Re: Userid schemes

2023-07-13 Thread Wayne Bickerdike
When I worked at IBM it was first letter of surname plus personnel number
(5 numerics).

Another site used a role based ID such as SNRDBA for Senior DBA.

On Fri, Jul 14, 2023 at 10:31 AM Bob Bridges  wrote:

> One place I worked used the employee number as proof of identify when the
> help desk proposed to help him with his password.  The employee ID was
> printed on the photo ID we carried around.  As a security jock I never
> thought much of that scheme; no better than SSN, in my opinion.
>
> (The best scheme for that, at least that I've run into so far, is the
> policy of a company I worked for a long time:  Any department that had at
> least 25 people in it was required to have someone there scoped to update
> the passwords for folks in that department.  So no need to prove my
> identity through some hackable means:  I just walked up to Anna's desk and
> say "Anna, please fix my password".  Since Anna knows me (or knows my voice
> over the phone), no issue.  I've been a fan of decentralized (but
> monitored) security ever since.)
>
> ---
> Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
>
> /* It is hard enough, even with the best will in the world, to be just.
> It is hard, under the pressure of haste, uneasiness, ill-temper,
> self-complacency, and conceit, even to continue intending justice.  Power
> corrupts; the "insolence of office" will creep in.  We see it so clearly in
> our superiors; is it unlikely that our inferiors see it in us?  How many of
> those who have been over us did not sometimes (perhaps often) need our
> forgiveness?  Be sure that we likewise need the forgiveness of those that
> are under us.  -C S Lewis, "The Psalms" */
>
> -Original Message-
> From: IBM Mainframe Discussion List  On Behalf
> Of Matt Hogstrom
> Sent: Thursday, July 13, 2023 20:18
>
> A place I worked used initials followed by a 5 digit employee ID.  xxn
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>


-- 
Wayne V. Bickerdike

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SCRT doubt

2023-07-13 Thread Al Sherkow Digest
It is computed for the same time period.

Al

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Paul Gilmartin
On Thu, 13 Jul 2023 21:56:55 -0400, David Spiegel wrote:
>
>When I worked at IBM Canada full time (1994-2002), our TSO Userids were
>XXn, where n was a person's "man number" (aka employee number).
>
No EEOC.

Five digits isn't enough.

-- 
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread David Spiegel

Hi Gil,
When I worked at IBM Canada full time (1994-2002), our TSO Userids were 
XXn, where n was a person's "man number" (aka employee number).


Regards,
David

On 2023-07-13 20:32, Paul Gilmartin wrote:

On Thu, 13 Jul 2023 20:17:38 -0400, Matt Hogstrom wrote:


A place I worked used initials followed by a 5 digit employee ID.  xxn


Many years ago someone reported here that in Canada it was illegal to
use an employee# as a UID because it's considered privileged HR information.
I'd guess the same applies to user IDs.



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Paul Gilmartin
On Thu, 13 Jul 2023 20:30:41 -0400, Bob Bridges  wrote:

>  Since Anna knows me (or knows my voice over the phone), no issue. 
>
Consider recent reports of deep fakes.

-- 
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Paul Gilmartin
On Thu, 13 Jul 2023 20:17:38 -0400, Matt Hogstrom wrote:

>A place I worked used initials followed by a 5 digit employee ID.  xxn
>
Many years ago someone reported here that in Canada it was illegal to
use an employee# as a UID because it's considered privileged HR information.
I'd guess the same applies to user IDs.

-- 
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Bob Bridges
One place I worked used the employee number as proof of identify when the help 
desk proposed to help him with his password.  The employee ID was printed on 
the photo ID we carried around.  As a security jock I never thought much of 
that scheme; no better than SSN, in my opinion.

(The best scheme for that, at least that I've run into so far, is the policy of 
a company I worked for a long time:  Any department that had at least 25 people 
in it was required to have someone there scoped to update the passwords for 
folks in that department.  So no need to prove my identity through some 
hackable means:  I just walked up to Anna's desk and say "Anna, please fix my 
password".  Since Anna knows me (or knows my voice over the phone), no issue.  
I've been a fan of decentralized (but monitored) security ever since.)

---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313

/* It is hard enough, even with the best will in the world, to be just.  It is 
hard, under the pressure of haste, uneasiness, ill-temper, self-complacency, 
and conceit, even to continue intending justice.  Power corrupts; the 
"insolence of office" will creep in.  We see it so clearly in our superiors; is 
it unlikely that our inferiors see it in us?  How many of those who have been 
over us did not sometimes (perhaps often) need our forgiveness?  Be sure that 
we likewise need the forgiveness of those that are under us.  -C S Lewis, "The 
Psalms" */

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Matt Hogstrom
Sent: Thursday, July 13, 2023 20:18

A place I worked used initials followed by a 5 digit employee ID.  xxn

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Bernd Oppolzer

In my customer's company, we had such a scheme for decades:

first letter X for external, S or L for division
next letter S or M or K ... for city (where the department is located)
then two digits department number (38, 91, 95, ...)
then three chars from the name (OPP in my case)

that made XS95OPP for me.

Easy to remember, even for the (some hundred) co-workers who knew me and 
needed to communicate with me
over internal network or (today) via e-Mail. The mainframe user name is 
an e-Mail Alias, of course.


But really bad, if someone moves to another department or city; you 
either get rid of all your RACF rights

or the userid doesn't reflect the real allocations any more.

So now for some years, we have generic userids for the new users, which 
are allocated to RACF groups.


Because I left the company some years ago and returned later, I now have 
a userid, which doesn't tell
anything; a simple 7-letter or digit sequence like CCBUG7E; this will 
stay the same, no matter if I move to
another department. But no one can remember my userid; they always have 
to look it up in a web based
application in the intranet (much more then 10.000 employees in Germany 
alone).


Kind regards

Bernd


Am 14.07.2023 um 00:39 schrieb Lennie Dymoke-Bradshaw:

I generally dislike those schemes that make use of departments or projects,
as this means a new id must be assigned when the employee moves department.
However, some may argue this has its own benefit, as it prevents inheritance
of authorities in those situations.

Lennie
Lennie Dymoke-Bradshaw
https://rsclweb.com
'Dance like no one is watching. Encrypt like everyone is.'



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Matt Hogstrom
A place I worked used initials followed by a 5 digit employee ID.  xxn


Matt Hogstrom

“It may be cognitive, but, it ain’t intuitive."
— Hogstrom



> On Jul 13, 2023, at 8:09 PM, David Spiegel 
> <0468385049d1-dmarc-requ...@listserv.ua.edu> wrote:
> 
>> "N" was for Number and "xxx" was a numeric value starting with 1 and 
>> being incremented for the next userid.  Since he was first in the shop, and 
>> he knew RACF, he set himself up as N001, I was the next person hired, 
>> and I got N002.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread David Spiegel

Hi Richard,
I worked at a place where the SysProg-in-chief was an arrogant guy from 
the Former Soviet Union.

His Userid was "A".

Regards,
David

On 2023-07-13 19:49, rpinion865 wrote:

I worked at a place where the VP didn't like using anything related to names, 
due to name changes and the such.  Rather he used Nxxx, where
"N" was for Number and "xxx" was a numeric value starting with 1 and being 
incremented for the next userid.  Since he was first in the shop, and he knew RACF, he set himself 
up as N001, I was the next person hired, and I got N002.




Sent with Proton Mail secure email.

--- Original Message ---
On Thursday, July 13th, 2023 at 5:22 PM, Phil Smith III  wrote:



I've seen various schemes used for creating up-to-eight-character userids, all 
truncated as needed, of course. These are IDs I've had, won't tell ya where 
each was (and omitting just firstname, just lastname, or intials):

1. First initial, last name, plus a number as needed: PSMITH, PSMITH1
2. Last name || first name, with number if necessary, but always including 
first initial: SMITHIIP, or SMITHIP2 if needed
3. First three of last name, first two of first name, plus a number: SMIPH03 
(I've always wondered how they'd deal with Kyle Fuchs or Tyrone Shipman)
4. First initial, last name, truncated to max of six with a two-digit number: I 
was PSMITH87; friend was TSMITH99-we never found out what the next T. Smith 
would get: would they reuse a hole, if any, or go to TSMIT100?


Anyone got any other variations? This is purely a curiosity item, no agenda.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Change how LE allocates storage (subpool,key)

2023-07-13 Thread Bernd Oppolzer
This is an example for the options for the alternate LE heap manager for 
memory checks (CEL4MCHK):


//CEEOPTS  DD *
ALL31(ON),
STACK(3M,1M,ANY,KEEP),
HEAP(4K,4K,ANY,KEEP),
STORAGE(NONE,NONE,NONE,0),
RPTSTG(ON),RPTOPTS(ON),
ENVAR("_CEE_HEAP_MANAGER=CEL4MCHK",
"_CEE_MEMCHECK_TRACE=ON",
"_CEE_MEMTRACE_DEPTH=32",
"_CEE_MEMCHECK_DEPTH=32",
"_CEE_MEMCHECK_OVERLAY=OFF",
"_CEE_MEMCHECK_OVERLAYLEN=80")

Maybe it is possible (don't know) to write a heap manager of your own 
and to specify its name here,
or: to specify the name of a modified version of the Standard LE heap 
manager (with other subpools)

or: a modified version of CEL4MCHK with traces disabled
or ???

In any case, I personally would not change the behaviour of standard LE 
in the first place.


HTH, kind regards

Bernd


Am 14.07.2023 um 01:55 schrieb Bernd Oppolzer:
If there is no explicit LE option to override the standard subpools 
(which are 1 and 2, AFAIK),
then I would try to use the LE option which allows to have an 
alternate heap handler
and use a modified version of the standard LE handler. I don't recall 
the names of the runtime options,
but I used them in the past to have LE heap checks enables; that's an 
alternate LE heap handler
which writes messages about allocated and not freed storage areas ... 
I used that when looking

for memory leaks with certain C++ applications.

If you don't know what I'm talking about, I can search my archives and 
maybe find the names
of these options and some sort of presentation (IBM's or my own) on 
the topic.


But: that's only for heap storage, not for stack. Why do you want to 
have the STACK allocated
in another subpool? Normally stack allocation is not a problem; heap 
is where the problems are.


Look here: http://bernd-oppolzer.de/stackheap.pdf

HTH, kind regards

Bernd


Am 14.07.2023 um 00:11 schrieb Binyamin Dissen:

I would like to have LE use SP=132 KEY=9 for its STACK and HEAP.

I obviously could screw with CEEINT, but I don't know if that will 
affect

other storage requests.

Is there some explicit getmain routine that I can play with?

--
Binyamin Dissen 
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Change how LE allocates storage (subpool,key)

2023-07-13 Thread Bernd Oppolzer
If there is no explicit LE option to override the standard subpools 
(which are 1 and 2, AFAIK),
then I would try to use the LE option which allows to have an alternate 
heap handler
and use a modified version of the standard LE handler. I don't recall 
the names of the runtime options,
but I used them in the past to have LE heap checks enables; that's an 
alternate LE heap handler
which writes messages about allocated and not freed storage areas ... I 
used that when looking

for memory leaks with certain C++ applications.

If you don't know what I'm talking about, I can search my archives and 
maybe find the names
of these options and some sort of presentation (IBM's or my own) on the 
topic.


But: that's only for heap storage, not for stack. Why do you want to 
have the STACK allocated
in another subpool? Normally stack allocation is not a problem; heap is 
where the problems are.


Look here: http://bernd-oppolzer.de/stackheap.pdf

HTH, kind regards

Bernd


Am 14.07.2023 um 00:11 schrieb Binyamin Dissen:

I would like to have LE use SP=132 KEY=9 for its STACK and HEAP.

I obviously could screw with CEEINT, but I don't know if that will affect
other storage requests.

Is there some explicit getmain routine that I can play with?

--
Binyamin Dissen 
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread rpinion865
I worked at a place where the VP didn't like using anything related to names, 
due to name changes and the such.  Rather he used Nxxx, where
"N" was for Number and "xxx" was a numeric value starting with 1 and being 
incremented for the next userid.  Since he was first in the shop, and he knew 
RACF, he set himself up as N001, I was the next person hired, and I got 
N002.




Sent with Proton Mail secure email.

--- Original Message ---
On Thursday, July 13th, 2023 at 5:22 PM, Phil Smith III  wrote:


> I've seen various schemes used for creating up-to-eight-character userids, 
> all truncated as needed, of course. These are IDs I've had, won't tell ya 
> where each was (and omitting just firstname, just lastname, or intials):
> 
> 1. First initial, last name, plus a number as needed: PSMITH, PSMITH1
> 2. Last name || first name, with number if necessary, but always including 
> first initial: SMITHIIP, or SMITHIP2 if needed
> 3. First three of last name, first two of first name, plus a number: SMIPH03 
> (I've always wondered how they'd deal with Kyle Fuchs or Tyrone Shipman)
> 4. First initial, last name, truncated to max of six with a two-digit number: 
> I was PSMITH87; friend was TSMITH99-we never found out what the next T. Smith 
> would get: would they reuse a hole, if any, or go to TSMIT100?
> 
> 
> Anyone got any other variations? This is purely a curiosity item, no agenda.
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Bob Bridges
On of my current clients uses your scheme #1, with the variation that
contractors and other off-site personnel start with a 'V' for "vendor".  So
"VPSMIT2" instead of "PSMITH2".

For a good many years a manufacturer I worked for used, let's see ... my ID
was TTGGRHB.  RHB are my initials, and I think the first 'T' was for on-line
TSO users; the TGG must have been a department designation.  Job printouts
came back and were laid out on a table for developers to pick up, so we all
got familiar with each other's initials; I learned to my surprise that a
much higher percentage than I would have guessed go by their middle names.

After that they came under Volvo's world-wide naming scheme; IDs, DSNs, job
and step names, everything changed.  User IDs were a letter to indicate the
corporation, then a six-digit number.  No more changing IDs when a user
moved to a new department, or got married or divorced.  I occasionally had
to log on to mainframes in Sweden to do my job, and I'm pretty sure I signed
on to the same ID there as in the US.

---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313

/* Science without religion is lame; religion without science is blind.
-Albert Einstein */

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of
Phil Smith III
Sent: Thursday, July 13, 2023 17:22

I've seen various schemes used for creating up-to-eight-character userids,
all truncated as needed, of course. These are IDs I've had, won't tell ya
where each was (and omitting just firstname, just lastname, or intials):

1.  First initial, last name, plus a number as needed: PSMITH, PSMITH1
2.  Last name || first name, with number if necessary, but always
including first initial: SMITHIIP, or SMITHIP2 if needed
3.  First three of last name, first two of first name, plus a number:
SMIPH03 (I've always wondered how they'd deal with Kyle Fuchs or Tyrone
Shipman)
4.  First initial, last name, truncated to max of six with a two-digit
number: I was PSMITH87; friend was TSMITH99-we never found out what the next
T. Smith would get: would they reuse a hole, if any, or go to TSMIT100?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Matt Hogstrom
On my systems my ID is IMAHOG.   Although, it’s really pronounced like 
Hōkstrum.  Never have trouble in Sweden with people mispronouncing my name :)


Matt Hogstrom
“It may be cognitive, but, it ain’t intuitive."
— Hogstrom



> On Jul 13, 2023, at 6:41 PM, David Spiegel 
> <0468385049d1-dmarc-requ...@listserv.ua.edu> wrote:
> 
> When I was studying CompSci at UofT, the best school in Canada (sorry Phil, 
> but, beat it the pants off of UofW in the '70s), one of our TAs (Mr. J. Hogg) 
> insisted that his surname was pronounced "Hoag" (i.e. not "Hog").
> The SysOp on the Graduate School PDP-11 gave him this userid: PIGG
> Good times.
> 
> Regards,
> David


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread David Spiegel

Hi Phil,
I worked at a multi--national food company in the early '90s. Their 
Userid scheme was first 5 letters of surname, first letter of first 
name. One guy, Mr. M. Pinchbeck became irate when people kept referring 
to him (PINCHBM) as "Pinch Bum".
I didn't get excited about mine (SPIEGED). One day, however, I was 
approached by a user who said: "Hey Ed,  do you think you can come to my 
desk and help me with TPX?"
Another guy, Mr. C. Cadore corrected people's pronunciation of his 
userid (CADOREC said as Ca-Dork) by telling them it should be said as 
Cadore-C.


When I was studying CompSci at UofT, the best school in Canada (sorry 
Phil, but, beat it the pants off of UofW in the '70s), one of our TAs 
(Mr. J. Hogg) insisted that his surname was pronounced "Hoag" (i.e. not 
"Hog").

The SysOp on the Graduate School PDP-11 gave him this userid: PIGG
Good times.

Regards,
David

On 2023-07-13 17:22, Phil Smith III wrote:

I've seen various schemes used for creating up-to-eight-character userids, all 
truncated as needed, of course. These are IDs I've had, won't tell ya where 
each was (and omitting just firstname, just lastname, or intials):

1.  First initial, last name, plus a number as needed: PSMITH, PSMITH1
2.  Last name || first name, with number if necessary, but always including 
first initial: SMITHIIP, or SMITHIP2 if needed
3.  First three of last name, first two of first name, plus a number: 
SMIPH03 (I've always wondered how they'd deal with Kyle Fuchs or Tyrone Shipman)
4.  First initial, last name, truncated to max of six with a two-digit 
number: I was PSMITH87; friend was TSMITH99-we never found out what the next T. 
Smith would get: would they reuse a hole, if any, or go to TSMIT100?


Anyone got any other variations? This is purely a curiosity item, no agenda.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Lennie Dymoke-Bradshaw
I generally dislike those schemes that make use of departments or projects,
as this means a new id must be assigned when the employee moves department. 
However, some may argue this has its own benefit, as it prevents inheritance
of authorities in those situations.

Lennie
Lennie Dymoke-Bradshaw
https://rsclweb.com 
'Dance like no one is watching. Encrypt like everyone is.'

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of
Phil Smith III
Sent: 13 July 2023 22:22
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Userid schemes

I've seen various schemes used for creating up-to-eight-character userids,
all truncated as needed, of course. These are IDs I've had, won't tell ya
where each was (and omitting just firstname, just lastname, or intials):

1.  First initial, last name, plus a number as needed: PSMITH, PSMITH1
2.  Last name || first name, with number if necessary, but always
including first initial: SMITHIIP, or SMITHIP2 if needed
3.  First three of last name, first two of first name, plus a number:
SMIPH03 (I've always wondered how they'd deal with Kyle Fuchs or Tyrone
Shipman)
4.  First initial, last name, truncated to max of six with a two-digit
number: I was PSMITH87; friend was TSMITH99-we never found out what the next
T. Smith would get: would they reuse a hole, if any, or go to TSMIT100?


Anyone got any other variations? This is purely a curiosity item, no agenda.


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Rupert Reynolds
So many.

YaaaRR1 (aaa was 3 alpha office/project)
XXnnnRR (XX for office, no idea why 3 digits)
RUPREY01
DEVRR01

Roops


On Thu, 13 Jul 2023, 22:22 Phil Smith III,  wrote:

> I've seen various schemes used for creating up-to-eight-character userids,
> all truncated as needed, of course. These are IDs I've had, won't tell ya
> where each was (and omitting just firstname, just lastname, or intials):
>
> 1.  First initial, last name, plus a number as needed: PSMITH, PSMITH1
> 2.  Last name || first name, with number if necessary, but always
> including first initial: SMITHIIP, or SMITHIP2 if needed
> 3.  First three of last name, first two of first name, plus a number:
> SMIPH03 (I've always wondered how they'd deal with Kyle Fuchs or Tyrone
> Shipman)
> 4.  First initial, last name, truncated to max of six with a two-digit
> number: I was PSMITH87; friend was TSMITH99-we never found out what the
> next T. Smith would get: would they reuse a hole, if any, or go to TSMIT100?
>
>
> Anyone got any other variations? This is purely a curiosity item, no
> agenda.
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Seymour J Metz
Ah, yes, nannyware and the evils thereof :-(


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of 
Paul Gilmartin [042bfe9c879d-dmarc-requ...@listserv.ua.edu]
Sent: Thursday, July 13, 2023 6:06 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Userid schemes

On Thu, 13 Jul 2023 17:37:16 -0400, Phil Smith III wrote:
>
>So I'd be SMTHPH? Ick. I know, I'd get used to it, but.
>
I had a manager who told a tale of having been one of four Thomas J.
Murrays employed at Kodak.  They learned to adapt by forwarding
each others' emails by topic relevance.

Remember when magazine mailing labels contained a hash of the
addressees' full name?  I had a co-worker who had majored in
English but switched to IT for economic reasons.  His first job
assignment was to write a filter to eliminate taboo combinations.

--
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Change how LE allocates storage (subpool,key)

2023-07-13 Thread Binyamin Dissen
I would like to have LE use SP=132 KEY=9 for its STACK and HEAP. 

I obviously could screw with CEEINT, but I don't know if that will affect
other storage requests.

Is there some explicit getmain routine that I can play with?

--
Binyamin Dissen 
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: [EXTERNAL] Userid schemes

2023-07-13 Thread Pommier, Rex
My current employer is 3 initials of name (X,Q,0 etc for those who have no 
middle name) followed by 4 random digits.  

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Phil Smith III
Sent: Thursday, July 13, 2023 4:22 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [EXTERNAL] Userid schemes

I've seen various schemes used for creating up-to-eight-character userids, all 
truncated as needed, of course. These are IDs I've had, won't tell ya where 
each was (and omitting just firstname, just lastname, or intials):

1.  First initial, last name, plus a number as needed: PSMITH, PSMITH1
2.  Last name || first name, with number if necessary, but always including 
first initial: SMITHIIP, or SMITHIP2 if needed
3.  First three of last name, first two of first name, plus a number: 
SMIPH03 (I've always wondered how they'd deal with Kyle Fuchs or Tyrone Shipman)
4.  First initial, last name, truncated to max of six with a two-digit 
number: I was PSMITH87; friend was TSMITH99-we never found out what the next T. 
Smith would get: would they reuse a hole, if any, or go to TSMIT100?


Anyone got any other variations? This is purely a curiosity item, no agenda.


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
The information contained in this message is confidential, protected from 
disclosure and may be legally privileged. If the reader of this message is not 
the intended recipient or an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that any disclosure, 
distribution, copying, or any action taken or action omitted in reliance on it, 
is strictly prohibited and may be unlawful. If you have received this 
communication in error, please notify us immediately by replying to this 
message and destroy the material in its entirety, whether in electronic or hard 
copy format. Thank you.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Paul Gilmartin
On Thu, 13 Jul 2023 17:37:16 -0400, Phil Smith III wrote:
>
>So I'd be SMTHPH? Ick. I know, I'd get used to it, but.
> 
I had a manager who told a tale of having been one of four Thomas J.
Murrays employed at Kodak.  They learned to adapt by forwarding
each others' emails by topic relevance.

Remember when magazine mailing labels contained a hash of the
addressees' full name?  I had a co-worker who had majored in
English but switched to IT for economic reasons.  His first job
assignment was to write a filter to eliminate taboo combinations.

-- 
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Glenn Knickerbocker
On Thu, 13 Jul 2023 17:22:12 -0400, Phil Smith III  wrote:
>I've seen various schemes used for creating up-to-eight-character userids, all 
>truncated as needed, of course.
...
>Anyone got any other variations? This is purely a curiosity item, no agenda.

Standard at IBM Poughkeepsie when I started here in 1984 was department number 
plus initials, no choice offered to most of us.  I was A17GSK.  Much later I 
inherited what must originally have been a second ID from a coworker and 
eventually become his primary, H37PFH1.

In between, when my organization moved "home" to Fishkill, our clunky POK 
userids went with us to a new Fishkill system.  It was a luxury when I moved 
into VM support to be offered the chance to choose my own ID (just because I 
was new on the system, not as a support privilege).  There were no name 
requirements at all, plenty of people using nicknames, and I briefly considered 
NOTR but decided keeping my initials would make searches easier and went with 
GSKNICK.  We would have run into conflicts with the POK standard in that 
department, because we had two John F. P.'s.

¬R

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Paul Gilmartin
On Thu, 13 Jul 2023 17:22:12 -0400, Phil Smith III wrote:

>I've seen various schemes used for creating up-to-eight-character userids, all 
>truncated as needed, of course. These are IDs I've had, won't tell ya where 
>each was (and omitting just firstname, just lastname, or intials):
>
It was egregious underreaching when IBM increased the permitted length
of TSO IDs from 7 to 8.  They should have gone to something more
characteristic of extant systems, probably several dozen, using 
USERIDALIASTABLE if needed to perform the mapping.


>Anyone got any other variations? This is purely a curiosity item, no agenda.
>
I once worked for an organization that used last name, first initial, middle
initial.  After searching phone directories, I wondered whether Cheng K. Fu
of San Diego, CA would ever apply for employment there.

(They were inflexible.  A co-worker was required to change her user ID
because of marriage.)

-- 
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Phil Smith III
Jay Maynard wrote:
>The one I use was formed by taking the first four non-vowels of the last
>name and then the first and second initials.

So I'd be SMTHPH? Ick. I know, I'd get used to it, but.

 

That SMIPH03 really was my ID at CA after Sterling bought them. I didn't mind, 
the 03 was perfect! Highest number we had was BERMA16, which I assume got run 
up by all the Mark and Marie Bergmanns and Bergdorfs and the like out there on 
Lon Guyland.

 

Ain't no perfect scheme, of course. We have someone here whose name is quite 
uncommon-but there's another one of him in the company, so he's got a 2 in his 
ID (yeah, I guess they go right to 2, so my PSMITH1 example was bogus, or at 
least would be bogus here; of course if they were C programmers, the one after 
PSMITH would be PSMITH0).


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Userid schemes

2023-07-13 Thread Jay Maynard
The one I use was formed by taking the first four non-vowels of the last
name and then the first and second initials.

And, of course, the usual collection of department code plus sequential
number (T40TS01), or installation code plus sequential number (YHX0382), or
group code plus initials (S0JM)...

On Thu, Jul 13, 2023 at 4:22 PM Phil Smith III  wrote:

> I've seen various schemes used for creating up-to-eight-character userids,
> all truncated as needed, of course. These are IDs I've had, won't tell ya
> where each was (and omitting just firstname, just lastname, or intials):
>
> 1.  First initial, last name, plus a number as needed: PSMITH, PSMITH1
> 2.  Last name || first name, with number if necessary, but always
> including first initial: SMITHIIP, or SMITHIP2 if needed
> 3.  First three of last name, first two of first name, plus a number:
> SMIPH03 (I've always wondered how they'd deal with Kyle Fuchs or Tyrone
> Shipman)
> 4.  First initial, last name, truncated to max of six with a two-digit
> number: I was PSMITH87; friend was TSMITH99-we never found out what the
> next T. Smith would get: would they reuse a hole, if any, or go to TSMIT100?
>
>
> Anyone got any other variations? This is purely a curiosity item, no
> agenda.
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>


-- 
Jay Maynard

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Userid schemes

2023-07-13 Thread Phil Smith III
I've seen various schemes used for creating up-to-eight-character userids, all 
truncated as needed, of course. These are IDs I've had, won't tell ya where 
each was (and omitting just firstname, just lastname, or intials):

1.  First initial, last name, plus a number as needed: PSMITH, PSMITH1
2.  Last name || first name, with number if necessary, but always including 
first initial: SMITHIIP, or SMITHIP2 if needed
3.  First three of last name, first two of first name, plus a number: 
SMIPH03 (I've always wondered how they'd deal with Kyle Fuchs or Tyrone Shipman)
4.  First initial, last name, truncated to max of six with a two-digit 
number: I was PSMITH87; friend was TSMITH99-we never found out what the next T. 
Smith would get: would they reuse a hole, if any, or go to TSMIT100?


Anyone got any other variations? This is purely a curiosity item, no agenda.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: OSA-ICC question

2023-07-13 Thread Tom Longfellow
I was trying to get the provenance of the word 'access' in this case.

Based upon many questions over the  years from auditors and management who do 
not understand what 'access' means, they assign their own meaning and infer 
capabilities that 'access' provides them.

Many times I have faced 'findings' that called the login prompt an access that 
places the crown jewels at risk.Again, with standard practices, no data or 
applications are at risk. I had to defend my right ask for Userid: much 
less  a password or any other authentication information.

I remain curious about 'who' is questioning the nature of OSA-ICC access.
Are these the same people who decided to outsource to someone that suddenly 
they do not fully trust?
I am also curious about 'Why' they are asking, and 'What' answers would cause 
them to have changes made.

Surprising attitude changes happen when you ask these questions and find out 
the underlying assumptions that led them to ask the question.
Find the assumed 'givens' and the world looks different.

Reporter:  "Given that we hate you and distrust anything you say,   what are 
you going to do to solve homelessness?"   
Reporter:  "When did you stop beating your wife?"   Assumes facts not in 
evidence. 

Assumptions Kill!!!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


SCRT doubt

2023-07-13 Thread Ituriel do Neto
Hi all,

I have a silly doubt about SCRT and would like your expertise.
Is field "Machine MSU Consumed" measured using the same period of
"Machine Peak Utilization", from 2nd day to 1st day of next month, or is this 
computed
from first to last day of the month ?

Thanks in advance

Best Regards

Ituriel do Nascimento Neto
z/OS System Programmer

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Where does the IHASLMSG mapping macro live?

2023-07-13 Thread Burrell, Todd
These 2 links give a little more info:

https://www.ibm.com/docs/en/zos/2.4.0?topic=information-ihaslmsg-heading

https://www.ibm.com/docs/en/zos/2.4.0?topic=information-ihaslmsg-mapping

Thanks

Todd Burrell | Sr. IT Systems Engineer | Mainframe

todd.burr...@bcbsfl.com
M 404.723.2017
I work remotely.  Please provide a dial-in number for all meetings.



-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Seymour J Metz
Sent: Thursday, July 13, 2023 10:59 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Where does the IHASLMSG mapping macro live?

Did you search your target zone?


From: IBM Mainframe Discussion List  on behalf of 
Mike Shaw 
Sent: Thursday, July 13, 2023 10:55 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Where does the IHASLMSG mapping macro live?

Listers,

The doc for the SLIP command's MSGID= operand includes this text describing the 
register contents when a SLIP trap that uses MSGID= is invoked:

Register 2 - contains the address of the SLIP message data area, found in 
mapping macro IHASLMSG.

I can't find the IHASLMSG mapping macro anywhere on our z/OS V2R4 system. I 
have searched all SYS1 data sets.

Does anyone know where that macro lives?

Mike Shaw
MVS/QuickRef Support Group
Chicago-Soft, Ltd.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN
We comply with applicable Federal civil rights laws and do not discriminate.

Visit floridablue.com/ndnotice  to view our 
Non-Discrimination policy and find information on our free language assistance 
services.

 

Florida Blue is a trade name of Blue Cross and Blue Shield of Florida, Inc.  
Blue Cross and Blue Shield of Florida, Inc., and its subsidiary and affiliate 
companies are not responsible for errors or omissions in this e-mail message. 
Any personal comments made in this e-mail do not reflect the views of Blue 
Cross and Blue Shield of Florida, Inc.  The information contained in this 
document may be confidential and intended solely for the use of the individual 
or entity to whom it is addressed.  This document may contain material that is 
privileged or protected from disclosure under applicable law.  If you are not 
the intended recipient or the individual responsible for delivering to the 
intended recipient, please (1) be advised that any use, dissemination, 
forwarding, or copying of this document IS STRICTLY PROHIBITED; and (2) notify 
sender immediately by telephone and destroy the document. THANK YOU.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: DFSMS Advanced Customization Guide

2023-07-13 Thread Glenn Wilcock
Hi Bill, this is a licensed manual.  Please direct questions to its owner, 
Andrew Wilt.  anw...@us.ibm.com  Thx.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: DFSORT - adding up on a field

2023-07-13 Thread Sri h Kolusu
Jack,

If your intention is to count the number of Storage group and DASD Model, then 
you can init with a counter of 1 and then sum it up.

Here are the updated control cards.  I added a new symbol  TMP-STGCNTR and 
initialized it with 1 using INREC and then sum that field.


// DD *
TMP-DCVVLCAP,*,8,BI
TMP-DCVVLCAP1,=,4,BI
TMP-DCVVLCAP2,*,4,BI
TMP-DCVALLOC,*,8,BI
TMP-DCVALLOC1,=,4,BI
TMP-DCVALLOC2,*,4,BI
TMP-STGCNTR,*,2,BI
/*
//SYSINDD  *
  OPTION VLSHRT,VLSCMP,DYNALLOC=(,4)
  INCLUDE COND=(DCURCTYP,EQ,DCUVULUT)
*
  INREC OVERLAY=(TMP-DCVVLCAP:8Z,
 TMP-DCVVLCAP2:DCVVLCAP,  * DASD CAPACITY
 TMP-DCVALLOC:8Z,
 TMP-DCVALLOC2:DCVALLOC,
 TMP-STGCNTR:+1,BI,LENGTH=2)
*
  SORT FIELDS=(DCVSGTCL,A,DCVVLCAP,D)   * SORT BY SRGRP NAME
*
  SUM FIELDS=(TMP-DCVVLCAP,* SUM DASD CAPACITY
  TMP-DCVALLOC,* SUM DASD ALLOCATED SPACE
  TMP-STGCNTR) * SUM DASD MODEL COUNT
*
  OUTFIL FNAMES=SORT01,
 BUILD=(1,4,
   DCVSGTCL,
   CHANGE=(30,C'',C'NON SMS'),
   NOMATCH=(DCVSGTCL),
   X,
   SEQNUM,4,ZD,START=1,INCR=1,RESTART=(DCVSGTCL),
   X,
   TMP-STGCNTR,M10,LENGTH=5,
   X,
   DCVVLCAP,
   CHANGE=(7,X'000E18B9',C'3390-01',
 X'002A4A2C',C'3390-03',
 X'007EDE85',C'3390-09',
 X'019EEB0F',C'3390-27',
 X'033DD61F',C'3390-54'),
   NOMATCH=(C'NMODEL'),
   X,
   TMP-DCVVLCAP,EDIT=(III.III.III.IIT),
   X,
   TMP-DCVALLOC,EDIT=(III.III.III.IIT))
/*


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Where does the IHASLMSG mapping macro live?

2023-07-13 Thread Seymour J Metz
That gives the content of the macro, but it doesn't say what library contains 
it.


From: IBM Mainframe Discussion List  on behalf of 
David Spiegel <0468385049d1-dmarc-requ...@listserv.ua.edu>
Sent: Thursday, July 13, 2023 11:07 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Where does the IHASLMSG mapping macro live?

Hi Mike,
Please see:
IHASLMSG mapping - IBM Documentation


Regards,
David

On 2023-07-13 10:55, Mike Shaw wrote:
> Listers,
>
> The doc for the SLIP command's MSGID= operand includes this text describing
> the register contents when a SLIP trap that uses MSGID= is invoked:
>
> Register 2 - contains the address of the SLIP message data area, found in
> mapping macro IHASLMSG.
>
> I can't find the IHASLMSG mapping macro anywhere on our z/OS V2R4 system. I
> have searched all SYS1 data sets.
>
> Does anyone know where that macro lives?
>
> Mike Shaw
> MVS/QuickRef Support Group
> Chicago-Soft, Ltd.
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email tolists...@listserv.ua.edu  with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


DFSORT - adding up on a field

2023-07-13 Thread Jack Zukt
Hi,

I am processing DCOLLECT volume records in order to get the total space
allocated by Storage group and DASD model.

What I am trying to achieve is this:

SCPHSMLG   0001 0002 3390-27  27.192.079
111.778
SCPHSMLG   0002 0001 3390-09  41.572.505
 11.263.632
SCPHSMLG   0003 0001 3390-03   5.543.000
3.247.112

in which the first  numeric column is to be the total number of DASD on the
Storage Group and the second numeric column is to be the total number of
DASD of that model on that Storage Group.

The SORT Control Fields and SYMNAMES that I used to get that result is:

//SYMNAMES DD  DISP=SHR,DSN=&SORTINPT(HEADER)
// DD  DISP=SHR,DSN=&SORTINPT(TYPED)
// DD  DISP=SHR,DSN=&SORTINPT(TYPEV)
// DD  *
TMP-DCVVLCAP,*,8,BI
TMP-DCVVLCAP1,=,4,BI
TMP-DCVVLCAP2,*,4,BI
TMP-DCVALLOC,*,8,BI
TMP-DCVALLOC1,=,4,BI
TMP-DCVALLOC2,*,4,BI
/*
//SYSINDD  *
  OPTION VLSHRT,VLSCMP,DYNALLOC=(,4)
  INCLUDE COND=(DCURCTYP,EQ,DCUVULUT)
*
  INREC OVERLAY=(TMP-DCVVLCAP:8Z,
 TMP-DCVVLCAP2:DCVVLCAP,  * DASD CAPACITY
 TMP-DCVALLOC:8Z,
 TMP-DCVALLOC2:DCVALLOC)  * DASD ALLOCATED SPACE
*
  SORT FIELDS=(DCVSGTCL,A,DCVVLCAP,D)   * SORT BY SRGRP NAME
*
  SUM FIELDS=(TMP-DCVVLCAP,* SUM DASD CAPACITY
  TMP-DCVALLOC)* SUM DASD ALLOCATED SPACE
*
  OUTFIL FNAMES=SORT01,
 BUILD=(1,4,
   DCVSGTCL,
   CHANGE=(30,C'',C'NON SMS'),
   NOMATCH=(DCVSGTCL),
   X,
   SEQNUM,4,ZD,START=1,INCR=1,RESTART=(DCVSGTCL),
   X,
   SEQNUM,4,ZD,START=1,INCR=1,RESTART=(DCVVLCAP),
   X,
   DCVVLCAP,
   CHANGE=(7,X'000E18B9',C'3390-01',
 X'002A4A2C',C'3390-03',
 X'007EDE85',C'3390-09',
 X'019EEB0F',C'3390-27',
 X'033DD61F',C'3390-54'),
   NOMATCH=(C'NMODEL'),
   X,
   TMP-DCVVLCAP,EDIT=(III.III.III.IIT),
   X,
   TMP-DCVALLOC,EDIT=(III.III.III.IIT))
/*
//*

So, I know that SEQNUM will not do the trick. I used it just to get the
intended layout.
I am pretty sure that there will be a SORT operand to get the intended
result but I am having some trouble finding it on the manual.
You help will be, as always, much appreciated

Regards
Jack

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Where does the IHASLMSG mapping macro live?

2023-07-13 Thread Mike Shaw
Thanks David/Schmuel. I suppose the macro is not distributed but since it's
in data areas, that's good enough.

Mike Shaw
MVS/QuickRef Support Group
Chicago-Soft, Ltd.


On Thu, Jul 13, 2023 at 11:07 AM David Spiegel <
0468385049d1-dmarc-requ...@listserv.ua.edu> wrote:

> Hi Mike,
> Please see:
> IHASLMSG mapping - IBM Documentation
> 
>
> Regards,
> David
>
> On 2023-07-13 10:55, Mike Shaw wrote:
> > Listers,
> >
> > The doc for the SLIP command's MSGID= operand includes this text
> describing
> > the register contents when a SLIP trap that uses MSGID= is invoked:
> >
> > Register 2 - contains the address of the SLIP message data area, found in
> > mapping macro IHASLMSG.
> >
> > I can't find the IHASLMSG mapping macro anywhere on our z/OS V2R4
> system. I
> > have searched all SYS1 data sets.
> >
> > Does anyone know where that macro lives?
> >
> > Mike Shaw
> > MVS/QuickRef Support Group
> > Chicago-Soft, Ltd.
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email tolists...@listserv.ua.edu  with the message: INFO IBM-MAIN
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Where does the IHASLMSG mapping macro live?

2023-07-13 Thread David Spiegel

Hi Mike,
Please see:
IHASLMSG mapping - IBM Documentation 



Regards,
David

On 2023-07-13 10:55, Mike Shaw wrote:

Listers,

The doc for the SLIP command's MSGID= operand includes this text describing
the register contents when a SLIP trap that uses MSGID= is invoked:

Register 2 - contains the address of the SLIP message data area, found in
mapping macro IHASLMSG.

I can't find the IHASLMSG mapping macro anywhere on our z/OS V2R4 system. I
have searched all SYS1 data sets.

Does anyone know where that macro lives?

Mike Shaw
MVS/QuickRef Support Group
Chicago-Soft, Ltd.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email tolists...@listserv.ua.edu  with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Where does the IHASLMSG mapping macro live?

2023-07-13 Thread Seymour J Metz
Did you search your target zone?


From: IBM Mainframe Discussion List  on behalf of 
Mike Shaw 
Sent: Thursday, July 13, 2023 10:55 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Where does the IHASLMSG mapping macro live?

Listers,

The doc for the SLIP command's MSGID= operand includes this text describing
the register contents when a SLIP trap that uses MSGID= is invoked:

Register 2 - contains the address of the SLIP message data area, found in
mapping macro IHASLMSG.

I can't find the IHASLMSG mapping macro anywhere on our z/OS V2R4 system. I
have searched all SYS1 data sets.

Does anyone know where that macro lives?

Mike Shaw
MVS/QuickRef Support Group
Chicago-Soft, Ltd.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Where does the IHASLMSG mapping macro live?

2023-07-13 Thread Mike Shaw
Listers,

The doc for the SLIP command's MSGID= operand includes this text describing
the register contents when a SLIP trap that uses MSGID= is invoked:

Register 2 - contains the address of the SLIP message data area, found in
mapping macro IHASLMSG.

I can't find the IHASLMSG mapping macro anywhere on our z/OS V2R4 system. I
have searched all SYS1 data sets.

Does anyone know where that macro lives?

Mike Shaw
MVS/QuickRef Support Group
Chicago-Soft, Ltd.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: [EXT] Re: Invoke Java from Assembler

2023-07-13 Thread Kirk Wolf
Using the JNI interface, you can create the JVM once and then make as many 
method invocations as you like with it.   There isn't a requirement to call 
CEEPIPI if you are doing this from C, since your LE Enclave will already be 
there.


Kirk Wolf
Dovetailed Technologies
https://coztoolkit.com

On Thu, Jul 13, 2023, at 8:06 AM, Crawford Robert C (Contractor) wrote:
> Denis,
> 
> Thank you for the detailed answer.  I'll start looking into your suggestions.
> 
> I may be misunderstanding your question, but we would like a persistent JVM 
> so the assembler code can call Java classes as subroutines.  Creating and 
> terminating a JVM for each call would be prohibitively expensive.
> 
> Robert Crawford
> Abstract Evolutions LLC
> (210) 913-3822
> 
> -Original Message-
> From: IBM Mainframe Discussion List  On Behalf Of 
> Denis
> Sent: Wednesday, July 12, 2023 8:30 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: [EXT] Re: Invoke Java from Assembler
> 
> Hi Robert,
> 
> IMS uses the CEEPIPI approach to make the JVM persistent, but thats actually 
> only needed if multiple modules are serially executed and (speaking with 
> COBOL) end with a GOBACK. The GOBACK of the first module called would 
> terminate the LE enclave (and as such the JVM) so CEEPIPI is used to allow 
> the next program to work the same way without tiering down the JVM.
> The COBOL (and C JNI) work like this, you start a program e.g. with JCL 
> PGM=PROG1. Enterprise COBOL initializes the JVM (CreateJavaVM and 
> AttachCurrentThread JNI calls under the covers if I remember correctly, in C 
> and e.g. PL/I you do that by yourself and the environment for the JVM is 
> pointed to by _CEE_ENVFILE) and with that JVM pointer you can do any number 
> of JNI calls (e.g. call Java methods) and after each call the calling program 
> is returned control. The JNIEnvPtr will be valid as long as the JVM or the LE 
> enclave stay up.You can do the same thing in assembler, but you need an LE 
> enclave with POSIX(ON) and XPLINK(ON) since the JVM on z/OS is written in C 
> and requires those settings (in addition that up to Java 8 the 31bit version 
> of Java needs to be used). But if the inital assembler uses CEEENTRY and 
> CEETERM it will be quite easy to achieve, because it would create the LE 
> enclave and remain until the initial assembler ends. From that first module 
> you can call any non LE assembler as you like.The JVM can be ended by using 
> JNI call DestroyJavaVM to make sure any unfinished work on the Java side is 
> ended (as opposed to just end the first module and terminate the JVM together 
> with the LE enclave and the address space).
> One question is, why would you need to make the JVM persistent with CEEPIPI 
> in batch?You can do PROG1 call anything then return, PROG1 call Java then 
> return as long and as many times as you want without the need of CEEPIPI and 
> reusing the JVM - since its not terminated after return from Java.
> But to make it more complicated, since Java 11 for z/OS there is no 31bit JVM 
> anymore and the JVM will be in a secondary 64bit LE enclave. There is a 
> libjvm31.so shared library which can be used to make the JNI calls work, with 
> the difference that most references require 64bit parameters. (Under the 
> covers CEL4RO64 service is 
> used)https://www.ibm.com/support/pages/enhancement-coboljni-interface
> 
> For now, I think the easiest way to do it, is in COBOL.
> Hope that helps,Denis.
> On Wednesday, July 12, 2023 at 02:40:08 PM GMT+2, Crawford Robert C 
> (Contractor) <04e08f385650-dmarc-requ...@listserv.ua.edu> wrote:
>  
>  
> Thanks, Allan.
> 
> Back in the 90's I used CEEPIPI to create a persistent C enclave I could call 
> from Assembler because building the environment is expensive.  Unfortunately, 
> CEEPIPI documentation is kind of scarce.  What we do find doesn't give us 
> very many clues for how to get to Java.
> 
> Robert Crawford
> Abstract Evolutions LLC
> (210) 913-3822
> 
> -Original Message-
> From: IBM Mainframe Discussion List  On Behalf Of 
> allan winston
> Sent: Tuesday, July 11, 2023 5:22 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: [EXT] Re: Invoke Java from Assembler
> 
> Robert,
> 
>   This reminds me of a situation I ran into 25 years ago involving assembler 
> and COBOL.  Granted, COBOL and Java are different environments, but there may 
> be enough similarity in the issues to be relevant.
> 
> We had an assembler main program that called a COBOL subroutine 
> repeatedly.  It was chugging along just fine until LE maintenance showed a 
> large spike in CPU time within LE library routines, as shown by Strobe.
> It seemed as though the LE environment was constantly being created and torn 
> down. I did look into solutions, such as using CEEPIPI, but this program was 
> a major CPU consumer in this shop and we needed a quick solution.  The 
> solution I proposed and was implemented was to create a new main program, 
> written in COBOL, that called t

Re: C DLL abend CEE3350S

2023-07-13 Thread Eric Erickson
For a bit more information. If I don't include any of my Assembler routines in 
the DLL then the binder sets the CEESTART as the entry point. When I do include 
any of the Assembler routines, which use EDCPRLG as its entry code, then the 
one that ends of first in the sort order of names becomes the entry point 
instead of CEESTART. For example, if I have the following routines: 

XXXCLOGR - Assembler with EDCPRLG entry code 
XXXCUTIL - LE C Code 
XXXLOGR - Assembler code - no EDCPRLG

XXXCLOGR gets set as the entry point

If the routines are

XXXCUTIL - LE C Code 
XXXLOGR - Assembler code - no EDCPRLG

then CEESTART gets set as the entry point. 

Obviously, I need all the routines, as the CLOGR is the interface between CUTIL 
and LOGR (CUTIL->CLOGR->LOGR)

When I include the assembler routines that don't have EDCPRLOG then CEESTART 
gets set as the entry point.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: [EXT] Re: Invoke Java from Assembler

2023-07-13 Thread Crawford Robert C (Contractor)
Denis,

Thank you for the detailed answer.  I'll start looking into your suggestions.

I may be misunderstanding your question, but we would like a persistent JVM so 
the assembler code can call Java classes as subroutines.  Creating and 
terminating a JVM for each call would be prohibitively expensive.

Robert Crawford
Abstract Evolutions LLC
(210) 913-3822

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Denis
Sent: Wednesday, July 12, 2023 8:30 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: [EXT] Re: Invoke Java from Assembler

 Hi Robert,

IMS uses the CEEPIPI approach to make the JVM persistent, but thats actually 
only needed if multiple modules are serially executed and (speaking with COBOL) 
end with a GOBACK. The GOBACK of the first module called would terminate the LE 
enclave (and as such the JVM) so CEEPIPI is used to allow the next program to 
work the same way without tiering down the JVM.
The COBOL (and C JNI) work like this, you start a program e.g. with JCL 
PGM=PROG1. Enterprise COBOL initializes the JVM (CreateJavaVM and 
AttachCurrentThread JNI calls under the covers if I remember correctly, in C 
and e.g. PL/I you do that by yourself and the environment for the JVM is 
pointed to by _CEE_ENVFILE) and with that JVM pointer you can do any number of 
JNI calls (e.g. call Java methods) and after each call the calling program is 
returned control. The JNIEnvPtr will be valid as long as the JVM or the LE 
enclave stay up.You can do the same thing in assembler, but you need an LE 
enclave with POSIX(ON) and XPLINK(ON) since the JVM on z/OS is written in C and 
requires those settings (in addition that up to Java 8 the 31bit version of 
Java needs to be used). But if the inital assembler uses CEEENTRY and CEETERM 
it will be quite easy to achieve, because it would create the LE enclave and 
remain until the initial assembler ends. From that first module you can call 
any non LE assembler as you like.The JVM can be ended by using JNI call 
DestroyJavaVM to make sure any unfinished work on the Java side is ended (as 
opposed to just end the first module and terminate the JVM together with the LE 
enclave and the address space).
One question is, why would you need to make the JVM persistent with CEEPIPI in 
batch?You can do PROG1 call anything then return, PROG1 call Java then return 
as long and as many times as you want without the need of CEEPIPI and reusing 
the JVM - since its not terminated after return from Java.
But to make it more complicated, since Java 11 for z/OS there is no 31bit JVM 
anymore and the JVM will be in a secondary 64bit LE enclave. There is a 
libjvm31.so shared library which can be used to make the JNI calls work, with 
the difference that most references require 64bit parameters. (Under the covers 
CEL4RO64 service is 
used)https://www.ibm.com/support/pages/enhancement-coboljni-interface

For now, I think the easiest way to do it, is in COBOL.
Hope that helps,Denis.
On Wednesday, July 12, 2023 at 02:40:08 PM GMT+2, Crawford Robert C 
(Contractor) <04e08f385650-dmarc-requ...@listserv.ua.edu> wrote:
 
 
 Thanks, Allan.

Back in the 90's I used CEEPIPI to create a persistent C enclave I could call 
from Assembler because building the environment is expensive.  Unfortunately, 
CEEPIPI documentation is kind of scarce.  What we do find doesn't give us very 
many clues for how to get to Java.

Robert Crawford
Abstract Evolutions LLC
(210) 913-3822

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
allan winston
Sent: Tuesday, July 11, 2023 5:22 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [EXT] Re: Invoke Java from Assembler

Robert,

  This reminds me of a situation I ran into 25 years ago involving assembler 
and COBOL.  Granted, COBOL and Java are different environments, but there may 
be enough similarity in the issues to be relevant.

    We had an assembler main program that called a COBOL subroutine repeatedly. 
 It was chugging along just fine until LE maintenance showed a large spike in 
CPU time within LE library routines, as shown by Strobe.
It seemed as though the LE environment was constantly being created and torn 
down. I did look into solutions, such as using CEEPIPI, but this program was a 
major CPU consumer in this shop and we needed a quick solution.  The solution I 
proposed and was implemented was to create a new main program, written in 
COBOL, that called the former assembler main program.  That way the new main 
program established the LE environment that persisted until the program 
terminated.

  So, ALC calling COBOL changed to COBOL calling ALC calling COBOL.
In your case: Java calling COBOL changed to COBOL calling Java calling COBOL.

  I have never used Java, so this is somewhat a shot in the dark.

  I should have created an ETR on IBMLINK about the increased CPU overhead, but 
did not bother since we had a circumvention.

    Allan

On Tue, Jul 11, 2023 at 5:58 PM Crawford Robert C (Cont

Re: OSA-ICC question

2023-07-13 Thread Seymour J Metz
You can define a console to automatically logon to the console name, and use, 
e.g., RACF, to control what commands it will accept. Normally you will define 
the consol userids with minimal authority and require the operator to log on if 
he needs more authority.

Anything that supports real local non-SNA 3270s should support OSA-ICC. That 
includes MVS applications using EXCP[VR], STARTIO or VTAM for the display; z/VM 
logon and console; z/VM guest that supports local non-SNA 3270; stand-alone 
utilities.


From: IBM Mainframe Discussion List  on behalf of 
John S. Giltner, Jr. 
Sent: Thursday, July 13, 2023 7:36 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: OSA-ICC question

In a z/OS environment OSA-ICC's can be used two ways.

One way is as a z/OS system console.  I know you can require a login on a 
console, but I'm not sure what you may be able to see or do if you are not 
logged in.  I don't think you can issue commands, you may just be able to see 
messages roll across the console.  If you don't require console login's then 
whomever can "telnet" to the OSA-ICC has console access.  This does NOT require 
Communication Server to be active.

The other way is as a non-SNA 3270 terminal controlled by VTAM.  Which requires 
Communication Server to be active and for the devices to be configured in VTAM 
as non-SNA terminals.

In both cases you need to know the IP address and port that the OSA-ICC is 
listening on at a minimum.  In most (maybe all) you also need to know what LU 
name to request.

If you are running z/VM, I'm not sure how it may deal with OSA-ICC's as I don't 
have z/VM experience with OSA-ICC's.



On Wed, 12 Jul 2023 08:06:51 -0500, Joe Monk  wrote:

>I think he was asking about the hosting company.
>
>They will always have access via the HMC. In addition, since their network
>will be used to access the OSA-ICC port, they will have access via that
>method.
>
>Joe
>
>On Wed, Jul 12, 2023 at 8:01 AM Tom Longfellow <
>03e29b607131-dmarc-requ...@listserv.ua.edu> wrote:
>
>> I am confused about which 'access' is at question.
>>
>> There is access to the card and access to the lpars using the card.
>> Basically the wires in and out of the physical OSA-ICC card.
>>
>> ANYONE that has connectivity to the Ethernet port on the OSA is
>> 'accessing' the OSA.
>> The 'OSA Specific Utilities' under HMC control then controls what LPARS
>> the people who 'access' the OSA can see within your mainframe..
>> The LPARS must also be told about the OSA-ICC.
>>
>> None of this will give them 'Access' to your operating systems or
>> applications.  In other words, they will still have to authenticate and
>> login just like any users of the systems.
>>
>> It boils down to the trust you have in your outsourcer.They are the
>> fox in charge of this hen house.IF they are sharing the physical OSA
>> across all customers, then the OSA-ICC configuration becomes your
>> gatekeeper/firewall to keep everyone isolated.
>>
>> Makes me wonder what the concerns are and what 'accesses'  are being
>> question.  Also, what access?  physically, to the applications and data?
>> etc.
>>
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>>
>
>--
>For IBM-MAIN subscribe / signoff / archive access instructions,
>send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: separate a single product into its own CSI

2023-07-13 Thread David Spiegel

Hi Bill,
Please look at the BUILDMCS command.
Please see also:
https://www.mail-archive.com/ibm-main@listserv.ua.edu/msg30268.html

Regards,
David

On 2023-07-13 07:49, Bill Giannelli wrote:

We have a CSI with multiple products (Db2 QMF QM and HPUNL - High Performance 
Unload).
Is there a way to "extract" a single product and set it up in it's own CSI?
thanks
Bill

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: [EXT] Re: C DLL abend CEE3350S

2023-07-13 Thread Crawford Robert C (Contractor)
You might want to try disassembling the LE initialization modules beginning at 
the entry point and follow the logic.  Some of the CEE CSECT's are included 
from SCEELKED while the compiler generates others specific to the module's 
requirements (e.g., stack storage, application code entry point). 

I once ran into a problem where one program linked in a different program's 
CEESTART (I think it was) which resulted in S0C4's.   

Robert Crawford
Abstract Evolutions LLC
(210) 913-3822

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Eric Erickson
Sent: Tuesday, July 11, 2023 2:18 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [EXT] Re: C DLL abend CEE3350S

I know, but the CEESTART CSECT is included in the program object. On another 
DLL, which is just 1 module with multiple functions, the CEESTART CSECT is 
listed in the load map as such.

  
   0  CEESTART*  CSECTB0  SYSLIB03  CEESTART  
  

In my problem DLL its listed as: 

  A48  CEESTART*  CSECTB0  SYSLIB03  CEESTART   
   

   
Not sure what is going on here. Its my first foray into C DLLs and I wonder if 
mixing in the C LE Assembler routines is causing an issue? 

If I don't but the Entry statement into the deck, I get one what looks to be 
the module with the first alphabetically marked as the entry point. 

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: A question about CPU usage on z/OS

2023-07-13 Thread Eric D Rossman
Very true (about MVS and z/OS not limiting address spaces).

I recall using CPU affinity back in CMOS days when there were only 1 or 2 CCFs 
that were physically bound to a given CPU, but that was nearly 2 decades ago 
now.

Eric Rossman

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Seymour J Metz
Sent: Thursday, July 13, 2023 12:07 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [EXTERNAL] Re: A question about CPU usage on z/OS

A task can only use one CPU at a time, but MVS has never limited an address 
space to a single CPU except for the case of CPU affinity, which I have never 
seen used.

However, many batch jobs do not exploit multitasking and thus cannot exploit 
multiple CPUs.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


separate a single product into its own CSI

2023-07-13 Thread Bill Giannelli
We have a CSI with multiple products (Db2 QMF QM and HPUNL - High Performance 
Unload).
Is there a way to "extract" a single product and set it up in it's own CSI?
thanks
Bill

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: OSA-ICC question

2023-07-13 Thread John S. Giltner, Jr.
In a z/OS environment OSA-ICC's can be used two ways.

One way is as a z/OS system console.  I know you can require a login on a 
console, but I'm not sure what you may be able to see or do if you are not 
logged in.  I don't think you can issue commands, you may just be able to see 
messages roll across the console.  If you don't require console login's then 
whomever can "telnet" to the OSA-ICC has console access.  This does NOT require 
Communication Server to be active.

The other way is as a non-SNA 3270 terminal controlled by VTAM.  Which requires 
Communication Server to be active and for the devices to be configured in VTAM 
as non-SNA terminals.

In both cases you need to know the IP address and port that the OSA-ICC is 
listening on at a minimum.  In most (maybe all) you also need to know what LU 
name to request.  

If you are running z/VM, I'm not sure how it may deal with OSA-ICC's as I don't 
have z/VM experience with OSA-ICC's.



On Wed, 12 Jul 2023 08:06:51 -0500, Joe Monk  wrote:

>I think he was asking about the hosting company.
>
>They will always have access via the HMC. In addition, since their network
>will be used to access the OSA-ICC port, they will have access via that
>method.
>
>Joe
>
>On Wed, Jul 12, 2023 at 8:01 AM Tom Longfellow <
>03e29b607131-dmarc-requ...@listserv.ua.edu> wrote:
>
>> I am confused about which 'access' is at question.
>>
>> There is access to the card and access to the lpars using the card.
>> Basically the wires in and out of the physical OSA-ICC card.
>>
>> ANYONE that has connectivity to the Ethernet port on the OSA is
>> 'accessing' the OSA.
>> The 'OSA Specific Utilities' under HMC control then controls what LPARS
>> the people who 'access' the OSA can see within your mainframe..
>> The LPARS must also be told about the OSA-ICC.
>>
>> None of this will give them 'Access' to your operating systems or
>> applications.  In other words, they will still have to authenticate and
>> login just like any users of the systems.
>>
>> It boils down to the trust you have in your outsourcer.They are the
>> fox in charge of this hen house.IF they are sharing the physical OSA
>> across all customers, then the OSA-ICC configuration becomes your
>> gatekeeper/firewall to keep everyone isolated.
>>
>> Makes me wonder what the concerns are and what 'accesses'  are being
>> question.  Also, what access?  physically, to the applications and data?
>> etc.
>>
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>>
>
>--
>For IBM-MAIN subscribe / signoff / archive access instructions,
>send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Python 3.11 on z/OS - UTF-8 errors

2023-07-13 Thread Seymour J Metz
All code pages are equal, but some are more equal than others. You can 
faithfully convert between a Unicode string containing only characters in the 
Basic Latin and Latin-1 blocks and an ISO 8859-1 string. Whether using iconv 
under the covers is a viable option is a separate question.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of 
Andrew Rowley [and...@blackhillsoftware.com]
Sent: Thursday, July 13, 2023 12:45 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Python 3.11 on z/OS - UTF-8 errors

On 13/07/2023 1:59 pm, Seymour J Metz wrote:
> UTF-8 is just an encoding of Unicode; not a character set. All of ISO-8859-1 
> is part of Unicode.

Yes, but the code is stored in git as UTF-8 and defined as UTF-8 when
working on other platforms. You can specify the
zos-working-tree-encoding is ISO-8859-1... it seems like this conversion
could cause problems.

Alternatively, zos-working-tree-encoding of UTF-8 presumably transfers
the data without conversion, but it sounds like some programs have
problems using it?

Normally, I think I want IBM-1047 which has the same potential
conversion issues to/from git... you just have to be careful editing on
other platforms.

--
Andrew Rowley
Black Hill Software

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: A question about IXGLOGR and RRS CPU usage

2023-07-13 Thread Colin Paice
Like many subsystems, it may be that the applications do a PC to RRS, and
so any work they do gets charged to the application's address space.  The
CPU used by RRS would be for housekeeping and startup/shutdown.
Colin

On Wed, 12 Jul 2023 at 23:53, Jason Cai  wrote:

> Dear all,
>
> I have a question about IXGLOGR and RRS CPU usage that I hope you can help
> me with.
>
> Due to a large number of transactions that update DB2 and query DB2 (query
> transactions from DRDA), the IXGLOGR usage has increased significantly, and
> the RRS allocate logstream offline datasets have also increased
> significantly, but the RRS CPU usage is not high. Is this normal? I would
> like to know how to reduce the IXGLOGR CPU usage. Any suggestions are
> greatly appreciated.
>
> Thank you for your time and attention. I look forward to hearing from you
> soon.
>
> Sincerely,
>
> Jason Cai
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN