Re: VTAM security issue
Almost correct ;) Systems Network Architecture http://www-01.ibm.com/software/globalization/terminology/s.jsp#s18 http://en.wikipedia.org/wiki/IBM_Systems_Network_Architecture -- Maarten -Oorspronkelijk bericht- Van: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] Namens Gibney, Dave Verzonden: zondag 9 augustus 2009 23:46 Aan: IBM-MAIN@BAMA.UA.EDU Onderwerp: Re: VTAM security issue Isn't the A Architecture? And the S Synchronous :) Now I'm confused. What does the initialism SNA stand for? - ATTENTION: The information in this electronic mail message is private and confidential, and only intended for the addressee. Should you receive this message by mistake, you are hereby notified that any disclosure, reproduction, distribution or use of this message is strictly prohibited. Please inform the sender by reply transmission and delete the message without copying or opening it. Messages and attachments are scanned for all viruses known. If this message contains password-protected attachments, the files have NOT been scanned for viruses by the ING mail domain. Always scan attachments before opening them. - -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Concatenations and blocksizes
Paul, I believe your problem occurs because you now have SYS1.MACLIB concatenated with SYS1.MACLIB, except the first one in the concatenation has DCB in the JCL that does not match the actual dataset - hence your error. The override X/ on statement 6 and before statement 7 is the clue. Ron -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Paul Gilmartin Sent: Monday, August 10, 2009 4:19 PM To: IBM-MAIN@bama.ua.edu Subject: Re: [IBM-MAIN] Concatenations and blocksizes On Mon, 10 Aug 2009 17:48:31 -0500, Richard Peurifoy wrote: Paul Gilmartin wrote: On Mon, 10 Aug 2009 16:52:59 -0500, Patrick O'Keefe wrote: I'm just puzzled that the enhancement limited itself to QSAM. No mention of BPAM. I had hoped this was an oversight in the doc, but apparently not. An assembly with: //SYSLIBDD UNIT=SYSALLDA,SPACE=(80,(1,1)), // RECFM=FB,LRECL=80,BLKSIZE=80 // DD DISP=SHR,DSN=SYS1.MACLIB Unless there is a typo, you concatenated a seq file (no directories) with the PDS. You mean I need _two_ commas, not just one? Why does OPEN let me do that, and not just ABEND? OK. I changed to: 6 //SYSLIBDD UNIT=SYSALLDA,SPACE=(80,(1,,1)), // DISP=NEW,DSN=amp;MAC, // RECFM=FB,LRECL=80,BLKSIZE=80 X/SYSLIB DD DSN=SYS1.MACLIB,DISP=SHR 7 // DD DISP=SHR,DSN=SYS1.MACLIB I needed to specify DISP and DSN to override those in the library proc. And it fails the same with: * TOP OF DATA ** ** ASMA999U Assembly terminated - SYNAD Exit taken - Permanent I/O error on SYSL ,HELLO ,C ,4140,D,SYSLIB ,UNKOWN,WRNG.LEN.RECORD,1F7100030 BOTTOM OF DATA Experimental control: if I change BLKSIZE from 80 to 32760, it assembles with no errors, and library macros are fetched from the second catenand. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Concatenations and blocksizes
On Mon, 10 Aug 2009 23:35:47 -0700, Ron Hawkins wrote: I believe your problem occurs because you now have SYS1.MACLIB concatenated with SYS1.MACLIB, except the first one in the concatenation has DCB in the JCL that does not match the actual dataset - hence your error. The override X/ on statement 6 and before statement 7 is the clue. It appears that line displays the content of the overridden statement, not the overriding. When I change only the BLKSIZE: 6 //SYSLIBDD UNIT=SYSALLDA,SPACE=(80,(1,,1)), // DISP=NEW,DSN=amp;MAC, // RECFM=FB,LRECL=80,BLKSIZE=32760 X/SYSLIB DD DSN=SYS1.MACLIB,DISP=SHR 7 // DD DISP=SHR,DSN=SYS1.MACLIB the assembly succeeds with no messages. The Assembler Summary in SYSPRINT shows a temp DSN as the first catenand: Diagnostic Cross Reference and Assembler Summ No Statements Flagged in this Assembly HIGH LEVEL ASSEMBLER, 5696-234, RELEASE 5.0, PTF UK10754 SYSTEM: z/OS 01.07.00 JOBNAME: HELLO STEPNAME: DOIT PR Data Sets Allocated for this Assembly Con DDname Data Set NameVolume Member P1 SYSINuser.HELLO.JOB05565.D101.? L1 SYSLIB SYS09222.T170822.RA000.HELLO.MAC.H01 WORK02 L2 SYS1.MACLIB MVS3RS SYSLIN SYS09222.T170822.RA000.HELLO.OBJ.H01 SYSPRINT user.HELLO.JOB05565.D102.? SYSTERM user.HELLO.JOB05565.D104.? -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Paul Gilmartin Sent: Monday, August 10, 2009 4:19 PM OK. I changed to: 6 //SYSLIBDD UNIT=SYSALLDA,SPACE=(80,(1,,1)), // DISP=NEW,DSN=amp;amp;MAC, // RECFM=FB,LRECL=80,BLKSIZE=80 X/SYSLIB DD DSN=SYS1.MACLIB,DISP=SHR 7 // DD DISP=SHR,DSN=SYS1.MACLIB I needed to specify DISP and DSN to override those in the library proc. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Sending z/OS Messages to external syslog server
Hi, Does anyone know of a way to send messages from the z/OS log to an external syslog server. I have CA-OPS/MVS. Gadi לשימת לבך, בהתאם לנהלי החברה וזכויות החתימה בה, כל הצעה, התחייבות או מצג מטעם החברה, מחייבים מסמך נפרד וחתום על ידי מורשי החתימה של החברה, הנושא את לוגו החברה או שמה המודפס ובצירוף חותמת החברה. בהעדר מסמך כאמור (לרבות מסמך סרוק) המצורף להודעת דואר אלקטרוני זאת, אין לראות באמור בהודעה אלא משום טיוטה לדיון, ואין להסתמך עליה לביצוע פעולה עסקית או משפטית כלשהי. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Mainframe tape encryption
Hi all, Anyone using mainframe tape encryption to selectively encrypt DSN's on tape volumes or entire volumes? Successes? Issues? Bob Robert B. Fake InfoSec, Inc. http://infosecinc.com/PSU%20Form.html (click here for info on the InfoSec PSU program!) 703-825-1202 (o) 571-241-5492 (c) 949-203-0406 (efax) mailto:rf...@infosecinc.com rf...@infosecinc.com Visit us at http://www.infosecinc.com/ www.infosecinc.com Click here for the http://www.facebook.com/pages/Centreville-VA/InfoSec-Inc/43693760902?ref=s InfoSec, Inc. Face book page The information contained in this e-mail message may be proprietary and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hyper-PAVs
gsg pisze: Anyone using Hyper PAvs with EMC DMX or know where to find information on implementing Hyper PAVs? We are currently using Dynamic PAVs on z/OS 1.9 and EMC DMX-3. AFAIK HyperPAV is available in DMX-4, but not DMX-3. -- Radoslaw Skorupka Lodz, Poland -- BRE Bank SA ul. Senatorska 18 00-950 Warszawa www.brebank.pl Sd Rejonowy dla m. st. Warszawy XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, nr rejestru przedsibiorców KRS 025237 NIP: 526-021-50-88 Wedug stanu na dzie 01.01.2009 r. kapita zakadowy BRE Banku SA (w caoci wpacony) wynosi 118.763.528 zotych. W zwizku z realizacj warunkowego podwyszenia kapitau zakadowego, na podstawie uchway XXI WZ z dnia 16 marca 2008r., oraz uchway XVI NWZ z dnia 27 padziernika 2008r., moe ulec podwyszeniu do kwoty 123.763.528 z. Akcje w podwyszonym kapitale zakadowym BRE Banku SA bd w caoci opacone. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe tape encryption
Robert Fake rf...@infosecinc.com wrote in message news:01a601ca1a59$1fb6ddd0$5f2499...@com... Hi all, Anyone using mainframe tape encryption to selectively encrypt DSN's on tape volumes or entire volumes? Successes? Issues? Bob Before the issue could arise here, we went to a TS7700 VTS, so nothing physical comes out of the box anymore and that also eliminated any transportation security issues. Kees. ** For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe tape encryption
Robert, It is going to depend on what you are using or looking at doing. If you are already down this road, provide some details and we can help provide some guidance. Is this hardware encryption? (TS1120 E05 or E06 tape drives, using ICSF) Is this software encryption? (IBM TIVOLI, CA TAPE, FDR CRYPT) -- I am sure if I indicated the wrong software, some kind soul will correct me :-D) When you ask about tape datasets are they individual, one per tape, or are you asking about multiple files on one tape? Here is my config with tape encryption. We are using a TS1120 E05 tape drives in a TS3500 ATL. I use EKM from IBM for the tape encryption software. We have Top Secret managing the KEYS for the encryption. With this setup when on file on the tape is encrypted ALL files on the same tape are encrypted. If I add a new file to the end of an encrypted tape it is automatically encrypted because it happens to be on the encrypted tape. From what I understand I cannot encrypt one file on a tape - it is all or nothing. The encryption will apply to all files on the tape regardless. Also, for my shop, our encryption is done at the hardware level. So over all easy to maintain and support. Was it easy to implement - NO. Did I get it done - Yes. The main problem is pieces that need to be put together to make it work. Our costs were the upgrade to E05 drives, we do not use ICSF nor did we get any other software except EKM which is free. Now that I have gone through this process, I can see why there can be a struggle to implement it. Lizette Hi all, Anyone using mainframe tape encryption to selectively encrypt DSN's on tape volumes or entire volumes? Successes? Issues? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Sending z/OS Messages to external syslog server
Gadi What is an external syslog? I have not heard that expression before. Is that just a flat file? Or something else? OPS/MVS can filter and action just about anything that goes to SYSLOG. Lizette Does anyone know of a way to send messages from the z/OS log to an external syslog server. I have CA-OPS/MVS. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
HSM duplexing for ML2 Tapes
Hello all, we are on z/OS 1.9 using CA/TLMS and I want to turn on ML2 duplexing to reduce the amount of time and effort needed to recover an ML2 volume (not really for offsite backups). I have read most of the HSM duplex posts and the manuals to try to formulate how this function works and from what I've read, if I want to turn on HSM duplexing for existing ML2 tapes (not backups), it's as easy as adding SETSYS DUPLEX(MIGRATION(Y)) to the ARCCMD00 parmlib member. The part that I (and apparently others) were confused about is the partialtape setting. Question 1 (Is this correct?) If you specify MIGRATION(REUSE) an ML2 tape is not selected for duplexing. If you want an ML2 to be duplexed, you need to either specify SETSYS PARTIALTAPE(MIGRATION(MARKFULL)) or generate a list of partialtapes LIST TTOC SELECT(ML2 NOTFULL) ODS(OUTPUT.DATASET) and mark them full so that TAPECOPY will automatically duplex them. Question 2 (Is this also correct?) If the above is correct, then by marking an ML2 volume full before it is actually full will probably triple the number of scratch tapes required. An extra tape for each duplex copy and since all of a tape will not be used, more tapes will be needed. Can someone please help clarify this area for me. Many thanks, Gil. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: HSM duplexing for ML2 Tapes
Gilbert, Your assumption in question 1 is incorrect. Use of Reuse does not preclude use of Duplexing. Thank You, Dave O'Brien NIH Contractor From: IBM Mainframe Discussion List [ibm-m...@bama.ua.edu] On Behalf Of Gilbert Cardenas [gilbertcarde...@grocerybiz.com] Sent: Tuesday, August 11, 2009 8:29 AM To: IBM-MAIN@bama.ua.edu Subject: HSM duplexing for ML2 Tapes Hello all, we are on z/OS 1.9 using CA/TLMS and I want to turn on ML2 duplexing to reduce the amount of time and effort needed to recover an ML2 volume (not really for offsite backups). I have read most of the HSM duplex posts and the manuals to try to formulate how this function works and from what I've read, if I want to turn on HSM duplexing for existing ML2 tapes (not backups), it's as easy as adding SETSYS DUPLEX(MIGRATION(Y)) to the ARCCMD00 parmlib member. The part that I (and apparently others) were confused about is the partialtape setting. Question 1 (Is this correct?) If you specify MIGRATION(REUSE) an ML2 tape is not selected for duplexing. If you want an ML2 to be duplexed, you need to either specify SETSYS PARTIALTAPE(MIGRATION(MARKFULL)) or generate a list of partialtapes LIST TTOC SELECT(ML2 NOTFULL) ODS(OUTPUT.DATASET) and mark them full so that TAPECOPY will automatically duplex them. Question 2 (Is this also correct?) If the above is correct, then by marking an ML2 volume full before it is actually full will probably triple the number of scratch tapes required. An extra tape for each duplex copy and since all of a tape will not be used, more tapes will be needed. Can someone please help clarify this area for me. Many thanks, Gil. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: HSM duplexing for ML2 Tapes
That's great news. That means that my scratch pool will only double for the extra duplex copy. Thanks, Gil. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Sending z/OS Messages to external syslog server
You can use JES2 OFFLOAD, create a file and then input to a syslog server like NetIQ. 2009/8/11 גדי בן אבי gad...@malam.com Hi, Does anyone know of a way to send messages from the z/OS log to an external syslog server. I have CA-OPS/MVS. Gadi לשימת לבך, בהתאם לנהלי החברה וזכויות החתימה בה, כל הצעה, התחייבות או מצג מטעם החברה, מחייבים מסמך נפרד וחתום על ידי מורשי החתימה של החברה, הנושא את לוגו החברה או שמה המודפס ובצירוף חותמת החברה. בהעדר מסמך כאמור (לרבות מסמך סרוק) המצורף להודעת דואר אלקטרוני זאת, אין לראות באמור בהודעה אלא משום טיוטה לדיון, ואין להסתמך עליה לביצוע פעולה עסקית או משפטית כלשהי. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DFHSM QUESTION - HIGHLEVEL QUALIFIERS
Hi Willie, I believe I believe this is covered in Chapter 2 of the Admin guide. The MIGRATEPREFIX parameter of the SETSYS command specifies the prefix (high-level qualifier) of the generated name. If you do not specify a migrate prefix, DFSMShsm uses the UID that you specified in the startup procedure. SETSYS MIGRATEPREFIX(??) SETSYS BACKUPPREFIX(??) etc. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DFHSM QUESTION - HIGHLEVEL QUALIFIERS
On Tue, 11 Aug 2009 05:32:25 -0700, willie bunter williebun...@yahoo.com wrote: Besides issuing a MIGRATE or DUMP or BACKDS commands to find the HLQ is there something else? Thanks Willie - On the console try issuing the command F DFHSM,QUERY SETSYS and then on the log or in the HSM address space do a find on PREFIX. HTH, Pat L. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hyper-PAVs
On Mon, 10 Aug 2009 16:46:14 -0500, gsg gsg_...@yahoo.com wrote: Anyone using Hyper PAvs with EMC DMX or know where to find information on implementing Hyper PAVs? We are currently using Dynamic PAVs on z/OS 1.9 and EMC DMX-3. What type of information? For the hardware or z/OS? For z/OS you gen them just like dynamic but you should need less aliases and you enable it with the HYPERPAV=YES option in IECIOSxx and/or a sSET / SETIOS command. I didn't think DMX-3 supported HyperPAV, or are you planning a DMX-4 migration? Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - ZFUS G-ITO mailto:mark.zel...@zurichna.com z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Sending z/OS Messages to external syslog server
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Lizette Koehler Sent: Tuesday, August 11, 2009 7:29 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Sending z/OS Messages to external syslog server Gadi What is an external syslog? I have not heard that expression before. Is that just a flat file? Or something else? OPS/MVS can filter and action just about anything that goes to SYSLOG. Lizette He likely means a UNIX system running the UNIX syslog daemon. That is the, vague, equivalent of the MVS SYSLOG. I have some CA-OPS/MVS code which uses REXX sockets to create an SNMP trap message to CA-UniCenter to report problems. But the code was cribbed from some BMC code which I was given permission to use, so I don't know if I should make it generally available. But it could possibly be use as a model to send a message to a UNIX syslog daemon. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
DFHSM and Encrypting ML2 tape issue RESOLVED
Okay, After a few more days of playing and reading, we came upon the answer. For DFHSM you need to do the same thing to ML2 tape as TAPECOPY tape. Since we had only be changing the output device on one - it was not working. Once we changed the device definition on both ML2 and TAPECOPY to 3592-2 it worked. The 3592-1 So, we are now having DFHSM ML2 and TAPECOPY tapes encrypted successfully by using the correct device type and the coding in the ACS for this process to use the appropriate dataclas for these dataset names. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: HSM duplexing for ML2 Tapes
Question 1 (Is this correct?) If you specify MIGRATION(REUSE) an ML2 tape is not selected for duplexing. If you want an ML2 to be duplexed, you need to either specify SETSYS PARTIALTAPE(MIGRATION(MARKFULL)) or generate a list of partialtapes LIST TTOC SELECT(ML2 NOTFULL) ODS(OUTPUT.DATASET) and mark them full so that TAPECOPY will automatically duplex them. Answered in another post. Question 2 (Is this also correct?) If the above is correct, then by marking an ML2 volume full before it is actually full will probably triple the number of scratch tapes required. An extra tape for each duplex copy and since all of a tape will not be used, more tapes will be needed. Recycle is your friend here! This is the way it really works: Data is written concurrently to both the primary and duplex copy of ML2. When either the primary or duplex becomes full, (1st to EOV wins) both are so marked and another duplex pair is created. The partialtape parameter enables the recycle to be performed immediately. Of course you may not want to do this since it will foul up Fast Subsequent Migration. HTH, -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DFHSM QUESTION - HIGHLEVEL QUALIFIERS
Thanks Pat. I tried the command and found what I was looking for. Thanks to all who responded. --- On Tue, 8/11/09, Patrick Lyon ptl...@midamerican.com wrote: From: Patrick Lyon ptl...@midamerican.com Subject: Re: DFHSM QUESTION - HIGHLEVEL QUALIFIERS To: IBM-MAIN@bama.ua.edu Received: Tuesday, August 11, 2009, 5:57 AM On Tue, 11 Aug 2009 05:32:25 -0700, willie bunter williebun...@yahoo.com wrote: Besides issuing a MIGRATE or DUMP or BACKDS commands to find the HLQ is there something else? Thanks Willie - On the console try issuing the command F DFHSM,QUERY SETSYS and then on the log or in the HSM address space do a find on PREFIX. HTH, Pat L. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html __ Looking for the perfect gift? Give the gift of Flickr! http://www.flickr.com/gift/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DFHSM QUESTION - HIGHLEVEL QUALIFIERS
I checked for the SETSYS commands but they were no in the ARCCMD parmlib. I don't know the reason why. I checked other partitions and they have MIGRATEPREFIX BACKUPPREFIX listed. Mystery Thanks for your suggestion. --- On Tue, 8/11/09, Gilbert Cardenas gilbertcarde...@grocerybiz.com wrote: From: Gilbert Cardenas gilbertcarde...@grocerybiz.com Subject: Re: DFHSM QUESTION - HIGHLEVEL QUALIFIERS To: IBM-MAIN@bama.ua.edu Received: Tuesday, August 11, 2009, 5:56 AM Hi Willie, I believe I believe this is covered in Chapter 2 of the Admin guide. The MIGRATEPREFIX parameter of the SETSYS command specifies the prefix (high-level qualifier) of the generated name. If you do not specify a migrate prefix, DFSMShsm uses the UID that you specified in the startup procedure. SETSYS MIGRATEPREFIX(??) SETSYS BACKUPPREFIX(??) etc. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html __ Looking for the perfect gift? Give the gift of Flickr! http://www.flickr.com/gift/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: HSM duplexing for ML2 Tapes
On Tue, 11 Aug 2009 08:04:13 -0500, Staller, Allan allan.stal...@kbm1.com wrote: Question 1 (Is this correct?) If you specify MIGRATION(REUSE) an ML2 tape is not selected for duplexing. If you want an ML2 to be duplexed, you need to either specify SETSYS PARTIALTAPE(MIGRATION(MARKFULL)) or generate a list of partialtapes LIST TTOC SELECT(ML2 NOTFULL) ODS(OUTPUT.DATASET) and mark them full so that TAPECOPY will automatically duplex them. Answered in another post. Question 2 (Is this also correct?) If the above is correct, then by marking an ML2 volume full before it is actually full will probably triple the number of scratch tapes required. An extra tape for each duplex copy and since all of a tape will not be used, more tapes will be needed. Recycle is your friend here! This is the way it really works: Data is written concurrently to both the primary and duplex copy of ML2. When either the primary or duplex becomes full, (1st to EOV wins) both are so marked and another duplex pair is created. The partialtape parameter enables the recycle to be performed immediately. Of course you may not want to do this since it will foul up Fast Subsequent Migration. HTH, Thanks for the info, every tidbit helps. We currently defer the recyclying of tapes to the weekends when processing is slower. Thanks again, Gil. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Sending z/OS Messages to external syslog server
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of ??? ?? ??? Sent: Tuesday, August 11, 2009 2:51 AM To: IBM-MAIN@bama.ua.edu Subject: Sending z/OS Messages to external syslog server Hi, Does anyone know of a way to send messages from the z/OS log to an external syslog server. I have CA-OPS/MVS. Gadi Perhaps. I use CA-OPS/MVS to send an SNMP trap to CA-Unicenter for some z/OS messages. It is basically a two step process. The first is to right a message rule to trap the z/OS message. This is the easy part grin. The second part is to write a REXX program which uses REXX sockets to send the syslog message to your syslog server. This REXX program is invoked from the message rule via the OX command, something like: OX PROGRAM('rexx.program.library(logpgm)') ARG('MSG.TEXT') The above invokes logpgm in 'rexx.program.library and passes it the message text. The logpgm uses REXX sockets to send the message to the appropriate UNIX syslog server. Doing this is the difficult part. Especially since I've never done it. Now, if you have the C compiler (we don't), you could write a C program which does this using the openlog(), syslog(), and closelog() functions. However, this sends the message to the local z/OS system's syslog daemon. So it needs to be running and configured to relay the message on to the desired syslog server. Wish I had some code to share, but I don't. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: USSTAB
You seem to have a sandbox available to you so I would like to suggest some more tests. Yes, but only as time permits - I am working on those tests, but felt you should know I haven't dropped the discussion. Note that there's not too much point in checking the TN3270 implementation with @-based variables since the only possibly difficult one is @HOSTNET, having only one @ character. It's highly unlikely someone would use an SBA ending with x'7C', the '@' character, and immediately follow that with the character string, '@PRT', resulting in the text '@@PRT' but, 'highly unlikely' is just the type of open pit someone eventually falls into. It's also 'highly unlikely' someone would turn off the main power to the data center, but I've seen it happen twice. Which reminds me I got something wrong regarding the MDT in a previous post. Recall that the character when used as an attribute byte implies an unprotected, input, field. I suggested it was unlikely without the MDT bit. I'm not sure most people know the difference. I believe the ampersand (x'50') is representative of the unprotected numeric field without the MDT and with normal intensity, not light-pen detectable. It's 'highly unlikely' and even slightly absurd to follow this with a non-numeric string like 'SYSNAME'. (Defining a numeric input field and filling it with non-numerics). -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IBM-MAIN Digest - 8 Aug 2009 to 9 Aug 2009 (#2009-221)
How do I post a question? Martha Petretti 15 MTC rm 15-417 ph 718 510-8565 cell 347 587-9486 -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of IBM-MAIN automatic digest system Sent: Monday, August 10, 2009 12:00 AM To: IBM-MAIN@BAMA.UA.EDU Subject: IBM-MAIN Digest - 8 Aug 2009 to 9 Aug 2009 (#2009-221) There are 23 messages totalling 1986 lines in this issue. Topics of the day: 1. DASD: to share or not to share (9) 2. Problems occured when using DFSMSdss to dump and restore DB2 data sets 3. VTAM security issue (6) 4. RMM Retention WHILECATLG 5. SNA, the acronym (2) 6. Was RE: SNA, the acronym. Is SNA really an acronym or an initialism ? 7. CSC Comtec's HMO software (Pick) on z/OS SYSPLEX 8. Infoprint set up in zos 9. C.D. Keltie is away. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
EREP query
We run a job every day at 06:30 to clear LOGREC and write to a history file ( JCL below ). Every day without fail the following message is issued while the job is running. *IFB081I LOGREC DATA SET IS FULL,06.30.58, DSN=SYS1.FIF2.LOGREC When I check LOGREC, its full of MDR records for every DASD volume in the known universe as at 06:30. Why is this happening and how can I stop it ? There's not much point clearing logrec only for it to fill up again with useless MDR records. This caused us to have no valid logrec records for IBM the other day after a system outage ... //JS010 EXEC PGM=IFCEREP1,TIME=10, //PARM='LINECT=60,ACC=Y,HIST=N,ZERO=Y,SYSUM=Y' //SERLOG DD DSN=SYS1.FIF2.LOGREC,DISP=SHR //ACCDEV DD DSN=SYS3.FIF2.EREPHIST, //DISP=(NEW,CATLG,DELETE), //SPACE=(2000,(3000,3000),RLSE), //AVGREC=U, //LRECL=2000, //RECFM=VB //DIRECTWK DD UNIT=SYSALLDA,SPACE=(CYL,(5,5)) //TOURIST DD SYSOUT=* //EREPPT DD SYSOUT=* //SYSINDD DUMMY,DCB=BLKSIZE=80 Paul Beesley ___ Atos Origin and Atos Consulting are trading names used by the Atos Origin group. The following trading entities are registered in England and Wales: Atos Origin IT Services UK Limited (registered number 01245534) and Atos Consulting Limited (registered number 04312380). The registered office for each is at 4 Triton Square, Regents Place, London, NW1 3HG.The VAT No. for each is: GB232327983 This e-mail and the documents attached are confidential and intended solely for the addressee, and may contain confidential or privileged information. If you receive this e-mail in error, you are not authorised to copy, disclose, use or retain it. Please notify the sender immediately and delete this email from your systems. As emails may be intercepted, amended or lost, they are not secure. Atos Origin therefore can accept no liability for any errors or their content. Although Atos Origin endeavours to maintain a virus-free network, we do not warrant that this transmission is virus-free and can accept no liability for any damages resulting from any virus transmitted. The risks are deemed to be accepted by everyone who communicates with Atos Origin by email. ___ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IBM-MAIN Digest - 8 Aug 2009 to 9 Aug 2009 (#2009-221)
Hi Martha, I think that you just have to state your question in the email to IBM-Main. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Petretti, Martha Sent: Tuesday, August 11, 2009 9:47 AM To: IBM-MAIN@bama.ua.edu Subject: Re: IBM-MAIN Digest - 8 Aug 2009 to 9 Aug 2009 (#2009-221) How do I post a question? Martha Petretti 15 MTC rm 15-417 ph 718 510-8565 cell 347 587-9486 -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of IBM-MAIN automatic digest system Sent: Monday, August 10, 2009 12:00 AM To: IBM-MAIN@BAMA.UA.EDU Subject: IBM-MAIN Digest - 8 Aug 2009 to 9 Aug 2009 (#2009-221) There are 23 messages totalling 1986 lines in this issue. Topics of the day: 1. DASD: to share or not to share (9) 2. Problems occured when using DFSMSdss to dump and restore DB2 data sets 3. VTAM security issue (6) 4. RMM Retention WHILECATLG 5. SNA, the acronym (2) 6. Was RE: SNA, the acronym. Is SNA really an acronym or an initialism ? 7. CSC Comtec's HMO software (Pick) on z/OS SYSPLEX 8. Infoprint set up in zos 9. C.D. Keltie is away. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Clist Quest
I ran across the following IF statement in a Clist that I am working on. The statement itself is understandable, it's the period usage that I don't understand. Can anyone shed some light on this? IF .ITEMS .5 THEN DO Thanks, Ray Baraniecki Morgan Stanley Smith Barney 18th Floor 1 New York Plaza New York, NY 10004 Office - 212-276-5641 Cell - 917-597-5692 ray.baranie...@morganstanley.commailto:ray.baranie...@morganstanley.com BE CARBON CONSCIOUS. PLEASE CONSIDER OUR ENVIRONMENT BEFORE PRINTING THIS E-MAIL. -- Important Notice to Recipients: It is important that you do not use e-mail to request, authorize or effect the purchase or sale of any security or commodity, to send fund transfer instructions, or to effect any other transactions. Any such request, orders, or instructions that you send will not be accepted and will not be processed by Morgan Stanley Smith Barney. The Global Wealth Management Group of Morgan Stanley Co. Incorporated and the Smith Barney division of Citigroup Global Markets Inc. have combined into Morgan Stanley Smith Barney LLC, a new investment adviser and broker-dealer registered with the Securities and Exchange Commission. The sender of this email is an employee of Morgan Stanley Smith Barney. Important disclosures on Morgan Stanley and Citi Investment Research Analysis research reports may relate in part to the separate businesses of Citigroup Global Markets Inc. and Morgan Stanley that now form Morgan Stanley Smith Barney LLC. To view these important research disclosures, go to http://www.morganstanley.com/researchdisclosures and https://www.citigroupgeo.com/geopublic/Disclosures/index_a.html. If received in error, please destroy and notify sender. Sender does not intend to waive confidentiality or privilege. Use of this email is prohibited when received in error. We may monitor and store emails to the extent permitted by applicable law. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Clist Quest
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Baraniecki, Ray Sent: Tuesday, August 11, 2009 8:53 AM To: IBM-MAIN@bama.ua.edu Subject: Clist Quest I ran across the following IF statement in a Clist that I am working on. The statement itself is understandable, it's the period usage that I don't understand. Can anyone shed some light on this? IF .ITEMS .5 THEN DO Thanks, Ray Baraniecki suppose the line were: IF ITEMS 5 THEN DO What if ITEMS is null ('')? Without the periods, the CLIST intepreter would see the line: IF 5 THEN DO which it could not handle (syntax error). So the periods are there just to make the line syntactically correct in the case where ITEMS is null. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Clist Quest
The . prevents null values from being compared, which sometimes causes errors in the clist. Any character could be used so that valid, non-null values are generated. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of McKown, John Sent: Tuesday, August 11, 2009 10:02 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Clist Quest -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Baraniecki, Ray Sent: Tuesday, August 11, 2009 8:53 AM To: IBM-MAIN@bama.ua.edu Subject: Clist Quest I ran across the following IF statement in a Clist that I am working on. The statement itself is understandable, it's the period usage that I don't understand. Can anyone shed some light on this? IF .ITEMS .5 THEN DO Thanks, Ray Baraniecki suppose the line were: IF ITEMS 5 THEN DO What if ITEMS is null ('')? Without the periods, the CLIST intepreter would see the line: IF 5 THEN DO which it could not handle (syntax error). So the periods are there just to make the line syntactically correct in the case where ITEMS is null. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SNA: conflicting opinions
re: http://www.garlic.com/~lynn/2009l.html#3 VTAM security issue http://www.garlic.com/~lynn/2009l.html#7 VTAM security issue http://www.garlic.com/~lynn/2009l.html#11 VTAM security issue http://www.garlic.com/~lynn/2009l.html#13 SNA: conflicting opinions a network layer with feature like ARP ... also enables BOOTPDHCP ... with things like reverse ARP ... a machine dynamically loading their network characteristic from service in local environment. bootp/dhcp provides for dynamic network configuration for things like roaming laptops in wireless environment. from my IETF RFC index: http://www.garlic.com/~lynn/rfcietff.htm click on Term (term-RFC#) in the RFCs listed by section; then in the Acronym fastpath section there is BOOTP: bootstrap protocol (BOOTP ) see also configuration , reverse address resolution protocol 2132 1542 1534 1533 1532 1497 1395 1084 1048 951 DHCP: dynamic host configuration protocol (DHCP ) see also configuration , host , reverse address resolution protocol 5505 5460 5417 5223 5192 5139 5107 5071 5010 5007 4994 4941 4833 4776 4704 4703 4702 4701 4676 4649 4580 4578 4477 4436 4390 4388 4361 4332 4280 4243 4242 4174 4076 4039 4030 4014 3993 3942 3927 3925 3898 3825 3736 3679 3646 3634 3633 3594 3527 3495 3456 3442 3397 3396 3361 3319 3315 3256 3203 3118 3074 3046 3041 3011 3004 2939 2937 2855 2610 2563 2489 2485 2322 2242 2241 2132 2131 1541 1534 1533 1531 and RARP reverse address resolution protocol (RARP ) see also address resolution 5505 5460 5417 5223 5192 5139 5107 5071 5010 5007 4994 4941 4833 4776 4704 4703 4702 4701 4676 4649 4580 4578 4477 4436 4390 4388 4361 4332 4280 4243 4242 4174 4076 4039 4030 4014 3993 3942 3927 3925 3898 3825 3736 3679 3646 3634 3633 3594 3527 3495 3456 3442 3397 3396 3361 3319 3315 3256 3203 3118 3074 3046 3041 3011 3004 2939 2937 2855 2610 2563 2489 2485 2322 2242 2241 2132 2131 1931 1542 1541 1534 1533 1532 1531 1497 1395 1084 1048 951 903 ... clicking on RFC number brings up the corresponding summary in the lower frame, clicking on the .txt=nnn field (in the summary) retrieves the actual RFC. the attempts by the communication division to preserve the terminal communication paradigm ... showed up in lots of ways. one of the ways was veto'ing numerous disk division's attempts to come out with advanced access products for the distributed environment (as part of stemming the flight of data out off the mainframe) communication division could escalate to corporate with claim that they had responsibility for all products that involved communication crossing the datacenter boundary (at the peak, disk division was seeing double digit per annum percentage flight of data out off the mainframe). another trivial example were PC lan cards. high-powered workstations represented the quickly evolving direction for PCs ... requiring increasingly powerful networking. the AWD division had done the PC/RT and had produced their own ISA 4mbit T/R LAN card. When it came time for the rs/6000, they thought that they would do their own microchannel 16mbit T/R LAN card ... but they were wrong ... they were forced into using lots of the PS2 microchannel adapter cards. It turns out that the PS2 microchannel 16mbit T/R LAN card had design point of terminal emulation with 300 (or more) stations all sharing the same 16mbit T/R bandwidth. As a result, the PS2 microchannel 16mbit T/R LAN card had lower per card thruput than the PC/RT ISA 4mbit T/R LAN card (significantly restricting its ability to participate in high-powered networking environments ... PC/RT ISA 4mbit T/R card had higher thruput than the PS2 microchannel 16mbit T/R card). references to old 3tier presentation from the late 80s (attempting to give the terminal communication paradigm as much benefit as possible in the comparison): http://www.garlic.com/~lynn/96.html#17 http://www.garlic.com/~lynn/2002q.html#40 other posts mentioning 3-tier architecture http://www.garlic.com/~lynn/subnetwork.html#3tier misc. past posts discussing many of the issues and downside related to the attempts to preserve the terminal communication paradigm. http://www.garlic.com/~lynn/subnetwork.html#terminal -- 40+yrs virtualization experience (since Jan68), online at home since Mar1970 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EREP query
On Tue, 11 Aug 2009 14:51:52 +0100, Beesley, Paul paul.bees...@atosorigin.com wrote: We run a job every day at 06:30 to clear LOGREC and write to a history file ( JCL below ). Every day without fail the following message is issued while the job is running. *IFB081I LOGREC DATA SET IS FULL,06.30.58, DSN=SYS1.FIF2.LOGREC When I check LOGREC, its full of MDR records for every DASD volume in the known universe as at 06:30. Why is this happening and how can I stop it ? There's not much point clearing logrec only for it to fill up again with useless MDR records. This caused us to have no valid logrec records for IBM the other day after a system outage ... snip 1) Have you looked into what those MDR records are? 2) How big is your LOGREC data set and why not just make it large enough to handle whatever the normal activity would be PLUS a large fudge factor for abnormal activity? 3) Have you considered using the system logger for LOGREC since you wouldn't run into a full condition for some unexpected abnormal activity (unless your DASD pool fills up)? -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - ZFUS G-ITO mailto:mark.zel...@zurichna.com z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IBM-MAIN Digest - 8 Aug 2009 to 9 Aug 2009 (#2009-221)
-Original Message- From: IBM Mainframe Discussion List On Behalf Of Petretti, Martha How do I post a question? You just did. -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Clist Quest
That makes so much sense. Who wooda thunk? Thanks to all that responded. Ray Baraniecki Morgan Stanley Smith Barney 18th Floor 1 New York Plaza New York, NY 10004 Office - 212-276-5641 Cell - 917-597-5692 ray.baranie...@morganstanley.com BE CARBON CONSCIOUS. PLEASE CONSIDER OUR ENVIRONMENT BEFORE PRINTING THIS E-MAIL. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of McKown, John Sent: Tuesday, August 11, 2009 10:02 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Clist Quest -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Baraniecki, Ray Sent: Tuesday, August 11, 2009 8:53 AM To: IBM-MAIN@bama.ua.edu Subject: Clist Quest I ran across the following IF statement in a Clist that I am working on. The statement itself is understandable, it's the period usage that I don't understand. Can anyone shed some light on this? IF .ITEMS .5 THEN DO Thanks, Ray Baraniecki suppose the line were: IF ITEMS 5 THEN DO What if ITEMS is null ('')? Without the periods, the CLIST intepreter would see the line: IF 5 THEN DO which it could not handle (syntax error). So the periods are there just to make the line syntactically correct in the case where ITEMS is null. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- Important Notice to Recipients: It is important that you do not use e-mail to request, authorize or effect the purchase or sale of any security or commodity, to send fund transfer instructions, or to effect any other transactions. Any such request, orders, or instructions that you send will not be accepted and will not be processed by Morgan Stanley Smith Barney. The Global Wealth Management Group of Morgan Stanley Co. Incorporated and the Smith Barney division of Citigroup Global Markets Inc. have combined into Morgan Stanley Smith Barney LLC, a new investment adviser and broker-dealer registered with the Securities and Exchange Commission. The sender of this email is an employee of Morgan Stanley Smith Barney. Important disclosures on Morgan Stanley and Citi Investment Research Analysis research reports may relate in part to the separate businesses of Citigroup Global Markets Inc. and Morgan Stanley that now form Morgan Stanley Smith Barney LLC. To view these important research disclosures, go to http://www.morganstanley.com/researchdisclosures and https://www.citigroupgeo.com/geopublic/Disclosures/index_a.html. If received in error, please destroy and notify sender. Sender does not intend to waive confidentiality or privilege. Use of this email is prohibited when received in error. We may monitor and store emails to the extent permitted by applicable law. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Clist Quest
Does this technique work the same in Rexx? Thanks, Ray Baraniecki Morgan Stanley Smith Barney 18th Floor 1 New York Plaza New York, NY 10004 Office - 212-276-5641 Cell - 917-597-5692 ray.baranie...@morganstanley.com BE CARBON CONSCIOUS. PLEASE CONSIDER OUR ENVIRONMENT BEFORE PRINTING THIS E-MAIL. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of McKown, John Sent: Tuesday, August 11, 2009 10:02 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Clist Quest -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Baraniecki, Ray Sent: Tuesday, August 11, 2009 8:53 AM To: IBM-MAIN@bama.ua.edu Subject: Clist Quest I ran across the following IF statement in a Clist that I am working on. The statement itself is understandable, it's the period usage that I don't understand. Can anyone shed some light on this? IF .ITEMS .5 THEN DO Thanks, Ray Baraniecki suppose the line were: IF ITEMS 5 THEN DO What if ITEMS is null ('')? Without the periods, the CLIST intepreter would see the line: IF 5 THEN DO which it could not handle (syntax error). So the periods are there just to make the line syntactically correct in the case where ITEMS is null. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- Important Notice to Recipients: It is important that you do not use e-mail to request, authorize or effect the purchase or sale of any security or commodity, to send fund transfer instructions, or to effect any other transactions. Any such request, orders, or instructions that you send will not be accepted and will not be processed by Morgan Stanley Smith Barney. The Global Wealth Management Group of Morgan Stanley Co. Incorporated and the Smith Barney division of Citigroup Global Markets Inc. have combined into Morgan Stanley Smith Barney LLC, a new investment adviser and broker-dealer registered with the Securities and Exchange Commission. The sender of this email is an employee of Morgan Stanley Smith Barney. Important disclosures on Morgan Stanley and Citi Investment Research Analysis research reports may relate in part to the separate businesses of Citigroup Global Markets Inc. and Morgan Stanley that now form Morgan Stanley Smith Barney LLC. To view these important research disclosures, go to http://www.morganstanley.com/researchdisclosures and https://www.citigroupgeo.com/geopublic/Disclosures/index_a.html. If received in error, please destroy and notify sender. Sender does not intend to waive confidentiality or privilege. Use of this email is prohibited when received in error. We may monitor and store emails to the extent permitted by applicable law. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
IRFXUSER
I was recently tasked to install an external function package for MQ which givies users REXX functionality. Since this is a supportpac, docs are a bit sparce on details. The functions came bundled in a module called IRFXUSER. My interpretation of the rexx manual has indicated that when you use IRFXUSER, which is a default entry already defined in the function table, then you don't have to modify the function package table or link or modify the default module. That's cool, and exactly what I want, but I can't seem to figure out how to get my copy recognized. There is an IRXFUSER is in sys1.linklib, just as expected. So far, I've tried adding my own lib to the linklist dynamic steplib product LIBDEF to ISPLLIB All result in function not found. It works in batch(IKJEFT01) with a steplib, so I know I don't have something right, but I can't find instructions on how to get my IRFXUSER module included in the rexx search scheme. Is it possible to leave the entry alone in sys1.linklib and have my functions found in a different lib? Anyone familiar with doing this or can point me to a specific manual? I can't seem to find much on the rexx reference, and irfxuser isn't mentioned anywhere that I can find beyond the rexx bookshelf. thanks, tom -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Clist Quest
Ray, In REXX unless you set the var to a null value - the value will be the name of the var. In your case itemwould display as ITEM in rexx until it had a value assigned to it. So not quite the same in REXX as CLIST. To demonstrate /* Rexx - Display contents of a var */ trace ?i item1 = ' ' Say Item contains item Say Set Item: item1 value When it is executed it shows: 6 *-* item1 = ' ' L +++ Interactive trace. TRACE OFF to end debug, ENTER to continue. +++ 8 *-* Say Item contains item L Item contains L ITEM O Item contains ITEM Item contains ITEM 9 *-* Say Set Item: item1 value L Set Item: V O Set Item: Lvalue O Set Item:value Set Item:value Lizette Does this technique work the same in Rexx? Thanks, Ray Baraniecki Morgan Stanley Smith Barney 18th Floor 1 New York Plaza New York, NY 10004 Office - 212-276-5641 Cell - 917-597-5692 ray.baranie...@morganstanley.com BE CARBON CONSCIOUS. PLEASE CONSIDER OUR ENVIRONMENT BEFORE PRINTING THIS E-MAIL. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of McKown, John Sent: Tuesday, August 11, 2009 10:02 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Clist Quest -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Baraniecki, Ray Sent: Tuesday, August 11, 2009 8:53 AM To: IBM-MAIN@bama.ua.edu Subject: Clist Quest I ran across the following IF statement in a Clist that I am working on. The statement itself is understandable, it's the period usage that I don't understand. Can anyone shed some light on this? IF .ITEMS .5 THEN DO Thanks, Ray Baraniecki suppose the line were: IF ITEMS 5 THEN DO What if ITEMS is null ('')? Without the periods, the CLIST intepreter would see the line: IF 5 THEN DO which it could not handle (syntax error). So the periods are there just to make the line syntactically correct in the case where ITEMS is null. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Clist Quest
On Tue, 11 Aug 2009 10:52:24 -0400, Baraniecki, Ray wrote: Does this technique work the same in Rexx? It would, but it's unnecessary; pointless; undesirable. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of McKown, John Sent: Tuesday, August 11, 2009 10:02 AM suppose the line were: IF ITEMS 5 THEN DO What if ITEMS is null ('')? Without the periods, the CLIST intepreter would see the line: IF 5 THEN DO which it could not handle (syntax error). So the periods are there just to make the line syntactically correct in the case where ITEMS is null. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Concatenations and blocksizes
---snip--- You have always been able to write a block of only one byte, or even zero bytes, onto a DASD. unsnip-- One byte, yes. But if the device reads a count field with a data length of zero, it signals a Unit Exception, meaning a EOF mark. That's what you might call a special case. :-) Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Concatenations and blocksizes
Paul Gilmartin wrote: On Mon, 10 Aug 2009 17:48:31 -0500, Richard Peurifoy wrote: Paul Gilmartin wrote: On Mon, 10 Aug 2009 16:52:59 -0500, Patrick O'Keefe wrote: I'm just puzzled that the enhancement limited itself to QSAM. No mention of BPAM. I had hoped this was an oversight in the doc, but apparently not. An assembly with: //SYSLIBDD UNIT=SYSALLDA,SPACE=(80,(1,1)), // RECFM=FB,LRECL=80,BLKSIZE=80 // DD DISP=SHR,DSN=SYS1.MACLIB Unless there is a typo, you concatenated a seq file (no directories) with the PDS. You mean I need _two_ commas, not just one? Why does OPEN let me do that, and not just ABEND? OK. I changed to: 6 //SYSLIBDD UNIT=SYSALLDA,SPACE=(80,(1,,1)), // DISP=NEW,DSN=amp;MAC, // RECFM=FB,LRECL=80,BLKSIZE=80 X/SYSLIB DD DSN=SYS1.MACLIB,DISP=SHR 7 // DD DISP=SHR,DSN=SYS1.MACLIB I needed to specify DISP and DSN to override those in the library proc. And it fails the same with: * TOP OF DATA ** ** ASMA999U Assembly terminated - SYNAD Exit taken - Permanent I/O error on SYSL ,HELLO ,C ,4140,D,SYSLIB ,UNKOWN,WRNG.LEN.RECORD,1F7100030 BOTTOM OF DATA Experimental control: if I change BLKSIZE from 80 to 32760, it assembles with no errors, and library macros are fetched from the second catenand. Interesting, I tried a temp PDS, and also failed, so I tried a permanent PDS with a small blksize and it worked ok. I then tried allocating a temp pds in a previous step and passed it. This also worked ok. I don't know why it fails if allocated in the same step. -- Richard -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Concatenations and blocksizes
snip- I thought a count of zero was prohibited in a CCW. (But there may be other ways.) unsnip- You are correct. But a DASD Format Write requires a COUNT field of 8 bytes. The count field may, in turn, have a value of zero for the data length, thus writing a EOF mark. If a Update Write doesn't have the correct size, you'll get a Unit Check or Unit Exception (I forget which) with Incorrect Length set.. Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: IRFXUSER
On Tue, 11 Aug 2009 11:08:55 -0400, Hylton Tom P tom.p.hyl...@irs.gov wrote: I was recently tasked to install an external function package for MQ which givies users REXX functionality. Since this is a supportpac, docs are a bit sparce on details. The functions came bundled in a module called IRFXUSER. My interpretation of the rexx manual has indicated that when you use IRFXUSER, which is a default entry already defined in the function table, then you don't have to modify the function package table or link or modify the default module. That's cool, and exactly what I want, but I can't seem to figure out how to get my copy recognized. There is an IRXFUSER is in sys1.linklib, just as expected. So far, I've tried adding my own lib to the linklist That would work as long as your library comes before SYS1.LINKLIB in the linklist. dynamic steplib product That would run too late, after IKJEFT01 had already found the system's IRXFUSER in SYS1.LINKLIB. I believe that REXX initialization for TSO happens before any commands are processed, so much earlier than you can invoke anything from your terminal or from a logon clist. LIBDEF to ISPLLIB That's also too late. All result in function not found. It works in batch(IKJEFT01) with a steplib, so I know I don't have something right, but I can't find instructions on how to get my IRFXUSER module included in the rexx search scheme. Is it possible to leave the entry alone in sys1.linklib and have my functions found in a different lib? Anyone familiar with doing this or can point me to a specific manual? I can't seem to find much on the rexx reference, and irfxuser isn't mentioned anywhere that I can find beyond the rexx bookshelf. You'll need a STEPLIB, or a library ahead of SYS1.LINKLIB in the linklist, I think. -- Walt -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Concatenations and blocksizes
--snip--- OTOH, if you concatenate PDSs together as PDS and then stick in a DSORG=PS I would imagine you will get a very interesting ABEND -unsnip- Depending on the DCB attributes involved, you might end up reading all the directories. The old ASMG product from the University of Waterloo used this method to load the directories of all the SYSLIB datasets, saving a lot of time and I/O during macro expansion. By so doing, it was able to use POINT, rather than BLDL/FIND to locate macros and copy code in the SYSLIB concatenation. Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Concatenations and blocksizes
My point was that one is smaller than 18, and zero is also smaller than 18. The controversy is whether or not a DASD block with a block size smaller than 18 can be written onto a DASD, not over what happens when said block is read back in. An earlier post said that a block size smaller than 18 is considered a noise record. That is true for tapes but not DASD. A unit exception, aka EOF, is not the same as a noise record. EOF is signaled on tape with a tape mark, which is written with a Write Tape Mark CCW command, not with a Write CCW with a length smaller than 18, but an EOF on DASD is signaled with a data length of zero, which is written with a WCKD or WCKD Next Track CCW command, with a byte count of at least 8, and pointing to a count field containing zero in the data field. There has never been a requirement on IBM mainframe DASD, from S/360 through z/whatever, that the data field be no smaller than 18. There is such a requirement for tape I/O. Does anyone have a copy of the 3081 Channel Characteristics manual? I have been told that this book describes a situation in which a 3380 did not work correctly with a block size smaller than 18 and want to see exactly what it says. Thanks. Bill Fairchild Software Developer Rocket Software 275 Grove Street * Newton, MA 02466-2272 * USA Tel: +1.617.614.4503 * Mobile: +1.508.341.1715 Email: bi...@mainstar.com Web: www.rocketsoftware.com -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Rick Fochtman Sent: Tuesday, August 11, 2009 10:20 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Concatenations and blocksizes ---snip--- You have always been able to write a block of only one byte, or even zero bytes, onto a DASD. unsnip-- One byte, yes. But if the device reads a count field with a data length of zero, it signals a Unit Exception, meaning a EOF mark. That's what you might call a special case. :-) Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Missing QPAM (was: Concatenations and blocksizes)
--snip- Ok. I'll buy that. But NOTE didn't return anything at all until they wrote it. So I'll regress: These smart people could also have written NOTEX or QNOTE that returned all that was required to do queued processing of the member. There must have been some reason they did not. I hope. What was that reason? unsnip-- 'Way back when I went to OS/360 school at San Jose, I was told that if you couldn't master the concepts of blocking/deblocking in BSAM, you had no business messing around with BPAM, which was designed as a add on product for BSAM. Maybe that was just instructor arrogance, but it's the only reason I was ever given. Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Concatenations and blocksizes
---snip-- I'm just puzzled that the enhancement limited itself to QSAM. No mention of BPAM. I had hoped this was an oversight in the doc, but apparently not. An assembly with: //SYSLIBDD UNIT=SYSALLDA,SPACE=(80,(1,1)), // RECFM=FB,LRECL=80,BLKSIZE=80 // DD DISP=SHR,DSN=SYS1.MACLIB Unless there is a typo, you concatenated a seq file (no directories) with the PDS. You mean I need _two_ commas, not just one? Why does OPEN let me do that, and not just ABEND? OK. I changed to: 6 //SYSLIBDD UNIT=SYSALLDA,SPACE=(80,(1,,1)), // DISP=NEW,DSN=amp;MAC, // RECFM=FB,LRECL=80,BLKSIZE=80 X/SYSLIB DD DSN=SYS1.MACLIB,DISP=SHR 7 // DD DISP=SHR,DSN=SYS1.MACLIB I needed to specify DISP and DSN to override those in the library proc. And it fails the same with: * TOP OF DATA ** ** ASMA999U Assembly terminated - SYNAD Exit taken - Permanent I/O error on SYSL ,HELLO ,C ,4140,D,SYSLIB ,UNKOWN,WRNG.LEN.RECORD,1F7100030 BOTTOM OF DATA Experimental control: if I change BLKSIZE from 80 to 32760, it assembles with no errors, and library macros are fetched from the second catenand. -unsnip In your first example, you concatenated a PDS behind a PS dataset; AFAIK, this is never allowed. In both examples, you seem to expect exactly correct records to be available. You have NO right to expect this because of your first (temporary) dataset, because there might be residual data on that track. In the second example, you've at least formatted the track withm a single directory block. But by specifying BLKSIZE=80, you've essential set the stage, by overriding what the system can do. I'd be willing to wager that if you left the BLKSIZE off that first dataset, it might also work just fine. Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: USSTAB
Martin ... but felt you should know I haven't dropped the discussion. That's good to know! It's highly unlikely someone would ... but, 'highly unlikely' is just the type of open pit someone eventually falls into. Precisely. It's because of that open pit - 'for some value of' likely see later - that I describe this as botched and you describe it as sloppy whether a technician or a suit is responsible. If the systems programmer had been obliged to indicate that he/she knew about system symbols by means of a change in the coding of the USSMSG macro before deliberately inserting system symbol matches - and checking for unwanted matches under guidance from helpful documentation, we'd not be causing a fuss. I believe the ampersand (x'50') is representative of the unprotected numeric field without the MDT and with normal intensity, not light-pen detectable. Correct. What it does by implication is establish a field in which whatever text is placed is coloured green when only the basic 3270 data stream is used[1]. I have seen system programmers deliberately colour their USS message fields without regard to whether or not the colour caused the field to become unprotected. It's 'highly unlikely' and even slightly absurd to follow this with a non- numeric string like 'SYSNAME'. (Defining a numeric input field and filling it with non-numerics). The numeric aspect would certainly be odd but, as you said above, create a trap and someone may fall into it. The text aspect is much more open. It doesn't have to be a text like SYSNAME but something which corresponds to an installation-defined system symbol. This makes the trap one which doesn't show up on day one, but could snap shut at any time after the system programmer changes system symbols. And let us not forget the possibility that an character appears in some explicit text such as a company name where blanks are left out as a matter of style or lack of 3270 space. I used a fictitious company name HAMMONDDREW in an earlier post and supposed that a systems programmer had for, perfectly good reasons, decided to create - perhaps before the upgrade to V1R8 or at some time later - a system symbol DREW. You might like to add that case to the tests in order to be clear about the nature of the open pit. Chris Mason [1] In full, IIRC Green: unprotected, normal intensity Red: unprotected, high intensity Blue: protected, normal intensity White: protected, high intensity On Tue, 11 Aug 2009 08:47:28 -0500, Martin Kline martin.kl...@yrcw.com wrote: You seem to have a sandbox available to you so I would like to suggest some more tests. Yes, but only as time permits - I am working on those tests, but felt you should know I haven't dropped the discussion. Note that there's not too much point in checking the TN3270 implementation with @-based variables since the only possibly difficult one is @HOSTNET, having only one @ character. It's highly unlikely someone would use an SBA ending with x'7C', the '@' character, and immediately follow that with the character string, '@PRT', resulting in the text '@@PRT' but, 'highly unlikely' is just the type of open pit someone eventually falls into. It's also 'highly unlikely' someone would turn off the main power to the data center, but I've seen it happen twice. Which reminds me I got something wrong regarding the MDT in a previous post. Recall that the character when used as an attribute byte implies an unprotected, input, field. I suggested it was unlikely without the MDT bit. I'm not sure most people know the difference. I believe the ampersand (x'50') is representative of the unprotected numeric field without the MDT and with normal intensity, not light-pen detectable. It's 'highly unlikely' and even slightly absurd to follow this with a non-numeric string like 'SYSNAME'. (Defining a numeric input field and filling it with non-numerics). -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EREP query
Beesley, Paul wrote: We run a job every day at 06:30 to clear LOGREC and write to a history file ( JCL below ). Every day without fail the following message is issued while the job is running. *IFB081I LOGREC DATA SET IS FULL,06.30.58, DSN=SYS1.FIF2.LOGREC When I check LOGREC, its full of MDR records for every DASD volume in the known universe as at 06:30. Why is this happening and how can I stop it ? There's not much point clearing logrec only for it to fill up again with useless MDR records. This caused us to have no valid logrec records for IBM the other day after a system outage ... //JS010 EXEC PGM=IFCEREP1,TIME=10, //PARM='LINECT=60,ACC=Y,HIST=N,ZERO=Y,SYSUM=Y' //SERLOG DD DSN=SYS1.FIF2.LOGREC,DISP=SHR //ACCDEV DD DSN=SYS3.FIF2.EREPHIST, //DISP=(NEW,CATLG,DELETE), //SPACE=(2000,(3000,3000),RLSE), //AVGREC=U, //LRECL=2000, //RECFM=VB //DIRECTWK DD UNIT=SYSALLDA,SPACE=(CYL,(5,5)) //TOURIST DD SYSOUT=* //EREPPT DD SYSOUT=* //SYSINDD DUMMY,DCB=BLKSIZE=80 IFCEREP1 downloads the MDR's at the time it runs (Z EOD also does this). I think they also get downloaded if the counters overflow. You should increase the size of you LOGREC or switch to the system logger. If your LOGREC is full, and you don't want to loose the MDR's you can run IFCOFFLD which dumps/clears LOGREC without downloading the MDR's. -- Richard -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: VTAM security issue
As a matter of courtesy I very rarely discuss off list conversations. I'm not going to do that now, but I am going to offer an observation: levels of 'security' and what, exactly, that means is often in the eye of the beholder. VTAM et al seems to become aware of and often seeks to interconnect with other networks/hosts automatically. To some, any form of intercommunication whatsoever is a security issue. I seem to recall one auditor nearly wetting his pants because he could access a logon screen of an application on a remote host. Whether or not this interaction would be considered a 'compromise' would be, in my opinion, a matter of opinion. I wonder how I can reasonably demand credentials without first providing a way to give them to me. On the other hand, simply gaining access to a network is the first step in many kinds of attack vectors. I respect the opinions of both sides. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Chris Mason Sent: Sunday, August 09, 2009 10:08 AM To: IBM-MAIN@bama.ua.edu Subject: Re: VTAM security issue JM Right now I understand there are 20+ ways which VTAM/SNA systems have been compromised. HM Please give us some details on the compromised VTAM/SNA systems. Hal Merritt - and perhaps many others including myself - are still waiting for Jim Marshall's reply. ..snip NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: VTAM security issue
I get the impression that because SNA originally described a single VTAM channel-connected to one or more communication controllers, necessarily 3705s (maximum storage up to 512K only later), to which were connected possibly multipoint SDLC lines terminated by terminals and that this did not constitute a network in the eyes of Lynn Wheeler, the existence of network in the expansion of SNA to its constituent words was an affront justifying perpetual protestations. I have even to criticise this description by mentioning that the terminals were not necessarily dumb. Initially or early in the life of SNA there was a range of programmable retail devices, a range of programmable finance industry devices and, an office device with programmable characteristics (IMMSMC) and, the leader of the pack a programmable insurance device which was considered so clever it was rebranded a general purpose programmable device, the famous - trumpets please - 3790! In case a dumb terminal was all you needed, you had a typewriter, the 3767, a display/printer clustered set, the 3270 devices of the day, and, for those who missed the famous old start-stop 1050 with its range of attachments, the 3770 range, the top of which took in the market position previously occupied by the venerable BSC 2780 and 3780. - vtam/ncp (pu5/pu4) formed part of a communication hierarchy. Is communication hierarchy supposed to be how the facilities based VTAM and NCP should have been described perhaps? networking has tended to apply to talking to other peers ... That's an opinion and one supported by the way a net is constructed. ... it was the source of my comment that only in situation where network had been co-opt to apply to communication hierarchy that it was necessary to qualify AWP39 networking architecture by peer-to-peer networking architecture. This starts to look like a confirmation of the principle here presented that only a network that looks like a net deserves so to be described. According to this principle peer-to-peer should be a redundant qualification. Thus APPN should merely be AN. However, I can detect some sniping from the wings challenging the A so we would be left with a solitary N! Well, we have a wonderful programming language simply called C proudly described by a single letter until some spoilsport started adding plus signs! Actually I worry just a little bit about LANs and equating a LAN to a network. Such a net wouldn't catch anything! You'd need to persuade the fish that there were invisible threads connecting each node to each other node in order to catch them out - or should that be catch them in! arpanet ... prior to great conversion to tcp/ip on 1jan83 ... had hosts and network nodes (IMPS). The IMPS talked to other IMPS (network nodes) ... and they talked to attached devices (which happened to be hosts, later there were also terminal IMPS). IMPS (network nodes) exchanged information about what other IMPS (network nodes) they were connected to ... so it was possible to dynamically discover network nodes and paths to network nodes and paths to connected devices/hosts. If this ARPANET (?) design as described here was patented, IBM's APPN architects would have had to/did perhaps (?) pay for these core ideas for the design of APPN. The IMPS/host configuration had some physical similarity to pu4/pu5 ... That spoils it! It looked like a dead ringer for APPN network nodes and end nodes. It had dynamic routing and probably dynamic search although that wasn't mentioned. VTAM (in a subarea SNA context) and NCP, type 5 and type 4 nodes respectively, famously had no routing flexibility. but the IMPS were full network nodes that managed the dynamic network configuration and then forwarded communication to/from destination hosts. At the time of the great change over ... there was something like 100 IMPS (network nodes) and 255 (connected) HOSTs. Perhaps that was considered to represent the limit for the architecture without introducing some corralling along the lines of the APPN topology subnet? TCP/IP has both a network layer and an internetworking layer (gateways and other conventions for supporting the internetworking of networks). Thus the network layer is for traffic between source or destination nodes and each other or gateways - normally called routers these days - and that the internetworking layer - a layer since I believe I may have misunderstood what internetworking was supposed to mean in my last post - is for traffic crossing gateways/routers. At the TCP/IP network layer there is ARP (address resolution protocol) and ARP caches (dynamic maps of IP-addresses to data link ... if using the OSI model), as well as some maintenance/control gorp ... The most likely translation being a mixture of dried fruit, etc. to maintain energy on the hoof according to a Google define:. ... with ICMP messages (redirects, not reachable, etc). These are
Re: Clist Quest
item1 = ' ' Just remember, though, the above is not setting ITEM1 to a null value -- it is setting it to a single space (blank). ITEM1 = '' sets it to a NULL - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Concatenations and blocksizes
Most likely because the BLKSIZE is in the JFCB, and so acts as an override. If the small BLKSIZE is only in the DSCB it is treated differently. I actually thought about testing this yesterday, but didn't have time. I suspected that it would work this way. Richard Peurifoy r-peuri...@neo.tamu.edu 8/11/2009 11:20 AM Interesting, I tried a temp PDS, and also failed, so I tried a permanent PDS with a small blksize and it worked ok. I then tried allocating a temp pds in a previous step and passed it. This also worked ok. I don't know why it fails if allocated in the same step. -- Richard -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains confidential and privileged information intended only for the addressee. If you are not the intended recipient, please be advised that you have received this material in error and that any forwarding, copying, printing, distribution, use or disclosure of the material is strictly prohibited. If you have received this material in error, please (i) do not read it, (ii) reply to the sender that you received the message in error, and (iii) erase or destroy the material. Emails are not secure and can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by email. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EREP query
Richard and Mark Thanks for the info and suggestions. I plan to increase LOGREC ( pity it needs an IPL, one of the few things that does so these days) - its only 59 tracks. Hadn't heard of IFCOFFLD, looks useful Regards Paul -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Richard Peurifoy Sent: 11 August 2009 16:50 To: IBM-MAIN@bama.ua.edu Subject: Re: EREP query IFCEREP1 downloads the MDR's at the time it runs (Z EOD also does this). I think they also get downloaded if the counters overflow. You should increase the size of you LOGREC or switch to the system logger. If your LOGREC is full, and you don't want to loose the MDR's you can run IFCOFFLD which dumps/clears LOGREC without downloading the MDR's. -- Richard -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html ___ Atos Origin and Atos Consulting are trading names used by the Atos Origin group. The following trading entities are registered in England and Wales: Atos Origin IT Services UK Limited (registered number 01245534) and Atos Consulting Limited (registered number 04312380). The registered office for each is at 4 Triton Square, Regents Place, London, NW1 3HG.The VAT No. for each is: GB232327983 This e-mail and the documents attached are confidential and intended solely for the addressee, and may contain confidential or privileged information. If you receive this e-mail in error, you are not authorised to copy, disclose, use or retain it. Please notify the sender immediately and delete this email from your systems. As emails may be intercepted, amended or lost, they are not secure. Atos Origin therefore can accept no liability for any errors or their content. Although Atos Origin endeavours to maintain a virus-free network, we do not warrant that this transmission is virus-free and can accept no liability for any damages resulting from any virus transmitted. The risks are deemed to be accepted by everyone who communicates with Atos Origin by email. ___ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: VTAM security issue
Hal As a matter of courtesy I very rarely discuss off list conversations. Does this mean Jim Marshall passed on the information you requested in private? Since you were asking in public, I assumed the reply would be in public. You could, after all, have asked in private. If you did receive the untested claims of compromise in private I'm glad you at least mentioned your courtesy rule. Now I can request in public and expect to be answered in public. Otherwise we must take it as evidence that the claims of compromise do nor survive the light of day - and, assuming we have exploited all the functions available with VTAM and associated products at no extra cost, those actually affected - and I am not really one - can sleep soundly. From what I can glean from your general comments, you appear to be supporting my charge that FUD was being insinuated and groundless FUD at that. Chris Mason On Tue, 11 Aug 2009 10:50:47 -0500, Hal Merritt hmerr...@jackhenry.com wrote: As a matter of courtesy I very rarely discuss off list conversations. I'm not going to do that now, but I am going to offer an observation: levels of 'security' and what, exactly, that means is often in the eye of the beholder. VTAM et al seems to become aware of and often seeks to interconnect with other networks/hosts automatically. To some, any form of intercommunication whatsoever is a security issue. I seem to recall one auditor nearly wetting his pants because he could access a logon screen of an application on a remote host. Whether or not this interaction would be considered a 'compromise' would be, in my opinion, a matter of opinion. I wonder how I can reasonably demand credentials without first providing a way to give them to me. On the other hand, simply gaining access to a network is the first step in many kinds of attack vectors. I respect the opinions of both sides. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Chris Mason Sent: Sunday, August 09, 2009 10:08 AM To: IBM-MAIN@bama.ua.edu Subject: Re: VTAM security issue JM Right now I understand there are 20+ ways which VTAM/SNA systems have been compromised. HM Please give us some details on the compromised VTAM/SNA systems. Hal Merritt - and perhaps many others including myself - are still waiting for Jim Marshall's reply. ..snip -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EREP query
Beesley, Paul wrote: Richard and Mark Thanks for the info and suggestions. I plan to increase LOGREC ( pity it needs an IPL, one of the few things that does so these days) - its only 59 tracks. Hadn't heard of IFCOFFLD, looks useful There is a SETLOGRC IGNORE command. I don't know if this would allow you to scratch and reallocate it or not. Remember to dump it before you do this if you want to preserve whats already in it. If this works then a SETLOGRC DATASET should restart it. Warning, I have never tried this. -- Richard -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EREP query
Richard Peurifoy wrote: Beesley, Paul wrote: Richard and Mark Thanks for the info and suggestions. I plan to increase LOGREC ( pity it needs an IPL, one of the few things that does so these days) - its only 59 tracks. Hadn't heard of IFCOFFLD, looks useful There is a SETLOGRC IGNORE command. I don't know if this would allow you to scratch and reallocate it or not. Remember to dump it before you do this if you want to preserve whats already in it. If this works then a SETLOGRC DATASET should restart it. Warning, I have never tried this. Also, the new one probably needs to be on the same volume. -- Richard -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Concatenations and blocksizes
Scott Rowe wrote: Most likely because the BLKSIZE is in the JFCB, and so acts as an override. If the small BLKSIZE is only in the DSCB it is treated differently. I actually thought about testing this yesterday, but didn't have time. I suspected that it would work this way. This appears to be true. If I code a blksize on the DDCARD of the passed temp dataset in the ASM step, it also fails. I guess this means the system (or assembler) will use the largest blksize at open time if there is no blksize in any JFCB's. Obviously the system can't override a blksize coded on a DCB macro. -- Richard -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SNA: conflicting opinions
re: http://www.garlic.com/~lynn/2009l.html#13 SNA: conflicting opinions http://www.garlic.com/~lynn/2009l.html#15 SNA: conflicting opinions part of the terminal communication heritage was things like LU6.2 having 160,000 instruction pathlength and 15 buffer copies thru VTAM. The execution of comparable tcp/ip function, on other platforms, had 5,000 instruction pathlength and 5 buffer copies. As networking technology advanced ... it was starting to assume more of the charactereristic of file i/o; for large block network transfers ... the processor cycles for the buffer copies could start to exceed the processor cycles executing instructions. for whatever reason, the early mainframe tcp/ip product had somewhat the communication design point ... consumed a 3090 processor, sustaining 44kbytes/sec. However, I added rfc1044 support to the base mainframe tcp/ip product ... and in some tuning tests at Cray Research between a 4341 and a Cray ... was able to get 4341 channel speed sustained thruput using only a modest amount of the 4341 (on the order of 1000 times improvement in the bytes moved per instruction executed). misc. past posts mentioning having done rfc 1044 support for the mainframe tcp/ip product (with nearly thousand-fold improvement in the implementation) http://www.garlic.com/~lynn/subnetwork.html#1044 for XTP/HSP ... misc. past posts mentioning xtp /or hsp http://www.garlic.com/~lynn/subnetwork.html#xtphsp evolving advanced networking objective was to come even closer to file i/o paradigm by not requiring any buffer copies at all ... directly getting data to/from the wire (use data-chaining, aka scatter/gather, I/O operations for header info) ... and trying to get pathlength under thousand instructions. various of the disk division advanced products (that weren't allowed to announce/ship) for the distributed environment ... attempted to have the processor handle the equivalent in aggregate network channel traffic ... as the processor was capable of handling aggregate disk channel traffic (large tens of mbytes/sec and later hundreds of mbytes/sec). -- 40+yrs virtualization experience (since Jan68), online at home since Mar1970 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
SNA addressing (was Re: VTAM security issue)
I'm not addressing this specifically to Pat since he knows it all perfectly. SNA addressing relies on two components - and it uses names not numbers. Within an enterprise, a naming authority is assigned which allocates - these days - just 8-character LU names.[1] The enterprise in turn is supposed to seek permission from a higher naming authority to provide it with a so- called network identifier (NetId) with which to qualify the names within the enterprise. IBM elected to be the higher naming authority and structured the NetId so that the first two characters indicated the country. (I believe there's some standard for this country code.) The next 6 characters are then available for the IBM entity responsible for the country to assign on request. Obviously the major enterprises can cherry-pick their codes but sequential allocation could apply at some level. In principle this offers 3 518 743 761 (39 to the power of 6)[2] NetIds within each country code - sufficient down to the level of the individual citizen even for countries such as China and India but additional country codes could be assigned if necessary. With IPv6 IP has removed the intrinsic limitations of IPv4, where the bountiful numbers (256*4 = 4 294 967 296) absolutely, that is, worldwide, are drastically reduced by having to structure the allocation of numbers in order to support IP routing - as well as assigning numbers within the range for special purposes such as broadcasting within a LAN network. Since neither the assigned IP address number nor, when used extensively, the SNA name is or could be, respectively, user-friendly, a friendly name to address/unfriendly name service is/could apply to both. Chris Mason [1] Some may argue, even using SNA official documents, that the CP name also needs to be considered. It has been a feature of my teaching of APPN that the CP is just an LU which happens to use certain restricted mode names when performing functions needed for the operation (and management) of APPN protocols. When other mode names are used, that same session end- point entity (LU/CP) can perform application duties. It's only because, alone among APPN platforms, VTAM can't actually do that - except for the APING application - that architecture had to get so convoluted regarding the CP vis- à-vis the LU. [2] 39 derives from 10 numbers, 26 alphabetic characters and the three specials, $, # and @. On Sun, 9 Aug 2009 16:42:39 -0500, Patrick O'Keefe patrick.oke...@wamu.net wrote: On Sun, 9 Aug 2009 16:03:33 -0500, Paul Gilmartin paulgboul...@aim.com wrote: On Sun, 9 Aug 2009 11:57:15 -0400, Anne Lynn Wheeler wrote: possibly SNA organization viewed it as competition (even tho SNA had nothing to do with networking). Now I'm confused. What does the initialism SNA stand for? Or, while this list is focused on initialism pedantry, is it possible that there's another SNA than the one I found at the top of a Google search? ... Well, the N is Network, not Networking, but I don't think that clarifies anything. Lynn apparently has some very specific defibition of Networking in mind. His comment may be accurate (His comments usually are.) but I'm not sure what that comment really was. SNA does not have a universal addressing scheme and IP does. Perhaps that was the point. But SNI provided that in sort of the same way that NATing allows interconnection of 2 IP networks that use private IP addresses. SNA does not provide a universal name space for resources, but neither does IP. The Domain Name space used by IP hosts is not provided by, or dependent on IP. Pat O'Keefe -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EREP query
On Tue, 11 Aug 2009 11:11:54 -0500, Richard Peurifoy r-peuri...@neo.tamu.edu wrote: There is a SETLOGRC IGNORE command. I don't know if this would allow you to scratch and reallocate it or not. It will allow you to scratch and reallocate it, but then again, you can do that without SETLOGRC IGNORE. It still won't be usable until you IPL. But SETLOGRC IGNORE should be used if the OP plan's on increasing the size now. Probably better to wait to just prior to IPL to reallocate it so nothing is lost. Remember to dump it before you do this if you want to preserve whats already in it. If this works then a SETLOGRC DATASET should restart it. It will attempt to restart recording, but will have I/O errors. So it won't work or do what you think it should. The ERDS DEB is in *MASTER*. However, the OP could switch to LOGSTREAM on the fly. Warning, I have never tried this. Regards, Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - ZFUS G-ITO mailto:mark.zel...@zurichna.com z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
[Fwd: New Books at Quilt Books USA]
-- Joel C. Ewing, Fort Smith, ARjcew...@acm.org -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: VTAM security issue
Um, I said I don't discuss off list conversations and gave one reason. Please don't infer anything further. I added that I respect the opinions, but did not say whether or not I agree with those opinions. I'm also trying to say that I, personally, cannot add much value to this topic. I'm well out of my league here. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Chris Mason Sent: Tuesday, August 11, 2009 11:12 AM To: IBM-MAIN@bama.ua.edu Subject: Re: VTAM security issue Hal As a matter of courtesy I very rarely discuss off list conversations. Does this mean Jim Marshall passed on the information you requested in private? Since you were asking in public, I assumed the reply would be in public. You could, after all, have asked in private. If you did receive the untested claims of compromise in private I'm glad you at least mentioned your courtesy rule. Now I can request in public and expect to be answered in public. Otherwise we must take it as evidence that the claims of compromise do nor survive the light of day - and, assuming we have exploited all the functions available with VTAM and associated products at no extra cost, those actually affected - and I am not really one - can sleep soundly. From what I can glean from your general comments, you appear to be supporting my charge that FUD was being insinuated and groundless FUD at that. Chris Mason On Tue, 11 Aug 2009 10:50:47 -0500, Hal Merritt hmerr...@jackhenry.com wrote: As a matter of courtesy I very rarely discuss off list conversations. I'm not going to do that now, but I am going to offer an observation: levels of 'security' and what, exactly, that means is often in the eye of the beholder. VTAM et al seems to become aware of and often seeks to interconnect with other networks/hosts automatically. To some, any form of intercommunication whatsoever is a security issue. I seem to recall one auditor nearly wetting his pants because he could access a logon screen of an application on a remote host. Whether or not this interaction would be considered a 'compromise' would be, in my opinion, a matter of opinion. I wonder how I can reasonably demand credentials without first providing a way to give them to me. On the other hand, simply gaining access to a network is the first step in many kinds of attack vectors. I respect the opinions of both sides. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Chris Mason Sent: Sunday, August 09, 2009 10:08 AM To: IBM-MAIN@bama.ua.edu Subject: Re: VTAM security issue JM Right now I understand there are 20+ ways which VTAM/SNA systems have been compromised. HM Please give us some details on the compromised VTAM/SNA systems. Hal Merritt - and perhaps many others including myself - are still waiting for Jim Marshall's reply. ..snip -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Concatenations and blocksizes
On Tue, 11 Aug 2009 11:24:25 -0500, Richard Peurifoy wrote: Scott Rowe wrote: Most likely because the BLKSIZE is in the JFCB, and so acts as an override. If the small BLKSIZE is only in the DSCB it is treated differently. I actually thought about testing this yesterday, but didn't have time. I suspected that it would work this way. This appears to be true. If I code a blksize on the DDCARD of the passed temp dataset in the ASM step, it also fails. I guess this means the system (or assembler) will use the largest blksize at open time if there is no blksize in any JFCB's. Obviously the system can't override a blksize coded on a DCB macro. Thanks. I'll try not to do that anymore. I wonder whether the behavior is properly documented? But it explains why I've experienced no BLKSIZE problems lately in concatenations, despite not being very diligent about order or overrides. BTW, I noticed post facto that in my successful test I had coded BLKSIZE=32760. That's not even a multiple of 80. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
P390/500 to give away - in Israel
It was working before I put it in storage a few years ago. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
The Shame Approach
Sometimes, the shame approach does work... ;-) +IBM -5655A2000 - 09/08/04-11:03- +IBM -5655A2000 - 09/08/04-11:04- *** Update/Next Action Insert FI1216*** Action Taken: Hello Ed, Did it work ? if so can I go ahead and close the PMR ? Thanks ! Regards, Slimane Action Plan: Awaiting customer's update... *** End Update/Next Action Format Insert *** +IBM -5655A2000 - 09/08/04-11:29- +IBM -5655A2000 - 09/08/04-11:29- +IBM -5655A2000 - 09/08/04-11:29- +IBM -5655A2000 - 09/08/04-11:29- -IL72848 -5655A2000 - 09/08/04-12:05- RESPOND ELECTRONICALLY: Yes. Specifying QLSHELF=//EOY.BKLSHELF worked. But, I still can't find where that's documented. +IBM -5655A2000 - 09/08/04-14:05- +IBM -5655A2000 - 09/08/04-14:10- *** Update/Next Action Insert FI1216*** Action Taken: I sent a note to development about documentation for UK47345. Action Plan: Awaiting development's update... *** End Update/Next Action Format Insert *** +IBM -5655A2000 - 09/08/04-14:10- +IBM -5655A2000 - 09/08/04-14:10- +IBM -5655A2000 - 09/08/04-14:24- +IBM -5655A2000 - 09/08/06-07:07- +IBM -5655A2000 - 09/08/06-07:13- *** Update/Next Action Insert FI1216*** Action Taken: Hello Ed, After consulting with development they stated the reason it is not documented is because this is just a temporary fix while they are working on the official fix which will eventually be documented when it's ready. Is it OK to close the PMR ? Thanks ! Regards, Slimane Action Plan: Awaiting development's update if I should close the PMR. *** End Update/Next Action Format Insert *** +IBM -5655A2000 - 09/08/06-07:13- +IBM -5655A2000 - 09/08/06-07:13- -IL72848 -5655A2000 - 09/08/06-09:00- RESPOND ELECTRONICALLY: Are you sure you guys work for IBM? You put out a PTF that breaks existing specifications, you have a workaround that you don't document because it's only a temporary fix, and you're ready to close this PMR and move on? At this point, the IBM I know would be adding a ++HOLD DOC or ++HOLD ACTION to the PTF or marking the fix as PE until the new fix can be delivered. +IBM -5655A2000 - 09/08/06-09:04- +IBM -5655A2000 - 09/08/06-09:07- +IBM -5655A2000 - 09/08/06-09:07- +IBM -5655A2000 - 09/08/07-08:33- =WESLEY, JON H -5655A2000 - 09/08/07-10:51- APAR PK93418 has been created. +IBM -5655A2000 - 09/08/11-06:46- -- Edward E Jaffe Phoenix Software International, Inc 5200 W Century Blvd, Suite 800 Los Angeles, CA 90045 310-338-0400 x318 edja...@phoenixsoftware.com http://www.phoenixsoftware.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Middleware Consolidation in the Market place... Who's next to FALL ?
BMC Buys MQSoftware, Bolstering Middleware Management BMC on Monday said it has bought MQSoftware, maker of middleware that hel ps companies monitor the performance of IBM's WebSphere MQ software, as well as other platforms. Terms were not disclosed. Leave a comment By Chris Kanaracus Mon, August 10, 2009 ? IDG News Service ? BMC on Monday said it has b ought MQSoftware, maker of middleware that helps companies monitor the performa nce of IBM's WebSphere MQ software, as well as other platforms. Terms were no t disclosed. BMC competes with Novell, CA, IBM and a range of smaller vendors in the market for BSM (business service management) software, which is meant to help companies manage their IT infrastructure effectively and align it in support of business processes. By purchasing MQSoftware, BMC wants a stronger play in companies that are working on SOA (service-oriented architecture) projects. Click here to find out more! WebSphere MQ is a messaging platform that allows various applications and systems to communicate with each other. It thereby plays a key role in SO A implementations, which seek to create composite applications consisting o f multiple, sometimes shared sources. MQSoftware sells products for managing WebSphere MQ implementations and analyzing the flow of transactions through the systems. The company has more than 1,000 customers, and some 92 percent of large I T organizations are using WebSphere MQ, according to a statement. While BMC's announcement emphasized MQSoftware's close alignment with WebSphere MQ, the vendor also makes other products, such as for monitorin g Tibco's Enterprise Message Service platform, which competes with WebSpher e MQ. It was not clear Monday whether BMC plans to continue supporting and sell ing MQSoftware's products in stand-alone form, or if it intends to fold the technologies into its own portfolio over time. MQSoftware's Web site indicates its portfolio will be rebranded as BMC Middleware Management. A BMC spokeswoman did not immediately respond to a request for comment. http://www.mqsoftware.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: USS misuse
On Thu, 6 Aug 2009 00:44:20 -0500, Barbara Nitz nitz-...@gmx.net wrote: What did NOT come down were the three corresponding telnet address spaces (TCPTNx they're called here). Two of them made OMVS spit out a BPX message that shutdown was aborted because TCPTNx was blocking it, but the things did not react to stop commands anymore, cancel resulted in 'use force arm', and force arm didn't work, either. A good old FORCE was necessary. The third TCPTNx stayed up through OMVS shutdown and restart, but was completely broken afterwards, resulting in an IPL. I suspect that these three TCPTNx started tasks are three separate TN3270 Telnet Servers (deamons). When first introduced, (can't recall which version of Comm Server), the installation guide specified the proper command to shut them down. By design, the standalone TN3270 Telnet Servers were to remain active when the TCPIP address space was terminated, with the expectation that TCPIP will restart shortly. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Missing QPAM (was: Concatenations and blocksizes)
On Tue, 11 Aug 2009 10:37:31 -0500, Rick Fochtman rfocht...@ync.net wrote: ... I was told that if you couldn't master the concepts of blocking/deblocking in BSAM, you had no business messing around with BPAM, which was designed as a add on product for BSAM. ... He was right, but that logic didn't prevent IBM from creating QSAM for those that couldn't master (read: had better things to do than) blocking/deblocking in BSAM. QSAM handles individual members just fine so FIND, READ, WRITE and STOW are working under the covers. Seems like that covers most of the functions. I haven't written anything using BPAM since the mid '80s so I am undoubtedly forgetting some BPAM quirks that might be tricky in a QPAM. Did BPAM have an easy way to do an update in place? If so, I could have lived without that in QPAM. I assume there must have been more significant reasons than that. Pat O'Keefe been -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: USSTAB
On Tue, 11 Aug 2009 10:47:37 -0500, Chris Mason chrisma...@belgacom.net wrote: ... I have seen system programmers deliberately colour their USS message fields without regard to whether or not the colour caused the field to become unprotected. Guilty as charged ... almost. Not exactly without regard to whether . More accurately even though. I had reason to want red (I think). I'm pretty sure I placed it after the normal input field so both the Insert Cursor order and the the HOME key positioned to the correct input field. (I have no idea if USS cares. It might process any input it finds, regardless of the field. But I didn't want to chance that not being the case.) Pat O'Keefe -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: USS misuse
On Tue, 11 Aug 2009 14:24:59 -0500, Ed Rabara edrab...@yahoo.com wrote: ... By design, the standalone TN3270 Telnet Servers were to remain active when the TCPIP address space was terminated, with the expectation that TCPIP will restart shortly. ... Ed, you made the same misinterpretation I did.Barbara's problem was with bringing OMVS down, not the TCP/IP address space. And at least one of the Tn3270 address spaces was unusable after OMVS was restarted. This was NOT a design point for the Tn3270 server. This was a bug. Pat O'Keefe -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Missing QPAM (was: Concatenations and blocksizes)
On Tue, 11 Aug 2009 14:58:18 -0500, Patrick O'Keefe wrote: On Tue, 11 Aug 2009 10:37:31 -0500, Rick Fochtman wrote: ... I was told that if you couldn't master the concepts of blocking/deblocking in BSAM, you had no business messing around with BPAM, which was designed as a add on product for BSAM. ... He was right, but that logic didn't prevent IBM from creating QSAM for those that couldn't master (read: had better things to do than) blocking/deblocking in BSAM. QSAM handles individual members just fine so FIND, READ, WRITE and STOW are working under the covers. Seems like that covers most of the functions. Yes, provided you aren't upset by the overhead of doing a DYNALLOC and an OPEN for each member. Yah, I know, there's OPEN TYPE=J. For those whose business is messing around with that. And can RYO catenation search. And the earlier suggestion of QNOTE and QPOINT (maybe QFIND?) leads me to think of PDSE. For PDSE, the argument returned by POINT and passed to NOTE is not a TTR, but the relative record number of the first record in the current block. Record oriented? Sounds real close to QSAM. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Report of NOSCRATCH GDG dsn's
On 2009-08-07 at 11:16, concerning Report of NOSCRATCH GDG dsn's, Esmie Moo es.._...@yah..ca wrote to IBM-Main: [SNIP] produce a list of GDG disk dsns that were defined with NOSCRATCH parM? [snip] I looked at DFDSS FDR (FDREPORT) [snip] FDReport : NAME : Dataset Name or VSAM Cluster Name SPLGDGB : GDG base name on two lines SGEGBASE : GDG base name (first 20 bytes only) GDGFLAGS : GDG base flags - EMPTY/NOEMPTY/SCRATCH/NOSCRATCH NVSAMATR : SMS NONVSAM Attributes - ACTGDG : active GDG generation DEFGDG : deferred GDG generation ROLGDG : rolled-out GDG generation XSELECT GDGFLAGS.EQ.NOSCRATCH REPORT SPLGDGB,NAME,GDGFLAGS,NVSAMATR PUNCH FDRLIB=delete_commands PRINT DATATYPE=CATVTOC -- signature = 6 lines follows -- Neil Duffee, Joe SysProg, U d'Ottawa, Ottawa, Ont, Canada telephone:1 613 562 5800 x4585 fax:1 613 562 5161 mailto:NDuffee of uOttawa.ca http:/ /aix1.uottawa.ca/ ~nduffee How *do* you plan for something like that? Guardian Bob, Reboot For every action, there is an equal and opposite criticism. Systems Programming: Guilty, until proven innocent John Norgauer 2004 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Java question
On 2009-08-04 at 15:41, concerning Re: Java question, John McKown jmc...@hea..mar...com wrote to IBM-Main: -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Barkow, Eileen Sent: Tuesday, August 04, 2009 2:32 PM Java in CICS [snip] restricted to using the JCICS classes [snip] not all java functions [snip] are supported. [snip] even if it is slower to run on CICS [snip] For higher volume activities, Cics TS v3 has a shared class cache concept where the results of JIT compilation are retained for subsequent tasks. Oh, multiple class caches too. Since Java runs on a separate TCB (J8?), [snip] some things [snip] not possible on the QR tcb. [snip] some nice development IDEs (Eclipse Netbeans) which run on a PC. [snip] [snip] version of the JCICS to be implemented so that testing could be done on a Windows, Linux, or MAC OS/X system. [snip] John : that's J8 tcbS. plural pooled. Java Applications in Cics (v3.2) SC34-6825-01 Debugging and application that is running in a Cics JVM: The JVM in Cics supports the Java Platform Debugger Architecture (JPDA) ... Attaching a debugger to a Cics JVM: To run a JVM in debug mode and allow a JPDA remote debugger to be attached ... - ie. debugging at the workstation via tcp/ip. Java Application Development for Cics (Feb 2009) SG24-5275-03 8.4 Interactive debugging 8.42 Debugging using Rational Developer for System Z. - instructions would/should also work for Eclipse, NetBeans, etc. -- signature = 6 lines follows -- Neil Duffee, Joe SysProg, U d'Ottawa, Ottawa, Ont, Canada telephone:1 613 562 5800 x4585 fax:1 613 562 5161 mailto:NDuffee of uOttawa.ca http:/ /aix1.uottawa.ca/ ~nduffee How *do* you plan for something like that? Guardian Bob, Reboot For every action, there is an equal and opposite criticism. Systems Programming: Guilty, until proven innocent John Norgauer 2004 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Missing QPAM (was: Concatenations and blocksizes)
--snip- ... I was told that if you couldn't master the concepts of blocking/deblocking in BSAM, you had no business messing around with BPAM, which was designed as a add on product for BSAM. ... He was right, but that logic didn't prevent IBM from creating QSAM for those that couldn't master (read: had better things to do than) blocking/deblocking in BSAM. QSAM handles individual members just fine so FIND, READ, WRITE and STOW are working under the covers. Seems like that covers most of the functions. I haven't written anything using BPAM since the mid '80s so I am undoubtedly forgetting some BPAM quirks that might be tricky in a QPAM. Did BPAM have an easy way to do an update in place? If so, I could have lived without that in QPAM. I assume there must have been more significant reasons than that. --unsnip-- BPAM does update-in-place just fine, as long as you do the proper blocking/deblocking/reblocking. I use it in my PDSUPDTE program (on the CBTTAPE site) and the old IPOUPDTE program also uses it. IEBUPDTE will do update-in-place if all you want to do is renumber one or more members. Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: $ Sysplex
On Mon, 10 Aug 2009 15:32:31 -0400, Scott Rowe scott.r...@joann.com wrote: Yes, you can do GRS-RING using XCF communications without a CF, which would be a basic Sysplex. If you had a CF you would use GRS-STAR, which would use XES, and thus be a Parallel Sysplex. Of course, I am running a Parallel Sysplex, and it still didn't cost any additional money. Mostly, GREEN $$ comes into play if you are Parallel Sysplex outside the box. You need CF links (cards, channels, cables - $), and a common time source (on z9 and up, that would be the orderable FC for STP - $$), as well as TE to configure and tune it. Even sysplex-in-a-box has a cost in terms of processor storage and CPU cycles. And basic sysplex will cost a couple of loop-back cables and some CPU. Negligble, perhaps, but TANSTAAFL. Still, Sysplex or MIM are the way to go (GRS ring oustide the Sysplex won't live much longer). Regards, Art Gutowski Ford Motor Company -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
TSSO in a sysplex
Hello, We are considering replacing Netview for simple message automation with TSSO from the CBT tape. I have it up and running successfully but I have one question. Currently we have two Netview subsystems running on two members of a sysplex, each processing messages from a subset of sysplex members. Is there a way to duplicate this setup, having TSSO process only messages from a subset of sysplex members? or alternately, be able to identify what system a message was issued from in TSSO processing? thanks Dana -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
how-to Sysplex? [was Re: DASD: to share or not to share]
We have 3 LPARs configured as monoplex. One for our Production environment, one for our Test/QA environment, and one for our Application Development environment. From this discussion, it sounds like everybody is saying even we would benefit from Sysplex. If we did do Sysplex, would we still be able to maintain that separation between the environments? How? Does anybody have a cookbook on how to go from where we are to where we should be? And how does the change affect the way we do things? i.e. what do we need to warn our customers about? I've looked at a couple of Redbooks (Merging systems into a Sysplex, etc.) and I know there's lots of others out there. Also, most of the stuff out there talks about parallel sysplex. What are the differences for a Basic Sysplex? Which parts do I do differently? And what about the non-IBM components? We run ADABAS/Natural from Software Ag. Thanks for any pointers you can provide. --Stephen Scott Rowe wrote: I think the real question here is: Why don't you have a SYSPLEX? There is little to no cost involved, and many benefits. Arthur Gutowski wrote: Still, Sysplex or MIM are the way to go (GRS ring oustide the Sysplex won't live much longer). -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: USS misuse
Thanks for the correction Patrick. I missed the other topic/chain discussion and zoned out on the OMVS shutdown and restart. I was too caught up on the Standalone TN3270 Telnet Server vis-a-vis TCPIP (stack) relationship. Went searching for your post/response to Barbara. I get it. On Tue, 11 Aug 2009 15:43:24 -0500, Patrick O'Keefe patrick.oke...@wamu.net wrote: Ed, you made the same misinterpretation I did.Barbara's problem was with bringing OMVS down, not the TCP/IP address space. And at least one of the Tn3270 address spaces was unusable after OMVS was restarted. This was NOT a design point for the Tn3270 server. This was a bug. Pat O'Keefe -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Sending z/OS Messages to external syslog server
Hi everyone, I ended up using the OPSCAWTO function is OPS. This sends an SNMP trap, which my Syslog server can read. I am using KIWI syslog server (http://www.kiwisyslog.com/) Thanks to everyone who responded. Gadi -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Lizette Koehler Sent: Tuesday, August 11, 2009 3:29 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Sending z/OS Messages to external syslog server Gadi What is an external syslog? I have not heard that expression before. Is that just a flat file? Or something else? OPS/MVS can filter and action just about anything that goes to SYSLOG. Lizette Does anyone know of a way to send messages from the z/OS log to an external syslog server. I have CA-OPS/MVS. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html לשימת לבך, בהתאם לנהלי החברה וזכויות החתימה בה, כל הצעה, התחייבות או מצג מטעם החברה, מחייבים מסמך נפרד וחתום על ידי מורשי החתימה של החברה, הנושא את לוגו החברה או שמה המודפס ובצירוף חותמת החברה. בהעדר מסמך כאמור (לרבות מסמך סרוק) המצורף להודעת דואר אלקטרוני זאת, אין לראות באמור בהודעה אלא משום טיוטה לדיון, ואין להסתמך עליה לביצוע פעולה עסקית או משפטית כלשהי. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: The Shame Approach
Ed, you're just as bad as I am! :-) And yes, sometimes it takes a sledge hammer. Best regards, Barbara -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hyper-PAVs
Anyone using Hyper PAvs with EMC DMX or know where to find information on implementing Hyper PAVs? We are currently using Dynamic PAVs on z/OS 1.9 and EMC DMX-3. I didn't think DMX-3 supported HyperPAV, or are you planning a DMX-4 migration? You may want to contact your friendly EMC technician (assuming you have one). Back when I did that (more than a year ago, we're also on DMX-3), we were told that HyperPAV would require a complete reconfiguration of the DMX box with lengthy downtime. That effectively means a total shutdown of all lpars (both MVS and VM), and the way we are configured apparently at the same time. Which no one in management will okay. Regards, Barbara -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html