SYSLOG.
 
 Lizette

He likely means a UNIX system running the UNIX syslog daemon. That is the, 
vague, equivalent of the MVS SYSLOG.

I have some CA-OPS/MVS code which uses REXX sockets to create an SNMP trap 
message to CA-UniCenter to report problems. But the code was cribbed from some 
BMC code which I was given permission to use, so I don't know if I should make 
it generally available. But it could possibly be use as a model to send a 
message to a UNIX syslog daemon.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


DFHSM and Encrypting ML2 tape issue RESOLVED

2009-08-11 Thread Lizette Koehler
Okay,

After a few more days of playing and reading, we came upon the answer.

For DFHSM you need to do the same thing to ML2 tape as TAPECOPY tape.  Since
we had only be changing the output device on one - it was not working.

Once we changed the device definition on both ML2 and TAPECOPY to 3592-2 it
worked.  The 3592-1 

So, we are now having DFHSM ML2 and TAPECOPY tapes encrypted successfully by
using the correct device type and the coding in the ACS for this process to
use the appropriate dataclas for these dataset names.

Lizette

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: HSM duplexing for ML2 Tapes

2009-08-11 Thread Staller, Allan
Question 1 (Is this correct?)
If you specify MIGRATION(REUSE) an ML2 tape is not selected for 
duplexing.  If you want an ML2 to be duplexed, you need to either 
specify SETSYS PARTIALTAPE(MIGRATION(MARKFULL)) or generate a list 
of partialtapes
LIST TTOC SELECT(ML2 NOTFULL) ODS(OUTPUT.DATASET) and mark 
them full so that TAPECOPY will automatically duplex them.  

Answered in another post.

Question 2 (Is this also correct?)
If the above is correct, then by marking an ML2 volume full before it
is 
actually full will probably triple the number of scratch tapes
required.  
An extra tape for each duplex copy and since all of a tape will not be 
used, more tapes will be needed.

Recycle is your friend here!

This is the way it really works:
Data is written concurrently to both the primary and duplex copy of ML2.
When either the primary or duplex becomes full, (1st to EOV wins) both
are so marked and another duplex pair is created. The partialtape
parameter enables the recycle to be performed immediately. Of course you
may not want to do this since it will foul up Fast Subsequent Migration.

HTH,

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DFHSM QUESTION - HIGHLEVEL QUALIFIERS

2009-08-11 Thread willie bunter
Thanks Pat.  I tried the command and found what I was looking for.  
 
Thanks to all who responded.


--- On Tue, 8/11/09, Patrick Lyon ptl...@midamerican.com wrote:


From: Patrick Lyon ptl...@midamerican.com
Subject: Re: DFHSM QUESTION - HIGHLEVEL QUALIFIERS
To: IBM-MAIN@bama.ua.edu
Received: Tuesday, August 11, 2009, 5:57 AM


On Tue, 11 Aug 2009 05:32:25 -0700, willie bunter 
williebun...@yahoo.com wrote:

Besides issuing a MIGRATE or DUMP or BACKDS commands to find the HLQ is 
there something else?
 
Thanks

Willie - On the console try issuing the command F DFHSM,QUERY SETSYS and 
then on the log or in the HSM address space do a find on PREFIX.  

HTH,
Pat L.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



  __
Looking for the perfect gift? Give the gift of Flickr! 

http://www.flickr.com/gift/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DFHSM QUESTION - HIGHLEVEL QUALIFIERS

2009-08-11 Thread willie bunter
I checked for the SETSYS commands but they were no in the ARCCMD parmlib.  I 
don't know the reason why.  I checked other partitions and they have 
MIGRATEPREFIX  BACKUPPREFIX listed.  Mystery 
 
Thanks for your suggestion.


--- On Tue, 8/11/09, Gilbert Cardenas gilbertcarde...@grocerybiz.com wrote:


From: Gilbert Cardenas gilbertcarde...@grocerybiz.com
Subject: Re: DFHSM QUESTION - HIGHLEVEL QUALIFIERS
To: IBM-MAIN@bama.ua.edu
Received: Tuesday, August 11, 2009, 5:56 AM


Hi Willie, I believe I believe this is covered in Chapter 2 of the Admin 
guide.


The MIGRATEPREFIX parameter of the SETSYS command specifies the 
prefix (high-level qualifier) of the generated name. If you do not specify 
a migrate prefix, DFSMShsm uses the UID that you specified in the 
startup procedure.


SETSYS MIGRATEPREFIX(??)
SETSYS BACKUPPREFIX(??)
etc.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



  __
Looking for the perfect gift? Give the gift of Flickr! 

http://www.flickr.com/gift/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: HSM duplexing for ML2 Tapes

2009-08-11 Thread Gilbert Cardenas
On Tue, 11 Aug 2009 08:04:13 -0500, Staller, Allan 
allan.stal...@kbm1.com wrote:

Question 1 (Is this correct?)
If you specify MIGRATION(REUSE) an ML2 tape is not selected for
duplexing.  If you want an ML2 to be duplexed, you need to either
specify SETSYS PARTIALTAPE(MIGRATION(MARKFULL)) or generate a 
list
of partialtapes
LIST TTOC SELECT(ML2 NOTFULL) ODS(OUTPUT.DATASET) and mark
them full so that TAPECOPY will automatically duplex them.

Answered in another post.

Question 2 (Is this also correct?)
If the above is correct, then by marking an ML2 volume full before it
is
actually full will probably triple the number of scratch tapes
required.
An extra tape for each duplex copy and since all of a tape will not be
used, more tapes will be needed.

Recycle is your friend here!

This is the way it really works:
Data is written concurrently to both the primary and duplex copy of 
ML2.
When either the primary or duplex becomes full, (1st to EOV wins) 
both
are so marked and another duplex pair is created. The partialtape
parameter enables the recycle to be performed immediately. Of course 
you
may not want to do this since it will foul up Fast Subsequent 
Migration.

HTH,


Thanks for the info, every tidbit helps.
We currently defer the recyclying of tapes to the weekends when 
processing is slower.

Thanks again,
Gil.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Sending z/OS Messages to external syslog server

2009-08-11 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of ??? ?? ???
 Sent: Tuesday, August 11, 2009 2:51 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Sending z/OS Messages to external syslog server
 
 Hi,
 
 Does anyone know of a way to send messages from the  z/OS log 
 to an external syslog server.
 
 I have CA-OPS/MVS.
 
 Gadi

Perhaps. I use CA-OPS/MVS to send an SNMP trap to CA-Unicenter for some z/OS 
messages. It is basically a two step process. The first is to right a message 
rule to trap the z/OS message. This is the easy part grin. The second part is 
to write a REXX program which uses REXX sockets to send the syslog message to 
your syslog server. This REXX program is invoked from the message rule via the 
OX command, something like:

OX PROGRAM('rexx.program.library(logpgm)') ARG('MSG.TEXT')

The above invokes logpgm in 'rexx.program.library and passes it the message 
text. The logpgm uses REXX sockets to send the message to the appropriate 
UNIX syslog server. Doing this is the difficult part. Especially since I've 
never done it. Now, if you have the C compiler (we don't), you could write a C 
program which does this using the openlog(), syslog(), and closelog() 
functions. However, this sends the message to the local z/OS system's syslog 
daemon. So it needs to be running and configured to relay the message on to the 
desired syslog server.

Wish I had some code to share, but I don't.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: USSTAB

2009-08-11 Thread Martin Kline
You seem to have a sandbox available to you so I would like to suggest some
more tests.

Yes, but only as time permits - I am working on those tests, but felt you 
should know I haven't dropped the discussion.

Note that there's not too much point in checking the TN3270 implementation
with @-based variables since the only possibly difficult one is @HOSTNET,
having only one @ character.

It's highly unlikely someone would use an SBA ending with x'7C', the '@' 
character, and immediately follow that with the character string, '@PRT', 
resulting in the text '@@PRT' but, 'highly unlikely' is just the type of open 
pit 
someone eventually falls into. It's also 'highly unlikely' someone would turn 
off 
the main power to the data center, but I've seen it happen twice. 

Which reminds me I got something wrong regarding the MDT in a previous
post. Recall that the  character when used as an attribute byte implies
an unprotected, input, field. I suggested it was unlikely without the MDT
bit.

I'm not sure most people know the difference. I believe the ampersand (x'50') 
is representative of the unprotected numeric field without the MDT and with 
normal intensity, not light-pen detectable. It's 'highly unlikely' and even 
slightly absurd to follow this with a non-numeric string like 'SYSNAME'. 
(Defining a numeric input field and filling it with non-numerics).

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IBM-MAIN Digest - 8 Aug 2009 to 9 Aug 2009 (#2009-221)

2009-08-11 Thread Petretti, Martha
How do I post a question? 


Martha Petretti  15 MTC  rm 15-417  ph 718 510-8565 cell 347 587-9486
 

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of IBM-MAIN automatic digest system
Sent: Monday, August 10, 2009 12:00 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: IBM-MAIN Digest - 8 Aug 2009 to 9 Aug 2009 (#2009-221)

There are 23 messages totalling 1986 lines in this issue.

Topics of the day:

  1. DASD: to share or not to share (9)
  2. Problems occured when using DFSMSdss to dump and restore DB2 data
sets
  3. VTAM security issue (6)
  4. RMM Retention WHILECATLG
  5. SNA, the acronym (2)
  6. Was RE: SNA, the acronym. Is SNA really an acronym or an initialism
?
  7. CSC Comtec's HMO software (Pick) on z/OS SYSPLEX
  8. Infoprint set up in zos
  9. C.D. Keltie is away.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


EREP query

2009-08-11 Thread Beesley, Paul
We run a job every day at 06:30 to clear LOGREC and write to a history
file ( JCL below ).
Every day without fail the following message is issued while the job is
running.
*IFB081I LOGREC DATA SET IS FULL,06.30.58, 
 DSN=SYS1.FIF2.LOGREC  
When I check LOGREC, its full of MDR records for every DASD volume in
the known universe as at 06:30.
Why is this happening and how can I stop it ? There's not much point
clearing logrec only for it to fill up again with useless MDR records.
This caused us to have no valid logrec records for IBM the other day
after a system outage ...

//JS010  EXEC PGM=IFCEREP1,TIME=10,   
//PARM='LINECT=60,ACC=Y,HIST=N,ZERO=Y,SYSUM=Y'
//SERLOG   DD DSN=SYS1.FIF2.LOGREC,DISP=SHR   
//ACCDEV   DD DSN=SYS3.FIF2.EREPHIST, 
//DISP=(NEW,CATLG,DELETE),
//SPACE=(2000,(3000,3000),RLSE),  
//AVGREC=U,   
//LRECL=2000, 
//RECFM=VB
//DIRECTWK DD UNIT=SYSALLDA,SPACE=(CYL,(5,5)) 
//TOURIST  DD SYSOUT=*
//EREPPT   DD SYSOUT=*
//SYSINDD DUMMY,DCB=BLKSIZE=80



Paul Beesley


___

Atos Origin and Atos Consulting are trading names used by the Atos Origin 
group.  The following trading entities are registered in England and Wales:  
Atos Origin IT Services UK Limited (registered number 01245534) and Atos 
Consulting Limited (registered number 04312380).  The registered office for 
each is at 4 Triton Square, Regents Place, London, NW1 3HG.The VAT No. for each 
is: GB232327983

This e-mail and the documents attached are confidential and intended solely for 
the addressee, and may contain confidential or privileged information.  If you 
receive this e-mail in error, you are not authorised to copy, disclose, use or 
retain it.  Please notify the sender immediately and delete this email from 
your systems.   As emails may be intercepted, amended or lost, they are not 
secure.  Atos Origin therefore can accept no liability for any errors or their 
content.  Although Atos Origin endeavours to maintain a virus-free network, we 
do not warrant that this transmission is virus-free and can accept no liability 
for any damages resulting from any virus transmitted.   The risks are deemed to 
be accepted by everyone who communicates with Atos Origin by email. 
___


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IBM-MAIN Digest - 8 Aug 2009 to 9 Aug 2009 (#2009-221)

2009-08-11 Thread Barkow, Eileen
Hi Martha,

I think that you just have to state your question in the email to IBM-Main.

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Petretti, Martha
Sent: Tuesday, August 11, 2009 9:47 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: IBM-MAIN Digest - 8 Aug 2009 to 9 Aug 2009 (#2009-221)

How do I post a question? 


Martha Petretti  15 MTC  rm 15-417  ph 718 510-8565 cell 347 587-9486
 

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of IBM-MAIN automatic digest system
Sent: Monday, August 10, 2009 12:00 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: IBM-MAIN Digest - 8 Aug 2009 to 9 Aug 2009 (#2009-221)

There are 23 messages totalling 1986 lines in this issue.

Topics of the day:

  1. DASD: to share or not to share (9)
  2. Problems occured when using DFSMSdss to dump and restore DB2 data
sets
  3. VTAM security issue (6)
  4. RMM Retention WHILECATLG
  5. SNA, the acronym (2)
  6. Was RE: SNA, the acronym. Is SNA really an acronym or an initialism
?
  7. CSC Comtec's HMO software (Pick) on z/OS SYSPLEX
  8. Infoprint set up in zos
  9. C.D. Keltie is away.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Clist Quest

2009-08-11 Thread Baraniecki, Ray
I ran across the following IF statement in a Clist that I am working on. The 
statement itself is understandable, it's the period usage that I don't 
understand. Can anyone shed some light on this?

IF .ITEMS  .5 THEN DO


Thanks,


Ray Baraniecki
Morgan Stanley Smith Barney
18th Floor
1 New York Plaza
New York, NY 10004
Office - 212-276-5641
   Cell - 917-597-5692

ray.baranie...@morganstanley.commailto:ray.baranie...@morganstanley.com

BE CARBON CONSCIOUS. PLEASE CONSIDER OUR ENVIRONMENT BEFORE PRINTING THIS 
E-MAIL.


--
Important Notice to Recipients:
It is important that you do not use e-mail to request, authorize or effect the 
purchase or sale of any security or commodity, to send fund transfer 
instructions, or to effect any other transactions. Any such request, orders, or 
instructions that you send will not be accepted and will not be processed by 
Morgan Stanley Smith Barney.
The Global Wealth Management Group of Morgan Stanley  Co. Incorporated and the 
Smith Barney division of Citigroup Global Markets Inc. have combined into 
Morgan Stanley Smith Barney LLC, a new investment adviser and broker-dealer 
registered with the Securities and Exchange Commission. The sender of this 
email is an employee of Morgan Stanley Smith Barney. 
 
Important disclosures on Morgan Stanley and Citi Investment Research  Analysis 
research reports may relate in part to the separate businesses of Citigroup 
Global Markets Inc. and Morgan Stanley that now form Morgan Stanley Smith 
Barney LLC. To view these important research disclosures, go to 
http://www.morganstanley.com/researchdisclosures and 
https://www.citigroupgeo.com/geopublic/Disclosures/index_a.html.
 
If received in error, please destroy and notify sender. Sender does not intend 
to waive confidentiality or privilege. Use of this email is prohibited when 
received in error. We may monitor and store emails to the extent permitted by 
applicable law.
 
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Clist Quest

2009-08-11 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Baraniecki, Ray
 Sent: Tuesday, August 11, 2009 8:53 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Clist Quest
 
 I ran across the following IF statement in a Clist that I am 
 working on. The statement itself is understandable, it's the 
 period usage that I don't understand. Can anyone shed some 
 light on this?
 
 IF .ITEMS  .5 THEN DO
 
 
 Thanks,
 
 
 Ray Baraniecki

suppose the line were:

IF ITEMS  5 THEN DO

What if ITEMS is null ('')? Without the periods, the CLIST intepreter would 
see the line:

IF  5 THEN DO

which it could not handle (syntax error). So the periods are there just to make 
the line syntactically correct in the case where ITEMS is null.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Clist Quest

2009-08-11 Thread Barkow, Eileen
The . prevents null values from being compared, which sometimes causes errors 
in the clist.
Any character could be used so that valid, non-null values are generated.

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
McKown, John
Sent: Tuesday, August 11, 2009 10:02 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Clist Quest

 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Baraniecki, Ray
 Sent: Tuesday, August 11, 2009 8:53 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Clist Quest
 
 I ran across the following IF statement in a Clist that I am 
 working on. The statement itself is understandable, it's the 
 period usage that I don't understand. Can anyone shed some 
 light on this?
 
 IF .ITEMS  .5 THEN DO
 
 
 Thanks,
 
 
 Ray Baraniecki

suppose the line were:

IF ITEMS  5 THEN DO

What if ITEMS is null ('')? Without the periods, the CLIST intepreter would 
see the line:

IF  5 THEN DO

which it could not handle (syntax error). So the periods are there just to make 
the line syntactically correct in the case where ITEMS is null.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SNA: conflicting opinions

2009-08-11 Thread Anne Lynn Wheeler
re:
http://www.garlic.com/~lynn/2009l.html#3 VTAM security issue
http://www.garlic.com/~lynn/2009l.html#7 VTAM security issue
http://www.garlic.com/~lynn/2009l.html#11 VTAM security issue
http://www.garlic.com/~lynn/2009l.html#13 SNA: conflicting opinions

a network layer with feature like ARP ... also enables BOOTPDHCP
... with things like reverse ARP ... a machine dynamically loading
their network characteristic from service in local environment.
bootp/dhcp provides for dynamic network configuration for things like
roaming laptops in wireless environment.

from my IETF RFC index:
http://www.garlic.com/~lynn/rfcietff.htm

click on Term (term-RFC#) in the RFCs listed by section; then
in the Acronym fastpath section there is BOOTP:

bootstrap protocol  (BOOTP )
 see also configuration , reverse address resolution protocol
 2132 1542 1534 1533 1532 1497 1395 1084 1048 951 

DHCP:

dynamic host configuration protocol  (DHCP )
 see also configuration , host , reverse address resolution protocol
 5505 5460 5417 5223 5192 5139 5107 5071 5010 5007 4994 4941 4833 4776
 4704 4703 4702 4701 4676 4649 4580 4578 4477 4436 4390 4388 4361 4332
 4280 4243 4242 4174 4076 4039 4030 4014 3993 3942 3927 3925 3898 3825
 3736 3679 3646 3634 3633 3594 3527 3495 3456 3442 3397 3396 3361 3319
 3315 3256 3203 3118 3074 3046 3041 3011 3004 2939 2937 2855 2610 2563
 2489 2485 2322 2242 2241 2132 2131 1541 1534 1533 1531

and RARP

reverse address resolution protocol  (RARP )
 see also address resolution
 5505 5460 5417 5223 5192 5139 5107 5071 5010 5007 4994 4941 4833 4776
 4704 4703 4702 4701 4676 4649 4580 4578 4477 4436 4390 4388 4361 4332
 4280 4243 4242 4174 4076 4039 4030 4014 3993 3942 3927 3925 3898 3825
 3736 3679 3646 3634 3633 3594 3527 3495 3456 3442 3397 3396 3361 3319
 3315 3256 3203 3118 3074 3046 3041 3011 3004 2939 2937 2855 2610 2563
 2489 2485 2322 2242 2241 2132 2131 1931 1542 1541 1534 1533 1532 1531
 1497 1395 1084 1048 951 903

...

clicking on RFC number brings up the corresponding summary in the
lower frame, clicking on the .txt=nnn field (in the summary)
retrieves the actual RFC.

the attempts by the communication division to preserve the terminal
communication paradigm ... showed up in lots of ways. 

one of the ways was veto'ing numerous disk division's attempts to come
out with advanced access products for the distributed environment (as
part of stemming the flight of data out off the mainframe) communication
division could escalate to corporate with claim that they had
responsibility for all products that involved communication crossing the
datacenter boundary (at the peak, disk division was seeing double digit
per annum percentage flight of data out off the mainframe).

another trivial example were PC lan cards. high-powered workstations
represented the quickly evolving direction for PCs ... requiring
increasingly powerful networking.

the AWD division had done the PC/RT and had produced their own ISA 4mbit
T/R LAN card. When it came time for the rs/6000, they thought that they
would do their own microchannel 16mbit T/R LAN card ... but they were
wrong ... they were forced into using lots of the PS2 microchannel
adapter cards.  It turns out that the PS2 microchannel 16mbit T/R LAN
card had design point of terminal emulation with 300 (or more) stations
all sharing the same 16mbit T/R bandwidth. As a result, the PS2
microchannel 16mbit T/R LAN card had lower per card thruput than the
PC/RT ISA 4mbit T/R LAN card (significantly restricting its ability to
participate in high-powered networking environments ... PC/RT ISA 4mbit
T/R card had higher thruput than the PS2 microchannel 16mbit T/R
card). references to old 3tier presentation from the late 80s
(attempting to give the terminal communication paradigm as much benefit
as possible in the comparison):
http://www.garlic.com/~lynn/96.html#17
http://www.garlic.com/~lynn/2002q.html#40

other posts mentioning 3-tier architecture
http://www.garlic.com/~lynn/subnetwork.html#3tier

misc. past posts discussing many of the issues and downside related
to the attempts to preserve the terminal communication paradigm.
http://www.garlic.com/~lynn/subnetwork.html#terminal

-- 
40+yrs virtualization experience (since Jan68), online at home since Mar1970

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: EREP query

2009-08-11 Thread Mark Zelden
On Tue, 11 Aug 2009 14:51:52 +0100, Beesley, Paul
paul.bees...@atosorigin.com wrote:

We run a job every day at 06:30 to clear LOGREC and write to a history
file ( JCL below ).
Every day without fail the following message is issued while the job is
running.
*IFB081I LOGREC DATA SET IS FULL,06.30.58, 
 DSN=SYS1.FIF2.LOGREC  
When I check LOGREC, its full of MDR records for every DASD volume in
the known universe as at 06:30.
Why is this happening and how can I stop it ? There's not much point
clearing logrec only for it to fill up again with useless MDR records.
This caused us to have no valid logrec records for IBM the other day
after a system outage ...


snip

1) Have you looked into what those MDR records are?

2) How big is your LOGREC data set and why not just make it large 
enough to handle whatever the normal activity would be PLUS 
a large fudge factor for abnormal activity?

3) Have you considered using the system logger for LOGREC since you 
wouldn't run into a full condition for some unexpected abnormal 
   activity (unless your DASD pool fills up)?

--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America / Farmers Insurance Group - ZFUS G-ITO
mailto:mark.zel...@zurichna.com
z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IBM-MAIN Digest - 8 Aug 2009 to 9 Aug 2009 (#2009-221)

2009-08-11 Thread Chase, John
 -Original Message-
 From: IBM Mainframe Discussion List On Behalf Of Petretti, Martha
 
 How do I post a question?

You just did.

-jc-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Clist Quest

2009-08-11 Thread Baraniecki, Ray
That makes so much sense. Who wooda thunk?

Thanks to all that responded.
 
Ray Baraniecki 
Morgan Stanley Smith Barney
18th Floor 
1 New York Plaza 
New York, NY 10004 
Office - 212-276-5641
   Cell - 917-597-5692 
ray.baranie...@morganstanley.com  
BE CARBON CONSCIOUS. PLEASE CONSIDER OUR ENVIRONMENT BEFORE PRINTING THIS 
E-MAIL.

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
McKown, John
Sent: Tuesday, August 11, 2009 10:02 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Clist Quest

 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Baraniecki, Ray
 Sent: Tuesday, August 11, 2009 8:53 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Clist Quest
 
 I ran across the following IF statement in a Clist that I am 
 working on. The statement itself is understandable, it's the 
 period usage that I don't understand. Can anyone shed some 
 light on this?
 
 IF .ITEMS  .5 THEN DO
 
 
 Thanks,
 
 
 Ray Baraniecki

suppose the line were:

IF ITEMS  5 THEN DO

What if ITEMS is null ('')? Without the periods, the CLIST intepreter would 
see the line:

IF  5 THEN DO

which it could not handle (syntax error). So the periods are there just to make 
the line syntactically correct in the case where ITEMS is null.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
Important Notice to Recipients:
It is important that you do not use e-mail to request, authorize or effect the 
purchase or sale of any security or commodity, to send fund transfer 
instructions, or to effect any other transactions. Any such request, orders, or 
instructions that you send will not be accepted and will not be processed by 
Morgan Stanley Smith Barney.
The Global Wealth Management Group of Morgan Stanley  Co. Incorporated and the 
Smith Barney division of Citigroup Global Markets Inc. have combined into 
Morgan Stanley Smith Barney LLC, a new investment adviser and broker-dealer 
registered with the Securities and Exchange Commission. The sender of this 
email is an employee of Morgan Stanley Smith Barney. 
 
Important disclosures on Morgan Stanley and Citi Investment Research  Analysis 
research reports may relate in part to the separate businesses of Citigroup 
Global Markets Inc. and Morgan Stanley that now form Morgan Stanley Smith 
Barney LLC. To view these important research disclosures, go to 
http://www.morganstanley.com/researchdisclosures and 
https://www.citigroupgeo.com/geopublic/Disclosures/index_a.html.
 
If received in error, please destroy and notify sender. Sender does not intend 
to waive confidentiality or privilege. Use of this email is prohibited when 
received in error. We may monitor and store emails to the extent permitted by 
applicable law.
 
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Clist Quest

2009-08-11 Thread Baraniecki, Ray
Does this technique work the same in Rexx?

Thanks, 
 
Ray Baraniecki 
Morgan Stanley Smith Barney
18th Floor 
1 New York Plaza 
New York, NY 10004 
Office - 212-276-5641
   Cell - 917-597-5692 
ray.baranie...@morganstanley.com  
BE CARBON CONSCIOUS. PLEASE CONSIDER OUR ENVIRONMENT BEFORE PRINTING THIS 
E-MAIL.

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
McKown, John
Sent: Tuesday, August 11, 2009 10:02 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Clist Quest

 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Baraniecki, Ray
 Sent: Tuesday, August 11, 2009 8:53 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Clist Quest
 
 I ran across the following IF statement in a Clist that I am 
 working on. The statement itself is understandable, it's the 
 period usage that I don't understand. Can anyone shed some 
 light on this?
 
 IF .ITEMS  .5 THEN DO
 
 
 Thanks,
 
 
 Ray Baraniecki

suppose the line were:

IF ITEMS  5 THEN DO

What if ITEMS is null ('')? Without the periods, the CLIST intepreter would 
see the line:

IF  5 THEN DO

which it could not handle (syntax error). So the periods are there just to make 
the line syntactically correct in the case where ITEMS is null.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
Important Notice to Recipients:
It is important that you do not use e-mail to request, authorize or effect the 
purchase or sale of any security or commodity, to send fund transfer 
instructions, or to effect any other transactions. Any such request, orders, or 
instructions that you send will not be accepted and will not be processed by 
Morgan Stanley Smith Barney.
The Global Wealth Management Group of Morgan Stanley  Co. Incorporated and the 
Smith Barney division of Citigroup Global Markets Inc. have combined into 
Morgan Stanley Smith Barney LLC, a new investment adviser and broker-dealer 
registered with the Securities and Exchange Commission. The sender of this 
email is an employee of Morgan Stanley Smith Barney. 
 
Important disclosures on Morgan Stanley and Citi Investment Research  Analysis 
research reports may relate in part to the separate businesses of Citigroup 
Global Markets Inc. and Morgan Stanley that now form Morgan Stanley Smith 
Barney LLC. To view these important research disclosures, go to 
http://www.morganstanley.com/researchdisclosures and 
https://www.citigroupgeo.com/geopublic/Disclosures/index_a.html.
 
If received in error, please destroy and notify sender. Sender does not intend 
to waive confidentiality or privilege. Use of this email is prohibited when 
received in error. We may monitor and store emails to the extent permitted by 
applicable law.
 
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


IRFXUSER

2009-08-11 Thread Hylton Tom P
I was recently tasked to install an external function package for MQ
which givies users REXX functionality.  Since this is a supportpac,
docs are a bit sparce on details. 

The functions came bundled in a module called IRFXUSER.   

My interpretation of the rexx manual has indicated that when you use
IRFXUSER, which is a default entry already defined in the function
table,  then you don't have to modify the function package table or link
or modify the default module.  That's cool, and exactly what I want,
but I can't seem to figure out how to get my copy recognized.  

There is an IRXFUSER is in sys1.linklib, just as expected.  

So far,  I've tried 
   adding my own lib to the linklist  
   dynamic steplib product
   LIBDEF to ISPLLIB

All result in function not found. 

It works in batch(IKJEFT01) with a steplib, so I know I don't have
something right, but I can't find instructions on how to get my IRFXUSER
module included in the rexx search scheme.   Is it possible to leave the
entry alone in sys1.linklib and have my functions found in a different
lib? 

Anyone familiar with doing this or can point me to a specific manual?
I can't seem to find much on the rexx reference, and irfxuser isn't
mentioned anywhere that I can find beyond the rexx bookshelf.

thanks,
tom

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Clist Quest

2009-08-11 Thread Lizette Koehler
Ray,

In REXX unless you set the var to a null value - the value will be the name of 
the var.

In your case

itemwould display as ITEM in rexx until it had a value assigned to it.  So 
not quite the same in REXX as CLIST.

To demonstrate

/*  Rexx -  
  Display contents of a var 
 */ 

trace ?i
item1 = ' ' 

Say Item contains  item   
Say Set Item: item1  value  

When it is executed it shows:
 6 *-* item1 = ' '   
   L 
+++ Interactive trace.  TRACE OFF to end debug, ENTER to continue. +++   
   
 8 *-* Say Item contains  item   
   L   Item contains   
   L   ITEM
   O   Item contains  ITEM 
Item contains  ITEM
   
 9 *-* Say Set Item: item1  value  
   L   Set Item:   
   V   
   O   Set Item:   
   Lvalue  
   O   Set Item:value  
Set Item:value 



Lizette




Does this technique work the same in Rexx?

Thanks, 
 
Ray Baraniecki 
Morgan Stanley Smith Barney
18th Floor 
1 New York Plaza 
New York, NY 10004 
Office - 212-276-5641
   Cell - 917-597-5692 
ray.baranie...@morganstanley.com  
BE CARBON CONSCIOUS. PLEASE CONSIDER OUR ENVIRONMENT BEFORE PRINTING THIS 
E-MAIL.

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
McKown, John
Sent: Tuesday, August 11, 2009 10:02 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Clist Quest

 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Baraniecki, Ray
 Sent: Tuesday, August 11, 2009 8:53 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Clist Quest
 
 I ran across the following IF statement in a Clist that I am 
 working on. The statement itself is understandable, it's the 
 period usage that I don't understand. Can anyone shed some 
 light on this?
 
 IF .ITEMS  .5 THEN DO
 
 
 Thanks,
 
 
 Ray Baraniecki

suppose the line were:

IF ITEMS  5 THEN DO

What if ITEMS is null ('')? Without the periods, the CLIST intepreter would 
see the line:

IF  5 THEN DO

which it could not handle (syntax error). So the periods are there just to 
make the line syntactically correct in the case where ITEMS is null.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Clist Quest

2009-08-11 Thread Paul Gilmartin
On Tue, 11 Aug 2009 10:52:24 -0400, Baraniecki, Ray wrote:

Does this technique work the same in Rexx?

It would, but it's unnecessary; pointless; undesirable.

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
McKown, John
Sent: Tuesday, August 11, 2009 10:02 AM

suppose the line were:

IF ITEMS  5 THEN DO

What if ITEMS is null ('')? Without the periods, the CLIST intepreter would 
see the line:

IF  5 THEN DO

which it could not handle (syntax error). So the periods are there just to 
make the line syntactically correct in the case where ITEMS is null.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Concatenations and blocksizes

2009-08-11 Thread Rick Fochtman

---snip---
You have always been able to write a block of only one byte, or even 
zero bytes, onto a DASD.

unsnip--
One byte, yes. But if the device reads a count field with a data length 
of zero, it signals a Unit Exception, meaning a EOF mark.


That's what you might call a special case. :-)

Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Concatenations and blocksizes

2009-08-11 Thread Richard Peurifoy

Paul Gilmartin wrote:

On Mon, 10 Aug 2009 17:48:31 -0500, Richard Peurifoy wrote:


Paul Gilmartin wrote:

On Mon, 10 Aug 2009 16:52:59 -0500, Patrick O'Keefe wrote:

I'm just puzzled that the enhancement limited itself to QSAM.
No mention of BPAM.


I had hoped this was an oversight in the doc, but apparently
not.  An assembly with:

//SYSLIBDD  UNIT=SYSALLDA,SPACE=(80,(1,1)),
//  RECFM=FB,LRECL=80,BLKSIZE=80
//  DD  DISP=SHR,DSN=SYS1.MACLIB


Unless there is a typo, you concatenated a seq file (no directories)
with the PDS.


You mean I need _two_ commas, not just one?

Why does OPEN let me do that, and not just ABEND?

OK.  I changed to:

   6 //SYSLIBDD  UNIT=SYSALLDA,SPACE=(80,(1,,1)),
 //  DISP=NEW,DSN=amp;MAC,
 //  RECFM=FB,LRECL=80,BLKSIZE=80
 X/SYSLIB   DD  DSN=SYS1.MACLIB,DISP=SHR
   7 //  DD  DISP=SHR,DSN=SYS1.MACLIB

I needed to specify DISP and DSN to override those in the
library proc.

And it fails the same with:

* TOP OF DATA **
** ASMA999U Assembly terminated - SYNAD Exit taken - Permanent I/O error on SYSL
 ,HELLO   ,C   ,4140,D,SYSLIB  ,UNKOWN,WRNG.LEN.RECORD,1F7100030
 BOTTOM OF DATA 

Experimental control: if I change BLKSIZE from 80 to 32760,
it assembles with no errors, and library macros are fetched
from the second catenand.


Interesting, I tried a temp PDS, and also failed, so I tried
a permanent PDS with a small blksize and it worked ok.

I then tried allocating a temp pds in a previous step and passed it.
This also worked ok. I don't know why it fails if allocated in
the same step.

--
Richard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Concatenations and blocksizes

2009-08-11 Thread Rick Fochtman

snip-
I thought a count of zero was prohibited in a CCW. (But there may be 
other ways.)

unsnip-
You are correct. But a DASD Format Write requires a COUNT field of 8 
bytes. The count field may, in turn, have a value of zero for the data 
length, thus writing a EOF mark.


If a Update Write doesn't have the correct size, you'll get a Unit Check 
or Unit Exception (I forget which) with Incorrect Length set..


Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IRFXUSER

2009-08-11 Thread Walt Farrell
On Tue, 11 Aug 2009 11:08:55 -0400, Hylton Tom P tom.p.hyl...@irs.gov wrote:

I was recently tasked to install an external function package for MQ
which givies users REXX functionality.  Since this is a supportpac,
docs are a bit sparce on details.

The functions came bundled in a module called IRFXUSER.

My interpretation of the rexx manual has indicated that when you use
IRFXUSER, which is a default entry already defined in the function
table,  then you don't have to modify the function package table or link
or modify the default module.  That's cool, and exactly what I want,
but I can't seem to figure out how to get my copy recognized.

There is an IRXFUSER is in sys1.linklib, just as expected.

So far,  I've tried
   adding my own lib to the linklist

That would work as long as your library comes before SYS1.LINKLIB in the
linklist.

   dynamic steplib product

That would run too late, after IKJEFT01 had already found the system's
IRXFUSER in SYS1.LINKLIB.  I believe that REXX initialization for TSO
happens before any commands are processed, so much earlier than you can
invoke anything from your terminal or from a logon clist.

   LIBDEF to ISPLLIB

That's also too late.

All result in function not found.

It works in batch(IKJEFT01) with a steplib, so I know I don't have
something right, but I can't find instructions on how to get my IRFXUSER
module included in the rexx search scheme.   Is it possible to leave the
entry alone in sys1.linklib and have my functions found in a different
lib?

Anyone familiar with doing this or can point me to a specific manual?
I can't seem to find much on the rexx reference, and irfxuser isn't
mentioned anywhere that I can find beyond the rexx bookshelf.

You'll need a STEPLIB, or a library ahead of SYS1.LINKLIB in the linklist, I
think.

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Concatenations and blocksizes

2009-08-11 Thread Rick Fochtman

--snip---
OTOH, if you concatenate PDSs together as PDS and then stick in a 
DSORG=PS I would imagine you will get a very interesting ABEND

-unsnip-
Depending on the DCB attributes involved, you might end up reading all 
the directories. The old ASMG product from the University of Waterloo 
used this method to load the directories of all the SYSLIB datasets, 
saving a lot of time and I/O during macro expansion. By so doing, it was 
able to use POINT, rather than BLDL/FIND to locate macros and copy code 
in the SYSLIB concatenation.


Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Concatenations and blocksizes

2009-08-11 Thread Bill Fairchild
My point was that one is smaller than 18, and zero is also smaller than 18.  
The controversy is whether or not a DASD block with a block size smaller than 
18 can be written onto a DASD, not over what happens when said block is read 
back in.  An earlier post said that a block size smaller than 18 is considered 
a noise record.  That is true for tapes but not DASD.  A unit exception, aka 
EOF, is not the same as a noise record.  EOF is signaled on tape with a tape 
mark, which is written with a Write Tape Mark CCW command, not with a Write CCW 
with a length smaller than 18, but an EOF on DASD is signaled with a data 
length of zero, which is written with a WCKD or WCKD Next Track CCW command, 
with a byte count of at least 8, and pointing to a count field containing zero 
in the data field.  There has never been a requirement on IBM mainframe DASD, 
from S/360 through z/whatever, that the data field be no smaller than 18.  
There is such a requirement for tape I/O.

Does anyone have a copy of the 3081 Channel Characteristics manual?  I have 
been told that this book describes a situation in which a 3380 did not work 
correctly with a block size smaller than 18 and want to see exactly what it 
says.  Thanks.

Bill Fairchild

Software Developer 
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.617.614.4503 * Mobile: +1.508.341.1715
Email: bi...@mainstar.com 
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Rick Fochtman
Sent: Tuesday, August 11, 2009 10:20 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Concatenations and blocksizes

---snip---
You have always been able to write a block of only one byte, or even 
zero bytes, onto a DASD.
unsnip--
One byte, yes. But if the device reads a count field with a data length 
of zero, it signals a Unit Exception, meaning a EOF mark.

That's what you might call a special case. :-)

Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Missing QPAM (was: Concatenations and blocksizes)

2009-08-11 Thread Rick Fochtman

--snip-
Ok. I'll buy that. But NOTE didn't return anything at all until they 
wrote it. So I'll regress: These smart people could also have written 
NOTEX or QNOTE that returned all that was required to do queued 
processing of the member. There must have been some reason they did not. 
I hope. What was that reason?

unsnip--
'Way back when I went to OS/360 school at San Jose, I was told that if 
you couldn't master the concepts of blocking/deblocking in BSAM, you had 
no business messing around with BPAM, which was designed as a add on 
product for BSAM. Maybe that was just instructor arrogance, but it's 
the only reason I was ever given.


Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Concatenations and blocksizes

2009-08-11 Thread Rick Fochtman

---snip--


I'm just puzzled that the enhancement limited itself to QSAM.
No mention of BPAM.

   


I had hoped this was an oversight in the doc, but apparently
not.  An assembly with:

   //SYSLIBDD  UNIT=SYSALLDA,SPACE=(80,(1,1)),
   //  RECFM=FB,LRECL=80,BLKSIZE=80
   //  DD  DISP=SHR,DSN=SYS1.MACLIB

 


Unless there is a typo, you concatenated a seq file (no directories)
with the PDS.

   


You mean I need _two_ commas, not just one?

Why does OPEN let me do that, and not just ABEND?

OK.  I changed to:

  6 //SYSLIBDD  UNIT=SYSALLDA,SPACE=(80,(1,,1)),
//  DISP=NEW,DSN=amp;MAC,
//  RECFM=FB,LRECL=80,BLKSIZE=80
X/SYSLIB   DD  DSN=SYS1.MACLIB,DISP=SHR
  7 //  DD  DISP=SHR,DSN=SYS1.MACLIB

I needed to specify DISP and DSN to override those in the
library proc.

And it fails the same with:

* TOP OF DATA **
** ASMA999U Assembly terminated - SYNAD Exit taken - Permanent I/O error on SYSL
,HELLO   ,C   ,4140,D,SYSLIB  ,UNKOWN,WRNG.LEN.RECORD,1F7100030
 BOTTOM OF DATA 

Experimental control: if I change BLKSIZE from 80 to 32760,
it assembles with no errors, and library macros are fetched
from the second catenand.
 


-unsnip
In your first example, you concatenated a PDS behind a PS dataset; 
AFAIK, this is never allowed.


In both examples, you seem to expect exactly correct records to be 
available. You have NO right to expect this because of your first 
(temporary) dataset, because there might be residual data on that track. 
In the second example, you've at least formatted the track withm a 
single directory block. But by specifying BLKSIZE=80, you've essential 
set the stage, by overriding what the system can do. I'd be willing to 
wager that if you left the BLKSIZE off that first dataset, it might also 
work just fine.


Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: USSTAB

2009-08-11 Thread Chris Mason
Martin

 ...  but felt you should know I haven't dropped the discussion.

That's good to know!

 It's highly unlikely someone would ... but, 'highly unlikely' is just the 
 type of 
open pit someone eventually falls into.

Precisely. It's because of that open pit - 'for some value of' likely see 
later - 
that I describe this as botched and you describe it as sloppy whether a 
technician or a suit is responsible. If the systems programmer had been 
obliged to indicate that he/she knew about system symbols by means of a 
change in the coding of the USSMSG macro before deliberately inserting 
system symbol matches - and checking for unwanted matches under guidance 
from helpful documentation, we'd not be causing a fuss.

 I believe the ampersand (x'50') is representative of the unprotected numeric 
field without the MDT and with normal intensity, not light-pen detectable. 

Correct. What it does by implication is establish a field in which whatever 
text 
is placed is coloured green when only the basic 3270 data stream is used[1]. I 
have seen system programmers deliberately colour their USS message fields 
without regard to whether or not the colour caused the field to become 
unprotected. 

 It's 'highly unlikely' and even slightly absurd to follow this with a non-
numeric string like 'SYSNAME'. (Defining a numeric input field and filling it 
with 
non-numerics).

The numeric aspect would certainly be odd but, as you said above, create a 
trap and someone may fall into it.

The text aspect is much more open. It doesn't have to be a text 
like SYSNAME but something which corresponds to an installation-defined 
system symbol. This makes the trap one which doesn't show up on day one, 
but could snap shut at any time after the system programmer changes system 
symbols.

And let us not forget the possibility that an  character appears in some 
explicit text such as a company name where blanks are left out as a matter of 
style or lack of 3270 space. I used a fictitious company name 
HAMMONDDREW in an earlier post and supposed that a systems programmer 
had for, perfectly good reasons, decided to create - perhaps before the 
upgrade to V1R8 or at some time later - a system symbol DREW.

You might like to add that case to the tests in order to be clear about the 
nature of the open pit.

Chris Mason

[1] In full, IIRC

Green: unprotected, normal intensity
Red: unprotected, high intensity
Blue: protected, normal intensity
White: protected, high intensity

On Tue, 11 Aug 2009 08:47:28 -0500, Martin Kline martin.kl...@yrcw.com 
wrote:

You seem to have a sandbox available to you so I would like to suggest 
some
more tests.

Yes, but only as time permits - I am working on those tests, but felt you
should know I haven't dropped the discussion.

Note that there's not too much point in checking the TN3270 implementation
with @-based variables since the only possibly difficult one is @HOSTNET,
having only one @ character.

It's highly unlikely someone would use an SBA ending with x'7C', the '@'
character, and immediately follow that with the character string, '@PRT',
resulting in the text '@@PRT' but, 'highly unlikely' is just the type of open 
pit
someone eventually falls into. It's also 'highly unlikely' someone would turn 
off
the main power to the data center, but I've seen it happen twice.

Which reminds me I got something wrong regarding the MDT in a previous
post. Recall that the  character when used as an attribute byte implies
an unprotected, input, field. I suggested it was unlikely without the MDT
bit.

I'm not sure most people know the difference. I believe the ampersand (x'50')
is representative of the unprotected numeric field without the MDT and with
normal intensity, not light-pen detectable. It's 'highly unlikely' and even
slightly absurd to follow this with a non-numeric string like 'SYSNAME'.
(Defining a numeric input field and filling it with non-numerics).

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: EREP query

2009-08-11 Thread Richard Peurifoy

Beesley, Paul wrote:

We run a job every day at 06:30 to clear LOGREC and write to a history
file ( JCL below ).
Every day without fail the following message is issued while the job is
running.
*IFB081I LOGREC DATA SET IS FULL,06.30.58, 
 DSN=SYS1.FIF2.LOGREC  
When I check LOGREC, its full of MDR records for every DASD volume in

the known universe as at 06:30.
Why is this happening and how can I stop it ? There's not much point
clearing logrec only for it to fill up again with useless MDR records.
This caused us to have no valid logrec records for IBM the other day
after a system outage ...

//JS010  EXEC PGM=IFCEREP1,TIME=10,   
//PARM='LINECT=60,ACC=Y,HIST=N,ZERO=Y,SYSUM=Y'
//SERLOG   DD DSN=SYS1.FIF2.LOGREC,DISP=SHR   
//ACCDEV   DD DSN=SYS3.FIF2.EREPHIST, 
//DISP=(NEW,CATLG,DELETE),
//SPACE=(2000,(3000,3000),RLSE),  
//AVGREC=U,   
//LRECL=2000, 
//RECFM=VB
//DIRECTWK DD UNIT=SYSALLDA,SPACE=(CYL,(5,5)) 
//TOURIST  DD SYSOUT=*
//EREPPT   DD SYSOUT=*
//SYSINDD DUMMY,DCB=BLKSIZE=80


IFCEREP1 downloads the MDR's at the time it runs (Z EOD also does this).
I think they also get downloaded if the counters overflow.
You should increase the size of you LOGREC or switch to the system
logger. If your LOGREC is full, and you don't want to loose the MDR's
you can run IFCOFFLD which dumps/clears LOGREC without downloading
the MDR's.

--
Richard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: VTAM security issue

2009-08-11 Thread Hal Merritt
As a matter of courtesy I very rarely discuss off list conversations. 

I'm not going to do that now, but I am going to offer an observation: levels of 
'security' and what, exactly, that means is often in the eye of the beholder. 

VTAM et al seems to become aware of and often seeks to interconnect with other 
networks/hosts automatically. To some, any form of intercommunication 
whatsoever is a security issue. I seem to recall one auditor nearly wetting his 
pants because he could access a logon screen of an application on a remote 
host. 

Whether or not this interaction would be considered a 'compromise' would be, in 
my opinion, a matter of opinion. I wonder how I can reasonably demand 
credentials without first providing a way to give them to me. On the other 
hand, simply gaining access to a network is the first step in many kinds of 
attack vectors. 

I respect the opinions of both sides. 
 

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Chris Mason
Sent: Sunday, August 09, 2009 10:08 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: VTAM security issue

JM  Right now I understand there are 20+ ways which VTAM/SNA systems 
have been compromised. 

HM  Please give us some details on the compromised VTAM/SNA systems.

Hal Merritt - and perhaps many others including myself - are still waiting for 
Jim Marshall's reply.

..snip  
NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: VTAM security issue

2009-08-11 Thread Chris Mason
I get the impression that because SNA originally described a single VTAM 
channel-connected to one or more communication controllers, necessarily 
3705s (maximum storage up to 512K only later), to which were connected 
possibly multipoint SDLC lines terminated by terminals and that this did not 
constitute a network in the eyes of Lynn Wheeler, the existence of network 
in the expansion of SNA to its constituent words was an affront justifying 
perpetual protestations.

I have even to criticise this description by mentioning that the terminals 
were not necessarily dumb. Initially or early in the life of SNA there was a 
range of programmable retail devices, a range of programmable finance 
industry devices and, an office device with programmable characteristics 
(IMMSMC) and, the leader of the pack a programmable insurance device 
which was considered so clever it was rebranded a general purpose 
programmable device, the famous - trumpets please - 3790!

In case a dumb terminal was all you needed, you had a typewriter, the 3767, 
a display/printer clustered set, the 3270 devices of the day, and, for those 
who missed the famous old start-stop 1050 with its range of attachments, the 
3770 range, the top of which took in the market position previously occupied 
by the venerable BSC 2780 and 3780.

-

 vtam/ncp (pu5/pu4) formed part of a communication hierarchy.

Is communication hierarchy supposed to be how the facilities based VTAM 
and NCP should have been described perhaps?

 networking has tended to apply to talking to other peers ...

That's an opinion and one supported by the way a net is constructed.

 ... it was the source of my comment that only in situation where network 
had been co-opt to apply to communication hierarchy that it was necessary 
to qualify AWP39 networking architecture by peer-to-peer networking 
architecture.

This starts to look like a confirmation of the principle here presented that 
only 
a network that looks like a net deserves so to be described. According to this 
principle peer-to-peer should be a redundant qualification. Thus APPN should 
merely be AN. However, I can detect some sniping from the wings challenging 
the A so we would be left with a solitary N! Well, we have a wonderful 
programming language simply called C proudly described by a single letter 
until some spoilsport started adding plus signs!

Actually I worry just a little bit about LANs and equating a LAN to a network. 
Such a net wouldn't catch anything! You'd need to persuade the fish that 
there were invisible threads connecting each node to each other node in order 
to catch them out - or should that be catch them in!

 arpanet ... prior to great conversion to tcp/ip on 1jan83 ... had hosts and 
network nodes (IMPS). The IMPS talked to other IMPS (network nodes) ... and 
they talked to attached devices (which happened to be hosts, later there 
were also terminal IMPS). IMPS (network nodes) exchanged information 
about what other IMPS (network nodes) they were connected to
... so it was possible to dynamically discover network nodes and paths to 
network nodes and paths to connected devices/hosts.

If this ARPANET (?) design as described here was patented, IBM's APPN 
architects would have had to/did perhaps (?) pay for these core ideas for the 
design of APPN.

 The IMPS/host configuration had some physical similarity to pu4/pu5 ...

That spoils it! It looked like a dead ringer for APPN network nodes and end 
nodes. It had dynamic routing and probably dynamic search although that 
wasn't mentioned. VTAM (in a subarea SNA context) and NCP, type 5 and 
type 4 nodes respectively, famously had no routing flexibility.

 but the IMPS were full network nodes that managed the dynamic network 
configuration and then forwarded communication to/from destination hosts. At 
the time of the great change over ... there was something like 100 IMPS 
(network nodes) and 255 (connected) HOSTs.

Perhaps that was considered to represent the limit for the architecture 
without introducing some corralling along the lines of the APPN topology 
subnet?

 TCP/IP has both a network layer and an internetworking layer (gateways 
and other conventions for supporting the internetworking of networks).

Thus the network layer is for traffic between source or destination nodes 
and each other or gateways - normally called routers these days - and that 
the internetworking layer - a layer since I believe I may have  
misunderstood what internetworking was supposed to mean in my last post - 
is for traffic crossing gateways/routers.

 At the TCP/IP network layer there is ARP (address resolution protocol) and 
ARP caches (dynamic maps of IP-addresses to data link ... if using the OSI 
model), as well as some maintenance/control gorp ...

The most likely translation being a mixture of dried fruit, etc. to maintain 
energy on the hoof according to a Google define:.

 ... with ICMP messages (redirects, not reachable, etc). These are 

Re: Clist Quest

2009-08-11 Thread Ted MacNEIL
item1 = ' '

Just remember, though, the above is not setting ITEM1 to a null value -- it is 
setting it to a single space (blank).

ITEM1 = '' 

sets it to a NULL
-
Too busy driving to stop for gas!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Concatenations and blocksizes

2009-08-11 Thread Scott Rowe
Most likely because the BLKSIZE is in the JFCB, and so acts as an override.  If 
the small BLKSIZE is only in the DSCB it is treated differently.  I actually 
thought about testing this yesterday, but didn't have time.  I suspected that 
it would work this way.

 Richard Peurifoy r-peuri...@neo.tamu.edu 8/11/2009 11:20 AM 
Interesting, I tried a temp PDS, and also failed, so I tried
a permanent PDS with a small blksize and it worked ok.

I then tried allocating a temp pds in a previous step and passed it.
This also worked ok. I don't know why it fails if allocated in
the same step.

--
Richard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html 



CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains 
confidential and privileged information intended only for the addressee.  If 
you are not the intended recipient, please be advised that you have received 
this material in error and that any forwarding, copying, printing, 
distribution, use or disclosure of the material is strictly prohibited.  If you 
have received this material in error, please (i) do not read it, (ii) reply to 
the sender that you received the message in error, and (iii) erase or destroy 
the material. Emails are not secure and can be intercepted, amended, lost or 
destroyed, or contain viruses. You are deemed to have accepted these risks if 
you communicate with us by email. Thank you.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: EREP query

2009-08-11 Thread Beesley, Paul
Richard and Mark
Thanks for the info and suggestions.
I plan to increase LOGREC ( pity it needs an IPL, one of the few things
that does so these days) - its only 59 tracks.
Hadn't heard of IFCOFFLD, looks useful 


Regards
Paul 

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Richard Peurifoy
Sent: 11 August 2009 16:50
To: IBM-MAIN@bama.ua.edu
Subject: Re: EREP query



IFCEREP1 downloads the MDR's at the time it runs (Z EOD also does this).
I think they also get downloaded if the counters overflow.
You should increase the size of you LOGREC or switch to the system
logger. If your LOGREC is full, and you don't want to loose the MDR's
you can run IFCOFFLD which dumps/clears LOGREC without downloading the
MDR's.

--
Richard

--
For IBM-MAIN subscribe / signoff / archive access instructions, send
email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search
the archives at http://bama.ua.edu/archives/ibm-main.html


___

Atos Origin and Atos Consulting are trading names used by the Atos Origin 
group.  The following trading entities are registered in England and Wales:  
Atos Origin IT Services UK Limited (registered number 01245534) and Atos 
Consulting Limited (registered number 04312380).  The registered office for 
each is at 4 Triton Square, Regents Place, London, NW1 3HG.The VAT No. for each 
is: GB232327983

This e-mail and the documents attached are confidential and intended solely for 
the addressee, and may contain confidential or privileged information.  If you 
receive this e-mail in error, you are not authorised to copy, disclose, use or 
retain it.  Please notify the sender immediately and delete this email from 
your systems.   As emails may be intercepted, amended or lost, they are not 
secure.  Atos Origin therefore can accept no liability for any errors or their 
content.  Although Atos Origin endeavours to maintain a virus-free network, we 
do not warrant that this transmission is virus-free and can accept no liability 
for any damages resulting from any virus transmitted.   The risks are deemed to 
be accepted by everyone who communicates with Atos Origin by email. 
___

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: VTAM security issue

2009-08-11 Thread Chris Mason
Hal

 As a matter of courtesy I very rarely discuss off list conversations.

Does this mean Jim Marshall passed on the information you requested in 
private? Since you were asking in public, I assumed the reply would be in 
public. You could, after all, have asked in private.

If you did receive the untested claims of compromise in private I'm glad you 
at least mentioned your courtesy rule.

Now I can request in public and expect to be answered in public. Otherwise 
we must take it as evidence that the claims of compromise do nor survive 
the light of day - and, assuming we have exploited all the functions available 
with VTAM and associated products at no extra cost, those actually 
affected - and I am not really one - can sleep soundly.

From what I can glean from your general comments, you appear to be 
supporting my charge that FUD was being insinuated and groundless FUD at 
that.

Chris Mason

On Tue, 11 Aug 2009 10:50:47 -0500, Hal Merritt 
hmerr...@jackhenry.com wrote:

As a matter of courtesy I very rarely discuss off list conversations.

I'm not going to do that now, but I am going to offer an observation: levels 
of 'security' and what, exactly, that means is often in the eye of the beholder.

VTAM et al seems to become aware of and often seeks to interconnect with 
other networks/hosts automatically. To some, any form of intercommunication 
whatsoever is a security issue. I seem to recall one auditor nearly wetting his 
pants because he could access a logon screen of an application on a remote 
host.

Whether or not this interaction would be considered a 'compromise' would be, 
in my opinion, a matter of opinion. I wonder how I can reasonably demand 
credentials without first providing a way to give them to me. On the other 
hand, simply gaining access to a network is the first step in many kinds of 
attack vectors.

I respect the opinions of both sides.


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On 
Behalf Of Chris Mason
Sent: Sunday, August 09, 2009 10:08 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: VTAM security issue

JM  Right now I understand there are 20+ ways which VTAM/SNA systems
have been compromised.

HM  Please give us some details on the compromised VTAM/SNA systems.

Hal Merritt - and perhaps many others including myself - are still waiting for
Jim Marshall's reply.

..snip

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: EREP query

2009-08-11 Thread Richard Peurifoy

Beesley, Paul wrote:

Richard and Mark
Thanks for the info and suggestions.
I plan to increase LOGREC ( pity it needs an IPL, one of the few things
that does so these days) - its only 59 tracks.
Hadn't heard of IFCOFFLD, looks useful 


There is a SETLOGRC IGNORE command.
I don't know if this would allow you to scratch and reallocate it or
not. Remember to dump it before you do this if you want to preserve
whats already in it.
If this works then a SETLOGRC DATASET should restart it.

Warning, I have never tried this.

--
Richard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: EREP query

2009-08-11 Thread Richard Peurifoy

Richard Peurifoy wrote:

Beesley, Paul wrote:

Richard and Mark
Thanks for the info and suggestions.
I plan to increase LOGREC ( pity it needs an IPL, one of the few things
that does so these days) - its only 59 tracks.
Hadn't heard of IFCOFFLD, looks useful 


There is a SETLOGRC IGNORE command.
I don't know if this would allow you to scratch and reallocate it or
not. Remember to dump it before you do this if you want to preserve
whats already in it.
If this works then a SETLOGRC DATASET should restart it.

Warning, I have never tried this.



Also, the new one probably needs to be on the same volume.

--
Richard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Concatenations and blocksizes

2009-08-11 Thread Richard Peurifoy

Scott Rowe wrote:

Most likely because the BLKSIZE is in the JFCB, and so acts as an override.  If 
the small BLKSIZE is only in the DSCB it is treated differently.  I actually 
thought about testing this yesterday, but didn't have time.  I suspected that 
it would work this way.


This appears to be true. If I code a blksize on the DDCARD of the passed
temp dataset in the ASM step, it also fails. I guess this means the
system (or assembler) will use the largest blksize at open time if
there is no blksize in any JFCB's. Obviously the system can't override
a blksize coded on a DCB macro.

--
Richard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SNA: conflicting opinions

2009-08-11 Thread Anne Lynn Wheeler
re:
http://www.garlic.com/~lynn/2009l.html#13 SNA: conflicting opinions
http://www.garlic.com/~lynn/2009l.html#15 SNA: conflicting opinions

part of the terminal communication heritage was things like LU6.2
having 160,000 instruction pathlength and 15 buffer copies thru VTAM.

The execution of comparable tcp/ip function, on other platforms, had
5,000 instruction pathlength and 5 buffer copies. As networking
technology advanced ... it was starting to assume more of the
charactereristic of file i/o; for large block network transfers ... the
processor cycles for the buffer copies could start to exceed the
processor cycles executing instructions.

for whatever reason, the early mainframe tcp/ip product had somewhat the
communication design point ... consumed a 3090 processor, sustaining
44kbytes/sec. However, I added rfc1044 support to the base mainframe
tcp/ip product ... and in some tuning tests at Cray Research between a
4341 and a Cray ... was able to get 4341 channel speed sustained thruput
using only a modest amount of the 4341 (on the order of 1000 times
improvement in the bytes moved per instruction executed).  misc. past
posts mentioning having done rfc 1044 support for the mainframe tcp/ip
product (with nearly thousand-fold improvement in the implementation)
http://www.garlic.com/~lynn/subnetwork.html#1044

for XTP/HSP ... misc. past posts mentioning xtp /or hsp
http://www.garlic.com/~lynn/subnetwork.html#xtphsp

evolving advanced networking objective was to come even closer to file
i/o paradigm by not requiring any buffer copies at all ... directly
getting data to/from the wire (use data-chaining, aka scatter/gather,
I/O operations for header info) ... and trying to get pathlength under
thousand instructions.

various of the disk division advanced products (that weren't allowed to
announce/ship) for the distributed environment ... attempted to have the
processor handle the equivalent in aggregate network channel traffic
... as the processor was capable of handling aggregate disk channel
traffic (large tens of mbytes/sec and later hundreds of mbytes/sec).

-- 
40+yrs virtualization experience (since Jan68), online at home since Mar1970

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


SNA addressing (was Re: VTAM security issue)

2009-08-11 Thread Chris Mason
I'm not addressing this specifically to Pat since he knows it all perfectly.

SNA addressing relies on two components - and it uses names not numbers. 
Within an enterprise, a naming authority is assigned which allocates - these 
days - just 8-character LU names.[1] The enterprise in turn is supposed to 
seek permission from a higher naming authority to provide it with a so-
called network identifier (NetId) with which to qualify the names within 
the 
enterprise.

IBM elected to be the higher naming authority and structured the NetId so 
that the first two characters indicated the country. (I believe there's some 
standard for this country code.) The next 6 characters are then available for 
the IBM entity responsible for the country to assign on request. Obviously the 
major enterprises can cherry-pick their codes but sequential allocation could 
apply at some level. In principle this offers 3 518 743 761 (39 to the power of 
6)[2] NetIds within each country code - sufficient down to the level of the 
individual citizen even for countries such as China and India but 
additional country codes could be assigned if necessary.

With IPv6 IP has removed the intrinsic limitations of IPv4, where the bountiful 
numbers (256*4 = 4 294 967 296) absolutely, that is, worldwide, are 
drastically reduced by having to structure the allocation of numbers in order 
to support IP routing - as well as assigning numbers within the range for 
special purposes such as broadcasting within a LAN network.

Since neither the assigned IP address number nor, when used extensively, the 
SNA name is or could be, respectively, user-friendly, a friendly name to 
address/unfriendly name service is/could apply to both.

Chris Mason

[1] Some may argue, even using SNA official documents, that the CP name 
also needs to be considered. It has been a feature of my teaching of APPN 
that the CP is just an LU which happens to use certain restricted mode names 
when performing functions needed for the operation (and management) of 
APPN protocols. When other mode names are used, that same session end-
point entity (LU/CP) can perform application duties. It's only because, alone 
among APPN platforms, VTAM can't actually do that - except for the APING 
application - that architecture had to get so convoluted regarding the CP vis-
à-vis the LU.
 
[2] 39 derives from 10 numbers, 26 alphabetic characters and the 
three specials, $, # and @.

On Sun, 9 Aug 2009 16:42:39 -0500, Patrick O'Keefe 
patrick.oke...@wamu.net wrote:

On Sun, 9 Aug 2009 16:03:33 -0500, Paul Gilmartin 
paulgboul...@aim.com wrote:

On Sun, 9 Aug 2009 11:57:15 -0400, Anne  Lynn Wheeler wrote:

possibly SNA organization viewed it as competition (even tho SNA had
nothing to do with networking).

Now I'm confused.  What does the initialism SNA stand
for?

Or, while this list is focused on initialism pedantry,
is it possible that there's another SNA than the one
I found at the top of a Google search?
...

Well, the N is Network, not Networking, but I don't think that
clarifies anything.   Lynn apparently has some very specific defibition
of Networking in mind.   His comment may be accurate (His comments
usually are.) but I'm not sure what that comment really was.

SNA does not have a universal addressing scheme and IP does.
Perhaps that was the point.  But SNI provided that in sort of the
same way that NATing allows interconnection of 2 IP networks that
use private IP addresses.

SNA does not provide a universal name space for resources, but
neither does IP.   The Domain Name space used by IP hosts is
not provided by, or dependent on IP.

Pat O'Keefe

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: EREP query

2009-08-11 Thread Mark Zelden
On Tue, 11 Aug 2009 11:11:54 -0500, Richard Peurifoy
r-peuri...@neo.tamu.edu wrote:

There is a SETLOGRC IGNORE command.
I don't know if this would allow you to scratch and reallocate it or
not. 

It will allow you to scratch and reallocate it, but then again, you can
do that without SETLOGRC IGNORE.  

It still won't be usable until you IPL.   But SETLOGRC IGNORE should
be used if the OP plan's on increasing the size now.   Probably better
to wait to just prior to IPL to reallocate it so nothing is lost. 

Remember to dump it before you do this if you want to preserve
whats already in it.
If this works then a SETLOGRC DATASET should restart it.


It will attempt to restart recording, but will have I/O errors. 
So it won't work or do what you think it should.  
The ERDS DEB is in *MASTER*.

However, the OP could switch to LOGSTREAM on the fly.

Warning, I have never tried this.


Regards,

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America / Farmers Insurance Group - ZFUS G-ITO
mailto:mark.zel...@zurichna.com
z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


[Fwd: New Books at Quilt Books USA]

2009-08-11 Thread Joel C. Ewing

--
Joel C. Ewing, Fort Smith, ARjcew...@acm.org

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: VTAM security issue

2009-08-11 Thread Hal Merritt
Um, I said I don't discuss off list conversations and gave one reason. Please 
don't infer anything further.   

I added that I respect the opinions, but did not say whether or not I agree 
with those opinions.

I'm also trying to say that I, personally, cannot add much value to this topic. 
I'm well out of my league here.

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Chris Mason
Sent: Tuesday, August 11, 2009 11:12 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: VTAM security issue

Hal

 As a matter of courtesy I very rarely discuss off list conversations.

Does this mean Jim Marshall passed on the information you requested in 
private? Since you were asking in public, I assumed the reply would be in 
public. You could, after all, have asked in private.

If you did receive the untested claims of compromise in private I'm glad you 
at least mentioned your courtesy rule.

Now I can request in public and expect to be answered in public. Otherwise 
we must take it as evidence that the claims of compromise do nor survive 
the light of day - and, assuming we have exploited all the functions available 
with VTAM and associated products at no extra cost, those actually 
affected - and I am not really one - can sleep soundly.

From what I can glean from your general comments, you appear to be 
supporting my charge that FUD was being insinuated and groundless FUD at 
that.

Chris Mason

On Tue, 11 Aug 2009 10:50:47 -0500, Hal Merritt 
hmerr...@jackhenry.com wrote:

As a matter of courtesy I very rarely discuss off list conversations.

I'm not going to do that now, but I am going to offer an observation: levels 
of 'security' and what, exactly, that means is often in the eye of the beholder.

VTAM et al seems to become aware of and often seeks to interconnect with 
other networks/hosts automatically. To some, any form of intercommunication 
whatsoever is a security issue. I seem to recall one auditor nearly wetting his 
pants because he could access a logon screen of an application on a remote 
host.

Whether or not this interaction would be considered a 'compromise' would be, 
in my opinion, a matter of opinion. I wonder how I can reasonably demand 
credentials without first providing a way to give them to me. On the other 
hand, simply gaining access to a network is the first step in many kinds of 
attack vectors.

I respect the opinions of both sides.


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On 
Behalf Of Chris Mason
Sent: Sunday, August 09, 2009 10:08 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: VTAM security issue

JM  Right now I understand there are 20+ ways which VTAM/SNA systems
have been compromised.

HM  Please give us some details on the compromised VTAM/SNA systems.

Hal Merritt - and perhaps many others including myself - are still waiting for
Jim Marshall's reply.

..snip

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Concatenations and blocksizes

2009-08-11 Thread Paul Gilmartin
On Tue, 11 Aug 2009 11:24:25 -0500, Richard Peurifoy wrote:

Scott Rowe wrote:
 Most likely because the BLKSIZE is in the JFCB, and so acts as an override.  
 If the small BLKSIZE is only in the DSCB it is treated differently.  I 
 actually thought about testing this yesterday, but didn't have time.  I 
 suspected that it would work this way.

This appears to be true. If I code a blksize on the DDCARD of the passed
temp dataset in the ASM step, it also fails. I guess this means the
system (or assembler) will use the largest blksize at open time if
there is no blksize in any JFCB's. Obviously the system can't override
a blksize coded on a DCB macro.

Thanks.  I'll try not to do that anymore.  I wonder whether the
behavior is properly documented?

But it explains why I've experienced no BLKSIZE problems lately in
concatenations, despite not being very diligent about order or
overrides.

BTW, I noticed post facto that in my successful test I had coded
BLKSIZE=32760.  That's not even a multiple of 80.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


P390/500 to give away - in Israel

2009-08-11 Thread Binyamin Dissen
It was working before I put it in storage a few years ago.

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


The Shame Approach

2009-08-11 Thread Edward Jaffe

Sometimes, the shame approach does work...  ;-)

+IBM   -5655A2000  - 09/08/04-11:03-
+IBM   -5655A2000  - 09/08/04-11:04-
*** Update/Next Action Insert FI1216***
Action Taken:
Hello Ed,

Did it work ? if so can I go ahead and close the PMR ? Thanks !

Regards,
Slimane

Action Plan:
Awaiting customer's update...
*** End Update/Next Action Format Insert ***
+IBM   -5655A2000  - 09/08/04-11:29-
+IBM   -5655A2000  - 09/08/04-11:29-
+IBM   -5655A2000  - 09/08/04-11:29-
+IBM   -5655A2000  - 09/08/04-11:29-
-IL72848   -5655A2000  - 09/08/04-12:05-
RESPOND ELECTRONICALLY:
Yes. Specifying QLSHELF=//EOY.BKLSHELF worked. But, I still can't find
where that's documented.
+IBM   -5655A2000  - 09/08/04-14:05-
+IBM   -5655A2000  - 09/08/04-14:10-
*** Update/Next Action Insert FI1216***

Action Taken:

I sent a note to development about documentation for UK47345.

Action Plan:
Awaiting development's update...
*** End Update/Next Action Format Insert ***
+IBM   -5655A2000  - 09/08/04-14:10-
+IBM   -5655A2000  - 09/08/04-14:10-
+IBM   -5655A2000  - 09/08/04-14:24-
+IBM   -5655A2000  - 09/08/06-07:07-
+IBM   -5655A2000  - 09/08/06-07:13-
*** Update/Next Action Insert FI1216***
Action Taken:

Hello Ed,

After consulting with development they stated the reason it is not
documented is because this is just a temporary fix while they are
working on the official fix which will eventually be documented when
it's ready.

Is it OK to close the PMR ? Thanks !

Regards,
Slimane

Action Plan:
Awaiting development's update if I should close the PMR.
*** End Update/Next Action Format Insert ***
+IBM   -5655A2000  - 09/08/06-07:13-
+IBM   -5655A2000  - 09/08/06-07:13-
-IL72848   -5655A2000  - 09/08/06-09:00-
RESPOND ELECTRONICALLY:
Are you sure you guys work for IBM? You put out a PTF that breaks
existing specifications, you have a workaround that you don't document
because it's only a temporary fix, and you're ready to close this PMR
and move on? At this point, the IBM I know would be adding a ++HOLD DOC
or ++HOLD ACTION to the PTF or marking the fix as PE until the new fix
can be delivered.
+IBM   -5655A2000  - 09/08/06-09:04-
+IBM   -5655A2000  - 09/08/06-09:07-
+IBM   -5655A2000  - 09/08/06-09:07-
+IBM   -5655A2000  - 09/08/07-08:33-
=WESLEY, JON H -5655A2000  - 09/08/07-10:51-
APAR PK93418 has been created.
+IBM   -5655A2000  - 09/08/11-06:46-

--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
edja...@phoenixsoftware.com
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Middleware Consolidation in the Market place... Who's next to FALL ?

2009-08-11 Thread Anton Britz

BMC Buys MQSoftware, Bolstering Middleware Management

BMC on Monday said it has bought MQSoftware, maker of middleware that hel
ps
companies monitor the performance of IBM's WebSphere MQ software, as well
as
other platforms. Terms were not disclosed.
Leave a comment
By Chris Kanaracus

Mon, August 10, 2009 ? IDG News Service ? BMC on Monday said it has b
ought
MQSoftware, maker of middleware that helps companies monitor the performa
nce
of IBM's WebSphere MQ software, as well as other platforms. Terms were no
t
disclosed.

BMC competes with Novell, CA, IBM and a range of smaller vendors in the
market for BSM (business service management) software, which is meant to
help companies manage their IT infrastructure effectively and align it in

support of business processes.

By purchasing MQSoftware, BMC wants a stronger play in companies that are

working on SOA (service-oriented architecture) projects.
Click here to find out more!

WebSphere MQ is a messaging platform that allows various applications and

systems to communicate with each other. It thereby plays a key role in SO
A
implementations, which seek to create composite applications consisting o
f
multiple, sometimes shared sources.

MQSoftware sells products for managing WebSphere MQ implementations and
analyzing the flow of transactions through the systems.

The company has more than 1,000 customers, and some 92 percent of large I
T
organizations are using WebSphere MQ, according to a statement.

While BMC's announcement emphasized MQSoftware's close alignment with
WebSphere MQ, the vendor also makes other products, such as for monitorin
g
Tibco's Enterprise Message Service platform, which competes with WebSpher
e MQ.

It was not clear Monday whether BMC plans to continue supporting and sell
ing
MQSoftware's products in stand-alone form, or if it intends to fold the
technologies into its own portfolio over time.

MQSoftware's Web site indicates its portfolio will be rebranded as BMC
Middleware Management. A BMC spokeswoman did not immediately respond to a

request for comment.

http://www.mqsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: USS misuse

2009-08-11 Thread Ed Rabara
On Thu, 6 Aug 2009 00:44:20 -0500, Barbara Nitz nitz-...@gmx.net wrote:

What did NOT come down were the three corresponding telnet address spaces
(TCPTNx they're called here). Two of them made OMVS spit out a BPX
message that shutdown was aborted because TCPTNx was blocking it, but the
things did not react to stop commands anymore, cancel resulted in 'use force
arm', and force arm didn't work, either. A good old FORCE was necessary. The
third TCPTNx stayed up through OMVS shutdown and restart, but was
completely broken afterwards, resulting in an IPL.

I suspect that these three TCPTNx started tasks are three separate TN3270 
Telnet Servers (deamons). When first introduced, (can't recall which version of 
Comm Server), the installation guide specified the proper command to shut them 
down.

By design, the standalone TN3270 Telnet Servers were to remain active when the 
TCPIP address space was terminated, with the expectation that TCPIP will 
restart 
shortly.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Missing QPAM (was: Concatenations and blocksizes)

2009-08-11 Thread Patrick O'Keefe
On Tue, 11 Aug 2009 10:37:31 -0500, Rick Fochtman 
rfocht...@ync.net wrote:


... I was told that if you couldn't master the concepts of 
blocking/deblocking in BSAM, you had no business messing 
around with BPAM, which was designed as a add on
product for BSAM. ...

He was right, but that logic didn't prevent IBM from creating QSAM  
for those that couldn't master (read: had better things to do 
than) blocking/deblocking in BSAM.   

QSAM handles individual members just fine so FIND, READ, WRITE 
and STOW are working under the covers.   Seems like that covers 
most of the functions.

I haven't written anything using BPAM since the mid '80s so I am 
undoubtedly forgetting some BPAM quirks that might be tricky in
a QPAM.   Did BPAM have an easy way to do an update in place?
If so, I could have lived without that in QPAM.  I assume there must 
have been more significant reasons than that.

Pat O'Keefe 
been  
  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: USSTAB

2009-08-11 Thread Patrick O'Keefe
On Tue, 11 Aug 2009 10:47:37 -0500, Chris Mason 
chrisma...@belgacom.net wrote:

...
 I have seen system programmers deliberately colour their 
USS message fields without regard to whether or not the colour 
caused the field to become unprotected.


Guilty as charged ... almost.  Not exactly without regard to 
whether .  More accurately even though.  I had reason to want
red (I think).  I'm pretty sure I placed it after the normal input 
field so both the Insert Cursor order and  the the HOME key 
positioned to the correct input field.   (I have no idea if USS cares.  
It might process any input it finds, regardless of the field.  But I 
didn't want to chance that not being the case.) 
 
Pat O'Keefe

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: USS misuse

2009-08-11 Thread Patrick O'Keefe
On Tue, 11 Aug 2009 14:24:59 -0500, Ed Rabara 
edrab...@yahoo.com wrote:

...
By design, the standalone TN3270 Telnet Servers were to remain 
active when the
TCPIP address space was terminated, with the expectation that 
TCPIP will restart
shortly.
...

Ed, you made the same misinterpretation I did.Barbara's problem
was with bringing OMVS down, not the TCP/IP address space.  And
at least one of the Tn3270 address spaces was unusable after 
OMVS was restarted.  This was NOT a design point for the Tn3270
server.  This was a bug.

Pat O'Keefe

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Missing QPAM (was: Concatenations and blocksizes)

2009-08-11 Thread Paul Gilmartin
On Tue, 11 Aug 2009 14:58:18 -0500, Patrick O'Keefe wrote:

On Tue, 11 Aug 2009 10:37:31 -0500, Rick Fochtman wrote:


... I was told that if you couldn't master the concepts of
blocking/deblocking in BSAM, you had no business messing
around with BPAM, which was designed as a add on
product for BSAM. ...

He was right, but that logic didn't prevent IBM from creating QSAM
for those that couldn't master (read: had better things to do
than) blocking/deblocking in BSAM.

QSAM handles individual members just fine so FIND, READ, WRITE
and STOW are working under the covers.   Seems like that covers
most of the functions.

Yes, provided you aren't upset by the overhead of doing
a DYNALLOC and an OPEN for each member.

Yah, I know, there's OPEN TYPE=J.  For those whose business
is messing around with that.  And can RYO catenation
search.

And the earlier suggestion of QNOTE and QPOINT (maybe
QFIND?) leads me to think of PDSE.  For PDSE, the
argument returned by POINT and passed to NOTE is not
a TTR, but the relative record number of the first
record in the current block.  Record oriented?  Sounds
real close to QSAM.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Report of NOSCRATCH GDG dsn's

2009-08-11 Thread Neil Duffee
On 2009-08-07 at 11:16, concerning Report of NOSCRATCH GDG dsn's, 
Esmie Moo es.._...@yah..ca wrote to IBM-Main:

 [SNIP] produce a list of GDG disk dsns that were defined with 
 NOSCRATCH parM?  [snip] I looked at DFDSS  FDR (FDREPORT) [snip] 

FDReport :
NAME : Dataset Name or VSAM Cluster Name
SPLGDGB : GDG base name on two lines
SGEGBASE : GDG base name (first 20 bytes only)
GDGFLAGS : GDG base flags - EMPTY/NOEMPTY/SCRATCH/NOSCRATCH
NVSAMATR : SMS NONVSAM Attributes -
ACTGDG : active GDG generation
DEFGDG : deferred GDG generation
ROLGDG : rolled-out GDG generation

XSELECT GDGFLAGS.EQ.NOSCRATCH
REPORT SPLGDGB,NAME,GDGFLAGS,NVSAMATR
PUNCH FDRLIB=delete_commands
PRINT DATATYPE=CATVTOC

--  signature = 6 lines follows --
Neil Duffee, Joe SysProg, U d'Ottawa, Ottawa, Ont, Canada
telephone:1 613 562 5800 x4585 fax:1 613 562 5161
mailto:NDuffee of uOttawa.ca http:/ /aix1.uottawa.ca/ ~nduffee
How *do* you plan for something like that? Guardian Bob, Reboot
For every action, there is an equal and opposite criticism.
Systems Programming: Guilty, until proven innocent John Norgauer 
2004

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Java question

2009-08-11 Thread Neil Duffee
On 2009-08-04 at 15:41, concerning Re: Java question, John McKown 
jmc...@hea..mar...com wrote to IBM-Main:

 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Barkow, Eileen
 Sent: Tuesday, August 04, 2009 2:32 PM

 Java in CICS [snip] restricted to using the
 JCICS classes [snip] not all java functions [snip] are supported.
 [snip] even if it is slower to run on CICS [snip]

For higher volume activities, Cics TS v3 has a shared class cache 
concept where the results of JIT compilation are retained for 
subsequent tasks.  Oh, multiple class caches too.

 Since Java runs on a separate TCB (J8?), [snip] some things [snip] not
 possible on the QR tcb. [snip] some nice development IDEs (Eclipse 
 Netbeans) which run on a PC. [snip] 

 [snip] version of the JCICS to be implemented so that testing could be
 done on a Windows, Linux, or MAC OS/X system. [snip] 

John : that's J8 tcbS.  plural  pooled.

Java Applications in Cics (v3.2) SC34-6825-01
Debugging and application that is running in a Cics JVM: The JVM in 
Cics supports the Java Platform Debugger Architecture (JPDA) ...
Attaching a debugger to a Cics JVM: To run a JVM in debug mode and 
allow a JPDA remote debugger to be attached ... 
- ie. debugging at the workstation via tcp/ip.

Java Application Development for Cics (Feb 2009) SG24-5275-03
8.4 Interactive debugging
8.42 Debugging using Rational Developer for System Z.
- instructions would/should also work for Eclipse, NetBeans, etc.

--  signature = 6 lines follows --
Neil Duffee, Joe SysProg, U d'Ottawa, Ottawa, Ont, Canada
telephone:1 613 562 5800 x4585 fax:1 613 562 5161
mailto:NDuffee of uOttawa.ca http:/ /aix1.uottawa.ca/ ~nduffee
How *do* you plan for something like that? Guardian Bob, Reboot
For every action, there is an equal and opposite criticism.
Systems Programming: Guilty, until proven innocent John Norgauer 
2004

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Missing QPAM (was: Concatenations and blocksizes)

2009-08-11 Thread Rick Fochtman

--snip-

... I was told that if you couldn't master the concepts of 
blocking/deblocking in BSAM, you had no business messing 
around with BPAM, which was designed as a add on

product for BSAM. ...
   



He was right, but that logic didn't prevent IBM from creating QSAM  
for those that couldn't master (read: had better things to do 
than) blocking/deblocking in BSAM.   

QSAM handles individual members just fine so FIND, READ, WRITE 
and STOW are working under the covers.   Seems like that covers 
most of the functions.


I haven't written anything using BPAM since the mid '80s so I am 
undoubtedly forgetting some BPAM quirks that might be tricky in

a QPAM.   Did BPAM have an easy way to do an update in place?
If so, I could have lived without that in QPAM.  I assume there must 
have been more significant reasons than that.
 


--unsnip--
BPAM does update-in-place just fine, as long as you do the proper 
blocking/deblocking/reblocking. I use it in my PDSUPDTE program (on the 
CBTTAPE site) and the old IPOUPDTE program also uses it.


IEBUPDTE will do update-in-place if all you want to do is renumber one 
or more members.


Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: $ Sysplex

2009-08-11 Thread Arthur Gutowski
On Mon, 10 Aug 2009 15:32:31 -0400, Scott Rowe 
scott.r...@joann.com wrote:

Yes, you can do GRS-RING using XCF communications without a CF, which 
would be a basic Sysplex.  If you had a CF you would use GRS-STAR, which 
would use XES, and thus be a Parallel Sysplex.
 
Of course, I am running a Parallel Sysplex, and it still didn't cost any 
additional money.

Mostly, GREEN $$ comes into play if you are Parallel Sysplex outside the 
box.  You need CF links (cards, channels, cables - $), and a common time 
source (on z9 and up, that would be the orderable FC for STP - $$), as well 
as TE to configure and tune it.

Even sysplex-in-a-box has a cost in terms of processor storage and CPU 
cycles.  And basic sysplex will cost a couple of loop-back cables and some 
CPU.  Negligble, perhaps, but TANSTAAFL.

Still, Sysplex or MIM are the way to go (GRS ring oustide the Sysplex won't 
live much longer).

Regards,
Art Gutowski
Ford Motor Company

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


TSSO in a sysplex

2009-08-11 Thread Dana Mitchell
Hello,
We are considering replacing Netview for simple message automation with TSSO
from the CBT tape.   I have it up and running successfully but I have one
question.   Currently we have two Netview subsystems running on two members
of a sysplex,  each processing messages from a subset of sysplex members.  
 Is there a way to duplicate this setup, having TSSO process only messages
from a subset of sysplex members?  or  alternately, be able to identify what
system a message was issued from in TSSO processing?

thanks
Dana

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


how-to Sysplex? [was Re: DASD: to share or not to share]

2009-08-11 Thread Stephen Y Odo
We have 3 LPARs configured as monoplex.  One for our Production
environment, one for our Test/QA environment, and one for our
Application Development environment.

From this discussion, it sounds like everybody is saying even we would
benefit from Sysplex.

If we did do Sysplex, would we still be able to maintain that separation
between the environments?  How?  Does anybody have a cookbook on how
to go from where we are to where we should be?  And how does the change
affect the way we do things? i.e. what do we need to warn our customers
about?

I've looked at a couple of Redbooks (Merging systems into a Sysplex,
etc.) and I know there's lots of others out there.

Also, most of the stuff out there talks about parallel sysplex.  What
are the differences for a Basic Sysplex?  Which parts do I do differently?

And what about the non-IBM components?  We run ADABAS/Natural from
Software Ag.

Thanks for any pointers you can provide.

--Stephen





Scott Rowe wrote:
 I think the real question here is: Why don't you have a SYSPLEX? 
There is little to no cost involved,
 and many benefits.

Arthur Gutowski wrote:
 Still, Sysplex or MIM are the way to go (GRS ring oustide the Sysplex
won't
 live much longer).

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: USS misuse

2009-08-11 Thread Ed Rabara
Thanks for the correction Patrick. I missed the other topic/chain discussion
and zoned out on the OMVS shutdown and restart. I was too caught up on the
Standalone TN3270 Telnet Server vis-a-vis TCPIP (stack) relationship.

Went searching for your post/response to Barbara. I get it.

On Tue, 11 Aug 2009 15:43:24 -0500, Patrick O'Keefe
patrick.oke...@wamu.net wrote:


Ed, you made the same misinterpretation I did.Barbara's problem
was with bringing OMVS down, not the TCP/IP address space.  And
at least one of the Tn3270 address spaces was unusable after
OMVS was restarted.  This was NOT a design point for the Tn3270
server.  This was a bug.

Pat O'Keefe

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Sending z/OS Messages to external syslog server

2009-08-11 Thread גדי בן אבי
Hi everyone,

I ended up using the OPSCAWTO function is OPS. This sends an SNMP trap, which 
my Syslog server can read.

I am using KIWI syslog server (http://www.kiwisyslog.com/)

Thanks to everyone who responded.

Gadi

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Lizette Koehler
Sent: Tuesday, August 11, 2009 3:29 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Sending z/OS Messages to external syslog server

Gadi
What is an external syslog?  I have not heard that expression before.  Is
that just a flat file?  Or something else?

OPS/MVS can filter and action just about anything that goes to SYSLOG.

Lizette



 Does anyone know of a way to send messages from the  z/OS log to an
external syslog
 server.

 I have CA-OPS/MVS.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

לשימת לבך, בהתאם לנהלי החברה וזכויות החתימה בה, כל הצעה, התחייבות או מצג מטעם 
החברה, מחייבים מסמך נפרד וחתום על ידי מורשי החתימה של החברה, הנושא את לוגו 
החברה או שמה המודפס ובצירוף חותמת החברה. בהעדר מסמך כאמור (לרבות מסמך סרוק) 
המצורף להודעת דואר אלקטרוני זאת, אין לראות באמור בהודעה אלא משום טיוטה לדיון, 
ואין להסתמך עליה לביצוע פעולה עסקית או משפטית כלשהי.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: The Shame Approach

2009-08-11 Thread Barbara Nitz
Ed,
you're just as bad as I am! :-)
And yes, sometimes it takes a sledge hammer.
Best regards, Barbara

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hyper-PAVs

2009-08-11 Thread Barbara Nitz
Anyone using Hyper PAvs with EMC DMX or know where to find information on
implementing Hyper PAVs?  We are currently using Dynamic PAVs on z/OS 1.9
and EMC DMX-3.

I didn't think DMX-3 supported HyperPAV, or are you planning a DMX-4
migration?

You may want to contact your friendly EMC technician (assuming you have 
one). Back when I did that (more than a year ago, we're also on DMX-3), we 
were told that HyperPAV would require a complete reconfiguration of the DMX 
box with lengthy downtime. That effectively means a total shutdown of all 
lpars (both MVS and VM), and the way we are configured apparently at the 
same time. Which no one in management will okay.

Regards, Barbara

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html