Re: [E!] Re: Re: Automatic Alias Creation

2019-05-22 Thread John P. Baker
Sasan,

In this case, you will need to write a "Post-Operation Plug-In" for the IBM 
Tivoli Directory Server.

This plug-in can be architected to recognize an "ADD" operation (i.e., 
"ADDUSER" in RACF terminology).

It can then check for the existence of an ICF catalog alias, and if found, then 
exit with no further action required.

If not found, it can then issue a START STC command to run a REXX PROC (i.e., 
"ICF Catalog Alias Creation STC") which in turn invokes IDCAMS to define the 
ICF catalog alias.

The Tivoli Directory Server STC will require the authorization to start the STC 
(i.e., "UPDATE" access to resource ID "MVS.START.STC.{std-id-8}" in resource 
class ID "OPERCMDS").

The ICF Catalog Alias Creation STC will require the authorization to define the 
ICF catalog alias (i.e., "READ" access to resource ID 
"STGADMIN.IGG.DEFDEL.UALIAS" in resource class ID "FACILITY").

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Sasan Mirkhani
Sent: Wednesday, May 22, 2019 2:16 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: [E!] Re: Re: Automatic Alias Creation

Hi John,

SailPoint IIQ has 2 different connectors. The RACF connector (which has the 
CTS STCs you mention) and the RACF LDAP Connector which uses the SDBM 
backend. We've implemented only the LDAP Conncetor. The LDAP connector uses the 
IBM Tivoli Directory Server which is included with z/OS. The SDBM backend 
allows us to make all types of RACF definitions, however I don't think it 
allows us to issue TSO commands. I've looked at the documentation and there is 
nothing there. I've also looked to see if there are any exits available and 
haven't found anything there either ☹

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
John P. Baker
Sent: May-22-19 2:07 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [E!] Re: Re: Automatic Alias Creation

Sasan,

SailPoint IIQ can be customized to issue the IDCAMS DEFINE ALIAS and the IDCAMS 
DELETE ALIAS commands.

The "CTSx" STCs will need to have the requisite "READ" access to resource 
ID "STGADMIN.IGG.DEFDEL.UALIAS" in resource class ID "FACILITY".

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Sasan Mirkhani
Sent: Wednesday, May 22, 2019 2:03 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: [E!] Re: Automatic Alias Creation

That's actually what we've been doing for a long time. Our Sec admins use ISPF 
interface to make all RACF/TSO definitions. We will soon be using a new product 
to provision RACF IDs called Sailpoint IIQ. IIQ uses LDAP Server to provision 
RACF IDs and that will most likely be done by Helpdesk or other users who have 
little knowledge of RACF and TSO.

We have to figure out a way to automate the ALIAS creation process when a RACF 
ID with TSO segment is defined but I'm not sure how we can do that yet.

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Carmen Vitullo
Sent: May-22-19 1:56 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [E!] Re: Automatic Alias Creation

who is responsible for setting up the ID's? 
most places I've been its the security team that creates the ID' provides the 
access to resources and creates the alias's, that can be, and have been 
streamlined in a lot of places I worked, the SECADMIN's only need to run a REXX 
or CLIST, provide the ID to get started and that script creates all the 
required security, and creates the ALIAS for the ID 



Carmen Vitullo 

- Original Message -

From: "Sasan Mirkhani" 
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Wednesday, May 22, 2019 12:41:13 PM
Subject: Automatic Alias Creation 

Hi list, 

We're currently provisioning RACF IDs using the Tivoli Directory Server (LDAP 
SDBM backend). For IDs that are defined with TSO segment we need to figure out 
a way to automatically create an ALIAS. What would be the best way to go about 
this? I've thought about doing it in our LOGON PROC, however that would require 
users to have UPDATE access to the master catalog which we would like to avoid. 
How else can we go about this? 

Thanks 

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN 


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the messa

Re: [E!] Re: Automatic Alias Creation

2019-05-22 Thread John P. Baker
Sasan,

SailPoint IIQ can be customized to issue the IDCAMS DEFINE ALIAS and the IDCAMS 
DELETE ALIAS commands.

The "CTSx" STCs will need to have the requisite "READ" access to resource 
ID "STGADMIN.IGG.DEFDEL.UALIAS" in resource class ID "FACILITY".

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Sasan Mirkhani
Sent: Wednesday, May 22, 2019 2:03 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: [E!] Re: Automatic Alias Creation

That's actually what we've been doing for a long time. Our Sec admins use ISPF 
interface to make all RACF/TSO definitions. We will soon be using a new product 
to provision RACF IDs called Sailpoint IIQ. IIQ uses LDAP Server to provision 
RACF IDs and that will most likely be done by Helpdesk or other users who have 
little knowledge of RACF and TSO.

We have to figure out a way to automate the ALIAS creation process when a RACF 
ID with TSO segment is defined but I'm not sure how we can do that yet.

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Carmen Vitullo
Sent: May-22-19 1:56 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [E!] Re: Automatic Alias Creation

who is responsible for setting up the ID's? 
most places I've been its the security team that creates the ID' provides the 
access to resources and creates the alias's, that can be, and have been 
streamlined in a lot of places I worked, the SECADMIN's only need to run a REXX 
or CLIST, provide the ID to get started and that script creates all the 
required security, and creates the ALIAS for the ID 



Carmen Vitullo 

- Original Message -

From: "Sasan Mirkhani" 
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Wednesday, May 22, 2019 12:41:13 PM
Subject: Automatic Alias Creation 

Hi list, 

We're currently provisioning RACF IDs using the Tivoli Directory Server (LDAP 
SDBM backend). For IDs that are defined with TSO segment we need to figure out 
a way to automatically create an ALIAS. What would be the best way to go about 
this? I've thought about doing it in our LOGON PROC, however that would require 
users to have UPDATE access to the master catalog which we would like to avoid. 
How else can we go about this? 

Thanks 

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN 


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Automatic Alias Creation

2019-05-22 Thread John P. Baker
Sasan,

If the SDBM backend provides a means by which to issue a TSO command to
create the alias, you can give that userid "READ" access to resource ID
"STGADMIN.IGG.DEFDEL.UALIAS" which will permit the SDBM backend to create
and delete aliases to user catalogs without permitting the SDBM backend
"UPDATE" access to the ICF master catalog.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of
Sasan Mirkhani
Sent: Wednesday, May 22, 2019 1:41 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Automatic Alias Creation

Hi list,

We're currently provisioning RACF IDs using the Tivoli Directory Server
(LDAP SDBM backend). For IDs that are defined with TSO segment we need to
figure out a way to automatically create an ALIAS. What would be the best
way to go about this? I've thought about doing it in our LOGON PROC, however
that would require users to have UPDATE access to the master catalog which
we would like to avoid. How else can we go about this?

Thanks

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: RACF x CA-TopSecret

2017-10-11 Thread John P. Baker
Carlos,

Please see my answers below.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Carlos Bodra - Pessoal
Sent: Wednesday, October 11, 2017 5:14 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: RACF x CA-TopSecret

I need to convert some RACF commands showed bellow to CA-TOP SECRET
commands. Since I do not know nothing about CA-TS syntaxes, can anyone help
me? Or tell me if there is any document about this?

RDEFINE FACILITY LUMXPROC.SFTP.PUT.** LEVEL(00) OWNER(MDIADMIN) UACC(NONE)

==>  TSS ADDTO(MDIADMIN) IBMFAC(LUMXPROC)

RALTER FACILITY LUMXPROC.SFTP.PUT.** LEVEL(00) OWNER(MDIADMIN) UACC(NONE)

 ==> n/a

RALTER FACILITY LUMXPROC.SFTP.PUT.** AUDIT(NONE)

==> n/a 

SETROPTS RACLIST(FACILITY) REFRESH

==> n/a 

PERMIT LUMXPROC.SFTP.PUT.** CLASS(FACILITY) RESET(STANDARD)

==> n/a 

PERMIT LUMXPROC.SFTP.PUT.** CLASS(FACILITY) ID(JOBMAN) ACCESS(READ)

==> TSS PERMIT(JOBMAN) IBMFAC(LUMXPROC.SFTP.PUT.) ACCESS(READ) 

Thanks a lot for helping…

Carlos Bodra

IBM System Certified System z

São Paulo - Brazil

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Vector processing instructions

2017-08-09 Thread John P. Baker
Amrith,

Converting a 128-bit unsigned fixed binary integer to packed decimal is not 
particularly difficult.

The following methodology should meet your needs -

IVFB - Input Value (128-bit Unsigned Fixed Binary)
WVFB - Working Value (128-bit Unsigned Fixed Binary)
AFPD - Adjustment Factor (11-byte Packed Decimal)
QUFB - Quotient (64-bit Unsigned Fixed Binary)
RMFB - Remainder (64-bit Unsigned Fixed Binary)
QUPD - Quotient (11-byte Packed Decimal)
RMPD - Remainder (10-byte Packed Decimal)
OVPD - Output Value (20-byte Packed Decimal)

WVFB = IVFB ;
AFPD = 0 ;
Do While (WVFB >= 100) ; /* (10**38) */
  WVFB = (WVFB - 100) ; /* (10**38) */
  AFPD = AFPD + 1000 ; /* (10**19) */
End ;
Do While (WVFB >= 9223372036854775807000) ; /* ((2**63) - 1) * 
(10**19) */
  WVFB = WVFB - 10 ; /* (10**37) */
  AFPD = AFPD + 100 ; /* (10**18) */
End ;
QUFB = WVFB / 1000 ; /* (10**19) ; Remainder in "RMFB" */
QUPD = QUFB ; /* Convert to Packed Decimal */
RMPD = RMFB ; /* Convert to Packed Decimal */
QUPD = QUPD + AFPD ;
OVPD = QUPD (20 digits)) || RMPD (19 digits) ;

Please note than in the last pseudo-code instruction, the 19 digits of RMPD + 
the sign field fill ten (10) bytes.  However, the sign field of QUPD must be 
ignored, so an MVO instruction can be used to shift the value one (1) nibble to 
the left.  The QUPD value (after discarding the rightmost byte) can be appended 
to the front of RMPD, giving you a 30-byte packed decimal value.  Please note 
that a packed decimal field of this length is NOT supported by IBM machine 
instructions except (I believe) for the ED/EDMK instructions ( I have not 
tested this).

The logic for converting a signed 128-bit value is slightly more complex, but 
is also do-able without any significant difficulty.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Amrith
Sent: Sunday, August 6, 2017 9:49 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Vector processing instructions

Folks, 
   Recently I was working with vector processing on z13 and noticed that we 
have 128bit add and sub instructions but no multiply(correct me here but the 
multiply is on 64bit)  or divide. Any idea on how to convert the 128bit 
signed/unsigned binary integer to packed decimal. If anyone is working with the 
vector instructions on z13 please IM me. 

Thanks
Amrith 

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Suspended SRB scheduled with SYNCH=YES?

2017-05-25 Thread John P. Baker
Don,

My expectation is that the caller's work unit will remain suspended.

Per the manual, the caller's work unit will be unsuspended when the SRB 
completes, is purged, or completes abnormally.

It does not mention a suspension of the SRB, so I expect there to be no 
associated state change to the caller's work unit.

John P. Baker

Sent from my iPhone

> On May 25, 2017, at 11:39 PM, Donald Likens  wrote:
> 
> I am attempting something that per the manual will not work (but I think 
> makes sense). Does anyone know what happens when an SRB that is scheduled 
> with SYNCH=YES is suspended?
> 
> Per the manual:
> 
> SYNCH=YES
> The SRB is to be scheduled and synchronized with the caller's work unit;
> the caller's work unit is suspended until the SRB completes, is purged, or
> ends abnormally.
> 
> SYNCH-YES does not say what happens when the SRB is suspended.
> 
> I am hoping that the work unit will resume when the SRB is suspended. Now 
> that I think about it, I do not think I should do this unless IBM says it 
> will work (or you all say it will work and has for a long time).
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: new member, need old iron assistance

2017-04-29 Thread John P. Baker
I recommend that you take a look at IBM publication GA23-0214-03.

Do a Google search on "3174 customization" and select the entry starting "Full 
text of...".

John P. Baker

Sent from my iPhone

> On Apr 29, 2017, at 7:39 PM, Parwez Hamid  wrote:
> 
> Dave,
> 
> I have sent a 18 MB pdf file - 3274 Control Unit customization, planning and 
> set-up guide direct to you. For a 3290 attached to a 3174 you need the 
> configuration support T licensed microcode disk for the 3274 and for a 3173 
> CU I think its configuration support C. The 3274 used a 8 inch floppy disk 
> for the microcode!
> 
> Parwez  Hamid
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Mainframe operating systems?

2017-04-15 Thread John P. Baker
Phil,

BOS/360 (predecessor to DOS), TOS/360, TSS/360, RTOS/360, MTS, DPPX/370, and
UTS (Amdahl UNIX) should be added to your list.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Phil Smith
Sent: Saturday, April 15, 2017 5:28 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Mainframe operating systems?

Today's random wondering: how many operating systems can folks remember
having run on S/360 and descendants? I can think of:

OS/360 (including MFT, MVT, MVS, up thru z/OS, including MSP and VOS3) VM
(CP/40 up thru z/VM) DOS (or did it start as TOS? Not my turf! up thru
z/VSE) ACP (up thru z/TPF) TSS MUMPS MUSIC PICK AIX Linux, of course
Solaris, almost ORVYL? WYLBUR? I think ORVYL was the OS and WYLBUR was the
user environment - sort of the CP-CMS or z/OS-TSO relationship, but canna
remember for sure; someone here will know VICOM

What others? No credit for things like DDR or ICKDSF, which, while IPLable,
aren't really "OSes" in any kind of real sense!

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


OMVS Automount Processing

2017-03-01 Thread John P. Baker
Given the following setup -

 

/etc/auto.master -

 

/home  /etc/default.map

 

/etc/default.map -

 

name*

type  ZFS

filesystem.ZFS.&SYSNAME

moderdwr

duration   30

delay10

parm aggrgrow

 

Am I correct in my belief that a reference to directory "/home/test1" by
userid "TEST123" on system PROD will automount dataset "TEST1.ZFS.PROD" at
"/home/TEST1"?

 

In other words, do "uc_name" and "asis_name" refer to the directory
qualifier immediately subordinate to the directory specified in
"/etc/auto.master" which is being referenced by the userid?

 

John P. Baker


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


R_cacheserv

2017-02-11 Thread John P. Baker
All,

 

I am currently looking into the benefits, if any, of the R_cacheserv service
in an environment running CA Top Secret Security.

 

What products are able to make use of it and is cache hardening worthwhile?

 

John P. Baker


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: OMVS Mass Reassign of File Owner

2017-02-11 Thread John P. Baker
Nathan,

The find/chgrp/chown worked great.

Thanks for pointing it out to me.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Pfister, Nathan
Sent: Thursday, February 9, 2017 4:20 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: OMVS Mass Reassign of File Owner

You don't need sed to do so, that may just complicate it

I would suggest find/exec.  Example below will find in current directory (.)
all files belonging to user 5001 (UID unless you have a user named "5001")
and change the owner to 0 (root).

find . -user 5001 -exec chown 0 {} \;

Second example, finds files in current directory (.) that belong to group
5001 (GID unless you have a group named "5001") and change the group to
SOMEGROUP

find . -group 5001 -exec chgrp SOMEGROUP {} \;

Notice that chgrp, chown, and the user/group parameters of find will accept
either a user/group name or a UID/GID

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Ed Jaffe
Sent: Thursday, February 09, 2017 4:11 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: OMVS Mass Reassign of File Owner

On 2/9/2017 1:04 PM, John P. Baker wrote:
> Is there an OMVS command or utility, either from IBM or from a 3rd 
> party, to search thru the OMVS filesystem, locate all directories 
> and/or files having a specific GID and/or UID, and to then reassign 
> those directories and/or files to a new GID and/or UID?

You can probably do this in one command by using the output of 'find' as
input to 'sed' or similar.

--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN E-MAIL
CONFIDENTIALITY NOTICE: This e-mail from Donegal Insurance Group may contain
CONFIDENTIAL and legally protected information. If you are not an intended
recipient, please do not copy, use or disclose this email or its contents to
others; and please notify us by calling toll free (800) 877-0600 x7880 or by
replying to this message, and then delete it from your system. Delivery of
this email to an unintended recipient is not a waiver of any attorney-client
or other applicable privilege.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


OMVS Mass Reassign of File Owner

2017-02-09 Thread John P. Baker
All,

 

Is there an OMVS command or utility, either from IBM or from a 3rd party,
to search thru the OMVS filesystem, locate all directories and/or files
having a specific GID and/or UID, and to then reassign those directories
and/or files to a new GID and/or UID?

 

John P. Baker


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: BPXWUNIX and sort

2015-11-06 Thread John P. Baker
Bill,

Including" LC_COLLATE=S370" resolved the problem.

Thanks for your insight.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Bill Godfrey
Sent: Friday, November 6, 2015 7:11 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: BPXWUNIX and sort

On Thu, 5 Nov 2015 23:13:34 -0500, John P. Baker wrote:

>Kirk,
>
>The following example illustrates what I am trying to do --
>
>Call BPXWUNIX "sort -k 3 -k 4 -k 1 -k 2", table_in., table_out., 
>messages_out. ;
>
>In the above example, "table_in." in a stem variable containing the rows to be 
>sorted, "table_out." Is a stem variable into which the sorted rows are to be 
>written, and "messages_out." Is a stem variable into which any error messages 
>are to be written.
>
>The "-k n" parameters indicates the space/tab delimited fields which are to be 
>used as sort keys.
>
>The problem that I am experiencing is that the data is being sorted using the 
>ASCII collating sequence (i.e., numerics precede alphabetics).
>
>Which I get the table back, "B12" precedes "BBB".
>
>This makes the subsequent binary search subroutine fail since as far as it is 
>concerned, the rows contained in stem variable "table_out." are not sorted.
>
>There is an optional fifth parameter (another stem variable) which allows 
>environmental variable settings to be passed.
>
>I tried setting LC_COLLATE to no effect.
>
>Any recommendations will be most welcome.
>

Try setting LC_COLLATE=S370 or SAA

env.0=1
env.1='LC_COLLATE=S370'
Call BPXWUNIX "sort -k 3 -k 4 -k 1 -k 2", table_in., table_out., 
messages_out.,env.;

Bill

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: BPXWUNIX and sort

2015-11-05 Thread John P. Baker
Kirk,

The following example illustrates what I am trying to do --

Call BPXWUNIX "sort -k 3 -k 4 -k 1 -k 2", table_in., table_out., messages_out. ;

In the above example, "table_in." in a stem variable containing the rows to be 
sorted, "table_out." Is a stem variable into which the sorted rows are to be 
written, and "messages_out." Is a stem variable into which any error messages 
are to be written.

The "-k n" parameters indicates the space/tab delimited fields which are to be 
used as sort keys.

The problem that I am experiencing is that the data is being sorted using the 
ASCII collating sequence (i.e., numerics precede alphabetics).

Which I get the table back, "B12" precedes "BBB".

This makes the subsequent binary search subroutine fail since as far as it is 
concerned, the rows contained in stem variable "table_out." are not sorted.

There is an optional fifth parameter (another stem variable) which allows 
environmental variable settings to be passed.

I tried setting LC_COLLATE to no effect.

Any recommendations will be most welcome.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Kirk Wolf
Sent: Thursday, November 5, 2015 10:40 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: BPXWUNIX and sort

Have you looked at "man sort" for an explanation of the options that control 
ordering of keys?

Can you provide an isolated example of the sort command, its options and some 
data to illustrate your problem?

For example:

zos> sort   - <http://dovetail.com

On Thu, Nov 5, 2015 at 7:49 PM, John P. Baker  wrote:

> I am using the BPXWUNIX service from a TSO/E REXX procedure to invoke 
> the OMVS sort command to sort a REXX stem variable.
>
> The sort works fine except that it uses the ASCII collating sequence 
> as opposed to the EBCDIC collating sequence.
>
> This makes the output stem variable unsuitable for use by a binary 
> search algorithm.
>
> Can anyone provide an example of how to make the sort command utilize 
> the EBCDIC collating sequence?
>
> John P. Baker
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send 
> email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


BPXWUNIX and sort

2015-11-05 Thread John P. Baker
I am using the BPXWUNIX service from a TSO/E REXX procedure to invoke the
OMVS sort command to sort a REXX stem variable.

 

The sort works fine except that it uses the ASCII collating sequence as
opposed to the EBCDIC collating sequence.

 

This makes the output stem variable unsuitable for use by a binary search
algorithm.

 

Can anyone provide an example of how to make the sort command utilize the
EBCDIC collating sequence?

 

John P. Baker


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SK3T-4271-28

2015-10-04 Thread John P. Baker
Robert,

You can get all of the z/OS v1.12 manuals via the IBM Softcopy Librarian.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Robert Prins
Sent: Sunday, October 4, 2015 4:37 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: SK3T-4271-28

I'm trying to find the full (~5GB collection) of z/OS 1.12 manuals, does anyone 
know if the above (.zip) is still around anywhere. Tried changing URL's, but to 
no avail...

Robert
--
Robert AH Prins
robert.ah.pr...@gmail.com

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Volkswagen Programmed Vehicle to Deactivate Pollution Control Systems

2015-09-20 Thread John P. Baker
Scott,

I agree that ethics is a large part of it.

I will suggest that it is reasonable to anticipate that an attorney may well 
argue that the programmers in fact became co-conspirators by virtue of the fact 
that they cannot reasonably argue that they did not know that the code was 
intended to perpetuate a crime.

Whether that argument is made in this case or in some future case, I strongly 
believe that at some point it will be made, and that it is more likely to occur 
sooner than later.

I suggest that it would be better for the programming profession to take 
proactive steps to come up with ethical guidelines for members of our 
profession, rather than leaving it to government to do it, which as we all 
know, would not be in our best interests.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Scott Ford
Sent: Sunday, September 20, 2015 11:20 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Volkswagen Programmed Vehicle to Deactivate Pollution Control 
Systems

This is a question of ethics and ones moral compass.

Regards,
Scott

On Friday, September 18, 2015, Richard Pinion  wrote:

> I understand the point you are making, that an employee is told to do 
> something that they know is illegal or immoral, and they do it anyway.  
> Having worked for a non-profit health insurance company many, many 
> years ago, I was often asked if we intentionally programmed the system 
> to automatically reject a claim on first submission, regardless of 
> whether the claim met all criteria for processing.  I was never asked 
> to do that, nor was I aware of any such code within their claims 
> processing system.  Yet, the public perspective was that the company 
> did that.
>
> Not sure how that story fits into the discussion at hand, but it is 
> late in the day, and I'm looking for ways to fill my time until 
> "Miller" time.
>
> --- jba...@ngssallc.com  wrote:
>
> From: "John P. Baker" >
> To:   IBM-MAIN@LISTSERV.UA.EDU 
> Subject: Re: Volkswagen Programmed Vehicle to Deactivate Pollution 
> Control Systems
> Date: Fri, 18 Sep 2015 16:54:45 -0400
>
> Richard,
>
> I think that there is a big difference here in that the programming 
> staff at Volkswagen, if the initial reports are accurate, could not 
> reasonably not have known that what they were coding was in furtherance of a 
> crime.
>
> John P. Baker
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU 
> ] On Behalf Of Richard Pinion
> Sent: Friday, September 18, 2015 4:30 PM
> To: IBM-MAIN@LISTSERV.UA.EDU 
> Subject: Re: Volkswagen Programmed Vehicle to Deactivate Pollution 
> Control Systems
>
> As an employee of a company who deals with HIPPA controlled/protected 
> data, I feel very uncomfortable knowing that I can be charged either 
> with a civil or criminal violation in the event that HIPPA data, under 
> my control, is accidentally lost or stolen.  And I am not talking 
> about an intentional leak of protected patient information.  What 
> really floored me this year, when I took the yearly HIPPA 
> certification online class, was HIPPA is administered under the Office of 
> Civil Rights.
>
> Regardless of my personal political theology, it makes me 
> uncomfortable that if I offend a person or persons, the friendly 
> neighborhood OCR representative could be asked to "look at" my 
> activities as relating to HIPPA compliance.  I'm sure an unbiased and 
> diligent OCR employee might uncover some violation(s) if they 
> investigated long and hard enough.
>
> --- jba...@ngssallc.com  wrote:
>
> From: "John P. Baker" >
> To:   IBM-MAIN@LISTSERV.UA.EDU 
> Subject: Volkswagen Programmed Vehicle to Deactivate Pollution Control 
> Systems
> Date: Fri, 18 Sep 2015 15:56:34 -0400
>
>
> http://www.foxbusiness.com/industries/2015/09/18/epa-says-vw-intention
> ally-v
> iolates-clean-air-standards/?intcmp=hpbt1
>
> In the referenced article, it is being reported that Volkswagen had 
> their programming staff intentionally program the computers 
> controlling the pollution control systems on certain 2008-2015 Audi 
> and Volkswagen diesel vehicles to activate the full pollution control 
> systems ONLY when the vehicle was undergoing official emissions 
> testing.  At all other times, the pollution control systems were 
> inactive and the vehicles were putting out emissions as high as 40 times the 
> legal limit.
>
> The company is facing $18 billion in fines.
>
> It is unclear whether the Volkswagen executives who directed the 
> scheme will face criminal charges.
>
> It is also unclear

Re: Volkswagen Programmed Vehicle to Deactivate Pollution Control Systems

2015-09-18 Thread John P. Baker
Richard,

I think that there is a big difference here in that the programming staff at 
Volkswagen, if the initial reports are accurate, could not reasonably not have 
known that what they were coding was in furtherance of a crime.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Richard Pinion
Sent: Friday, September 18, 2015 4:30 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Volkswagen Programmed Vehicle to Deactivate Pollution Control 
Systems

As an employee of a company who deals with HIPPA controlled/protected data, I 
feel very uncomfortable knowing that I can be charged either with a civil or 
criminal violation in the event that HIPPA data, under my control, is 
accidentally lost or stolen.  And I am not talking about an intentional leak of 
protected patient information.  What really floored me this year, when I took 
the yearly HIPPA certification online class, was HIPPA is administered under 
the Office of Civil Rights.

Regardless of my personal political theology, it makes me uncomfortable that if 
I offend a person or persons, the friendly neighborhood OCR representative 
could be asked to "look at" my activities as relating to HIPPA compliance.  I'm 
sure an unbiased and diligent OCR employee might uncover some violation(s) if 
they
investigated long and hard enough. 

--- jba...@ngssallc.com wrote:

From:     "John P. Baker" 
To:   IBM-MAIN@LISTSERV.UA.EDU
Subject: Volkswagen Programmed Vehicle to Deactivate Pollution Control Systems
Date: Fri, 18 Sep 2015 15:56:34 -0400

http://www.foxbusiness.com/industries/2015/09/18/epa-says-vw-intentionally-v
iolates-clean-air-standards/?intcmp=hpbt1

In the referenced article, it is being reported that Volkswagen had their 
programming staff intentionally program the computers controlling the pollution 
control systems on certain 2008-2015 Audi and Volkswagen diesel vehicles to 
activate the full pollution control systems ONLY when the vehicle was 
undergoing official emissions testing.  At all other times, the pollution 
control systems were inactive and the vehicles were putting out emissions as 
high as 40 times the legal limit.

The company is facing $18 billion in fines.

It is unclear whether the Volkswagen executives who directed the scheme will 
face criminal charges.

It is also unclear whether the programming staff who wrote the code will face 
criminal charges.

Even though this is not a mainframe issue, it is an issue that directly affects 
us and our industry.  Hackers are already a significant black eye.
This is much worse.  It makes legitimate programmers look suspect.

It raises the uncomfortable question of whether or not we can or should be held 
criminally liable if we are directed to code a program or a change to a program 
that we know would have the effect of violating the law and we then knowingly 
proceed to code that program or a change to a program.

It has been suggested in the past that programmers should be licensed and/or 
bonded.

I am not particularly fond of either idea.  However, I would like to hear what 
others think.

John P. Baker

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN
_
Netscape.  Just the Net You Need.
--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Volkswagen Programmed Vehicle to Deactivate Pollution Control Systems

2015-09-18 Thread John P. Baker
http://www.foxbusiness.com/industries/2015/09/18/epa-says-vw-intentionally-v
iolates-clean-air-standards/?intcmp=hpbt1

 

In the referenced article, it is being reported that Volkswagen had their
programming staff intentionally program the computers controlling the
pollution control systems on certain 2008-2015 Audi and Volkswagen diesel
vehicles to activate the full pollution control systems ONLY when the
vehicle was undergoing official emissions testing.  At all other times, the
pollution control systems were inactive and the vehicles were putting out
emissions as high as 40 times the legal limit.

 

The company is facing $18 billion in fines.

 

It is unclear whether the Volkswagen executives who directed the scheme will
face criminal charges.

 

It is also unclear whether the programming staff who wrote the code will
face criminal charges.

 

Even though this is not a mainframe issue, it is an issue that directly
affects us and our industry.  Hackers are already a significant black eye.
This is much worse.  It makes legitimate programmers look suspect.

 

It raises the uncomfortable question of whether or not we can or should be
held criminally liable if we are directed to code a program or a change to a
program that we know would have the effect of violating the law and we then
knowingly proceed to code that program or a change to a program.

 

It has been suggested in the past that programmers should be licensed and/or
bonded.

 

I am not particularly fond of either idea.  However, I would like to hear
what others think.

 

John P. Baker

 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: 64 bit ICMxx ?

2015-07-17 Thread John P. Baker
Paul,

There is an ICMH instruction, for which the mask bits indicate bit positions 
0-7, 8-15, 16-23, and 24-31 of a 64-bit register.  This instruction uses a 
20-bit signed offset.

There is also an ICMY instruction, which is equivalent to the ICM instruction 
except that this instruction uses a 20-bit signed offset.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Paul Schuster
Sent: Friday, July 17, 2015 8:04 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: 64 bit ICMxx ?

Recently got into some real 64-bit coding. Noticed that there is no 64-bit 
version of ICM. I am used to doing ICM R1,B'',FIELD and then a JZ.

It seems for a 64 bit register, there is no ICMxx R1,B'',64bitfield 
equivalent. I have to do a   LG R1,64bitfield and then a LTGR R1,R1 and then 
the JZ.

I'm sure this was not overlooked by the engineers, so am I missing something?  
Or is this just a new paradigm going forward with 64 bit code?

Thank you.

Paul

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


DB2 Application Multitasking

2015-07-03 Thread John P. Baker
I am looking for any pointers to documentation describing how to structure a
multitasking assembler program where multiple subtasks are concurrently
accessing DB2.

 

No two (2) subtasks will be accessing the same DB2 table concurrently.

 

Any assistance will be most welcome.

 

John P. Baker


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Top-Secret

2015-02-01 Thread John P. Baker
Scott,

I suggest that you look at the RACF R_admin (IRRSEQ00) callable service, which 
can be used to pass commands to and retrieve output from CA Trop Secret 
Security.

You can use it from a batch assembler program, and you do NOT require a TSO 
environment, and the overhead that establishing a TSO environment entails.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Scott Ford
Sent: Sunday, February 1, 2015 2:30 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Top-Secret

Peter:

The command in question runs in TSO/E Option # 6 and can be executed via
IKJEFT01 in batch. With these two options being true , can i write a command 
processor using IKJEFSI,IKJEFSR ..etc. ?
My issue is we run as a STC ...i want to be able to call establish a temporary 
TSO environment and execute the command and retrieve out..

Is my thinking wrong ? If so ...how , If you dont mind ..

Regards,
Scott
www.idmworks.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IBM Launches the z13 Mainframe

2015-01-15 Thread John P. Baker
Timothy,

Will IBM be releasing a new edition of the z/Architecture Principles of
Operation publication, or will the SIMD instruction set be documented in a
separate publication, as was the case with the earlier vector facilities?

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Timothy Sipples
Sent: Thursday, January 15, 2015 1:44 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: IBM Launches the z13 Mainframe

If you'd like some introductory information on the Vector Facility for
z/Architecture (SIMD) capabilities, this paper should help:

http://www.redbooks.ibm.com/technotes/tips1259.pdf

Yes, Mathematical Acceleration Subsystem (MASS), Basic Linear Algebra
Subprograms (BLAS), and Automatically Tuned Linear Algebra Software (ATLAS)
are among the functions arriving on z/OS and on Linux on z Systems that
exploit SIMD. Yet another piece of fantastic news.



Timothy Sipples
IT Architect Executive, Industry Solutions, IBM z Systems, AP/GCG/MEA
E-Mail: sipp...@sg.ibm.com
--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ASSIST Assembler

2013-11-17 Thread John P. Baker
Cameron,

It is available at http://www.jaymoseley.com/hercules/download/zips/assist.tgz.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Cameron Seay
Sent: Sunday, November 17, 2013 10:50 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: ASSIST Assembler

Anybody know where I can get a copy of the ASSIST assembler for academic only 
purposes. The Northern Illinois site is no longer active.

Thanks.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: z/OS FBA Services (Was: PDS/E, Shared Dasd, and COBOL V5)

2013-09-13 Thread John P. Baker
In addition to OA41040, there are at least three (3) related APARs --

OA41558 DEVSERV
OA42887 SRM
OA42912 [Not available]

John P. Baker

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Looking for COBOL V5R1 Softcopy Librarian docs

2013-09-13 Thread John P. Baker
Charles,

I have taken a look at several XKS files and have determined that they are
nothing more than XML, encoded in UTF-16 Big-Endian format.

If you have an appropriate editor, you should be able to create your own.

Here is the structure --


http://publib.boulder.ibm.com/epubs/df/dtd";>














The specification for NAME in the SHELFHEADER section should be replaced by
the 8-character filename of the XKS file, omitting the filename extension
and retaining the double quotes, while the settings of the TITLE, AUTHOR,
and UPDATE sections are self-explanatory.  I do NOT have any information in
respect to length limitations for the TITLE and AUTHOR settings.

The DOCUMENT section should be repeated for each document to be included in
the bookshelf.

The specification for DOCID in the DOCUMENT section should be replaced by
the IBM publication number, in the format "--nn", retaining the
double quotes, NAME should be replaced by the 8-character filename of the
PDF file, omitting the filename extension and retaining the double quotes,
while the settings of the TITLE and UPDATE sections are self-explanatory.
Again, I do NOT have any information in respect to length limitations for
the TITLE settings.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Charles Mills
Sent: Friday, September 13, 2013 3:15 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Looking for COBOL V5R1 Softcopy Librarian docs

Okay! Dave, can you find any Enterprise COBOL 5.1 shelf for Softcopy
Librarian?

Charles

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Gibney, Dave
Sent: Friday, September 13, 2013 2:15 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Looking for COBOL V5R1 Softcopy Librarian docs

I still use and really like Softcopy Librarian. I have stated my opinion of
the phase-out of Bookmanager format here before. My opinion of Infocenter is
not fit for a public forum:)

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: CPACF

2013-08-29 Thread John P. Baker
Yes.

Bit 17 of the result area of the STFLE (Store Facility List Extended) 
instruction is set to one (1) when the Message Security Assist (i.e., CPACF) is 
available.

In addition, bit 76 is set to one (1) when the Message Security Assist 
Extension 3 is available, and bit 77 is set to one (1) when the Message 
Security Assist Extension 4 is available.

You can then use the query function of each of the various CPACF-supplied 
instructions to determine the availability of more granular capabilities.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of gsg
Sent: Thursday, August 29, 2013 2:35 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: CPACF

Is there any command that can be issued to determine if CPACF is activated 
and/or FC 3863 is installed?

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is there a "reverse bits" hardware instruction?

2013-07-23 Thread John P. Baker
Gil,

The maximum negative value must also be treated as a special case.

John P. Baker

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Paul Gilmartin
Sent: Tuesday, July 23, 2013 7:13 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Is there a "reverse bits" hardware instruction?

On Tue, 23 Jul 2013 17:49:00 -0400, Charles Mills wrote:
>
>Why? Those of you following another thread I started know I am looking 
>to implement a 64-bit version of the UNIX library function ffs(), which 
>returns the bit number of the least significant one bit of a word. z 
>architecture provides the FLOGR instruction but it works MSB to LSB.
> 
Subtract 1.  XOR with the original value.  The leftmost 1 bit of the result now 
occupies the position of the rightmost 1 bit of the original value AND with the 
original value yields the mask to reset that bit.

Zero must be treated as a special case.

--gil

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Numeric Literal Specification Standard

2013-07-19 Thread John P. Baker
Is anyone aware of any numeric literal specification standard, particularly
insofar as IBM internal storage allocations (short (4-byte), long (8-byte),
and extended (16-byte)) and storage formats (binary floating point, decimal
floating point, and hexadecimal floating point) ?

 

John P. Baker


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


IXGBRWSE (LogStream Browse)

2013-02-23 Thread John P. Baker
When using IXGBRWSE to browse a LogStream, if a reason code of
IxgRsnCodeEndReached is returned, indicating that I have reached the end of
the LogStream, is there an interface by which I can be notified when
additional data becomes available in the LogStream?

 

John P. Baker

President

NGSSA, LLC

 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Passing of Chris Mason reported

2013-01-16 Thread John P. Baker
Chris,

It translates as "Of the dead, nothing but good is to be said".

John P. Baker
President
NGSSA, LLC

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Blaicher, Christopher Y.
Sent: Tuesday, January 15, 2013 11:44 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Passing of Chris Mason reported

John,

Not being a Latin scholar, what does the Latin tag you quote mean in today's
English?

While many Latin tags are interesting, I never had the interest in learning
a dead language.  Yes, I am very aware it is the basis of many languages,
and yes, I took a year of it and decided it was as interesting as watching
grass (the lawn type) grow.

Chris Blaicher
Principal Software Engineer, Software Development Syncsort Incorporated
50 Tice Boulevard, Woodcliff Lake, NJ 07677
P: 201-930-8260  |  M: 512-627-3803
E: cblaic...@syncsort.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of John Gilmore
Sent: Tuesday, January 15, 2013 9:41 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Passing of Chris Mason reported

Shmuel wrote:

| De mortui

which is perhaps a botched reference to the Latin tag

De mortuis nil nisi bonum [dicendum est].

Latin dropouts would do better to refrain from pretention that betrays them
into the ridiculous.  In other words, get it right or avoid it:
'octopuses' is unobjectionable, albeit subliterate; 'octopi' instead of
'octopodes' is not.

John Gilmore, Ashland, MA 01721 - USA

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Usefullness (or not) of STOC/LOC instructions?

2012-11-29 Thread John P. Baker
Lloyd,

According to the z/Architecture Principles of Operation, SA22-7832-09, page
5-9, all 64 bits of the index register are used.

My interpretation is that it is not the AMODE, but the architectural mode
that affects the interpretation of the index register.

On a z/Architecture-capable machine, in ESA mode, bits 0-31 of the index
register are ignored, and bits 32-63 are used.

On a z/Architecture-capable machine, in z/Architecture mode, bits 0-63 of
the index register are used.

Perhaps someone from IBM can confirm or dispute this interpretation.

John P. Baker
President
NGSSA, LLC

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Lloyd Fuller
Sent: Thursday, November 29, 2012 7:29 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Usefullness (or not) of STOC/LOC instructions?

The latter can also run into issues in AMODE 64.  The index register is
always 
32 bits, not 24, 31, or 64 depending upon AMODE.  Waste the extra
nano-second, 
use the comma.  It is meaningful.

Lloyd

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is there a correspondence between 64-bit IBM mainframes and PoOps editions levels?

2012-10-06 Thread John P. Baker
Scott,

BIF = "Built-in Function"

John P. Baker
President
NGSSA, LLC

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Scott Ford
Sent: Saturday, October 06, 2012 2:09 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Is there a correspondence between 64-bit IBM mainframes and
PoOps editions levels?

Ok John, I will bite what's a BIF ?

Scott ford
www.identityforge.com

Tell me and I'll forget; show me and I may remember; involve me and I'll
understand. - Chinese Proverb


On Oct 6, 2012, at 8:49 AM, John Gilmore  wrote:

> Randy Hudson wrote:
> 
> 
> I don't believe MVCIN was available on the 360/50; we used the TR 
> instruction to reverse fields, or otherwise re-arrange them.
> 
> 
> and he at once quite correct and utterly wrong.  As usual, it depends 
> upon what "was available" is thought to mean.
> 
> There is and has "always" been a list of non-standard mainframe 
> instructions that IBM can make available for a [small] fee.  Some 
> shops use one or more of them, and others are unaware of them.
> 
> MVCIN is an instruction that shops that do text processing in a 
> semitic language (or in Farsi, which, while Indo-european, is also 
> written from right to left in an almost but not quite standard version 
> of the Arabic alphabet) had an early felt need for.  IBM met that 
> need, and MVCIN was available early in the Middle East, certainly by
> 1971 when I first encountered it there.
> 
> It was, for example, installed on the mainframes of the National 
> Iranian Oil Company  (Naft Melli) in Tehran and Abadan in the early 
> 1970s; and I remember writing and installing a BIF that made it 
> available in PL/I there.
> 
> John Gilmore, Ashland, MA 01721 - USA
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send 
> email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Updated z/Architecture Principles of Operation

2012-08-28 Thread John P. Baker
Has any information been forthcoming in respect to when an updated
z/Architecture Principles of Operation will be made available?

 

John P. Baker


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: COBOL packed decimal

2012-07-15 Thread John P. Baker
Phil,

In the IBM z/Architecture Principles of Operation, publication number
SA22-7832-08, on page 8-2 it states that X'F' is an alternate encoding for a
positive sign.  However, in the programming note to figure 8-1 on page 8-3,
it suggests that X'F' be used in zoned decimal formats for the high-order
nibble of all bytes save the rightmost, which should be encoded using one of
the recognized sign encodings.  I would note that if the value is
nonnegative, an encoding of X'F' is preferable to X'C' in that in the zoned
decimal format, the resulting character string consists of all decimal
digits.

It is worth noting that the PACK machine instruction does NO validation of
the sign nibble in any byte of the field being packed.  The sign nibble of
the rightmost byte of the source (zoned) field is copied to the rightmost
nibble of the target (packed) field.

John P. Baker
NGSSA, LLC

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Phil Smith
Sent: Sunday, July 15, 2012 10:42 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: COBOL packed decimal

John P. Baker wrote:
>A positive value is identified by a sign encoded as --

>X'A'
>X'C' (Preferred)
>X'E'
>X'F'

>A negative value is identified by a sign encoded as --

>X'B'
>X'D' (Preferred)

>The preferred encoding are always generated by packed decimal 
>instructions,

>The alternative encoding are accepted as input to packed decimal 
>instructions.

I've read elsewhere that x'F' meant "unsigned". Not true?
--
...phsiii

Phil Smith III
p...@voltage.com<mailto:p...@voltage.com>
Voltage Security, Inc.
www.voltage.com<http://www.voltage.com/>
(703) 476-4511 (home office)
(703) 568-6662 (cell)


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: COBOL packed decimal

2012-07-14 Thread John P. Baker
A positive value is identified by a sign encoded as --

X'A'
X'C' (Preferred)
X'E'
X'F'

A negative value is identified by a sign encoded as --

X'B'
X'D' (Preferred)

The preferred encoding are always generated by packed decimal instructions,

The alternative encoding are accepted as input to packed decimal
instructions.

John P. Baker
NGSSA, LLC

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of zMan
Sent: Saturday, July 14, 2012 11:12 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: COBOL packed decimal

On Sat, Jul 14, 2012 at 5:46 PM, John P. Baker  wrote:

> By the way, a 5-byte field capable of containing a 9-digit packed 
> decimal value has a 0.55% probability of containing a valid packed 
> decimal value (taking into consideration all six (6) valid sign 
> representations) and a 0.18% probability of containing a valid packed 
> decimal value (taking into consideration only the two (2) preferred sign
representations).


OK, I'll byte...what are the six? I know of three (C, D, F). Would love a
reference so I can understand this better.
--
zMan -- "I've got a mainframe and I'm not afraid to use it"

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: COBOL packed decimal

2012-07-14 Thread John P. Baker
Bernd,

I can't agree that mainframe applications are more stable because of packed
decimal arithmetic.

Rather, I would argue that mainframe developers generally have a
philosophically different approach to software development than
distributed/workstation developers.  In particular, I would argue that they
generally take more time, both in the development process and in the code
review process, and that this additional time is what makes the difference.

By the way, a 5-byte field capable of containing a 9-digit packed decimal
value has a 0.55% probability of containing a valid packed decimal value
(taking into consideration all six (6) valid sign representations) and a
0.18% probability of containing a valid packed decimal value (taking into
consideration only the two (2) preferred sign representations).

John P. Baker
NGSSA, LLC

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Bernd Oppolzer
Sent: Saturday, July 14, 2012 4:42 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: COBOL packed decimal

There is one thing I like very much about packed decimal data, that is its
redundancy.

With packed decimal data, the probability that the use of an un-initialized
variable will lead to a run time error (0C7 abend) is very high. Take a nine
digit decimal variable - the probability that it contains a valid decimal
representation if all bit patterns have the same probability is not very
high (0.1 percent).

With all binary data types, all bit patterns are valid, and you have no
chance to detect the use of an un-initialized variable (the german
Telefunken hardware had tag bits in storage which allowed for the detection
of such errors even in the binary case - the storage was initially tagged
with a "strange" data type, and so the hardware produced a so-called
"Typenkennungs-Alarm").

I believe that most of the rumour that mainframe applications are more
"stable" than applications on other platforms comes from this property of
the decimal data type, and from the fact, that most applications are written
in COBOL and use this data type, so that such errors are detected during
testing stage.

The more decimal data you have in your applications, the more stable are
your applications. This could also be one of the reasons for the programming
language C being not so stable (among others, like pointer arithmetic, no
control of subscripts etc): the absence of decimal arithmetic in C -
normally.

I'm not sure, if I told you already: in our shop, we run the PL/1
applications in production with SUBSCRIPTRANGE enabled since some years ago,
and we are very happy with this. The performance is acceptable.

Kind regards

Bernd

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN