Re: [E!] Re: Re: Automatic Alias Creation
Sasan, In this case, you will need to write a "Post-Operation Plug-In" for the IBM Tivoli Directory Server. This plug-in can be architected to recognize an "ADD" operation (i.e., "ADDUSER" in RACF terminology). It can then check for the existence of an ICF catalog alias, and if found, then exit with no further action required. If not found, it can then issue a START STC command to run a REXX PROC (i.e., "ICF Catalog Alias Creation STC") which in turn invokes IDCAMS to define the ICF catalog alias. The Tivoli Directory Server STC will require the authorization to start the STC (i.e., "UPDATE" access to resource ID "MVS.START.STC.{std-id-8}" in resource class ID "OPERCMDS"). The ICF Catalog Alias Creation STC will require the authorization to define the ICF catalog alias (i.e., "READ" access to resource ID "STGADMIN.IGG.DEFDEL.UALIAS" in resource class ID "FACILITY"). John P. Baker -Original Message- From: IBM Mainframe Discussion List On Behalf Of Sasan Mirkhani Sent: Wednesday, May 22, 2019 2:16 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: [E!] Re: Re: Automatic Alias Creation Hi John, SailPoint IIQ has 2 different connectors. The RACF connector (which has the CTS STCs you mention) and the RACF LDAP Connector which uses the SDBM backend. We've implemented only the LDAP Conncetor. The LDAP connector uses the IBM Tivoli Directory Server which is included with z/OS. The SDBM backend allows us to make all types of RACF definitions, however I don't think it allows us to issue TSO commands. I've looked at the documentation and there is nothing there. I've also looked to see if there are any exits available and haven't found anything there either ☹ -Original Message- From: IBM Mainframe Discussion List On Behalf Of John P. Baker Sent: May-22-19 2:07 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: [E!] Re: Re: Automatic Alias Creation Sasan, SailPoint IIQ can be customized to issue the IDCAMS DEFINE ALIAS and the IDCAMS DELETE ALIAS commands. The "CTSx" STCs will need to have the requisite "READ" access to resource ID "STGADMIN.IGG.DEFDEL.UALIAS" in resource class ID "FACILITY". John P. Baker -Original Message- From: IBM Mainframe Discussion List On Behalf Of Sasan Mirkhani Sent: Wednesday, May 22, 2019 2:03 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: [E!] Re: Automatic Alias Creation That's actually what we've been doing for a long time. Our Sec admins use ISPF interface to make all RACF/TSO definitions. We will soon be using a new product to provision RACF IDs called Sailpoint IIQ. IIQ uses LDAP Server to provision RACF IDs and that will most likely be done by Helpdesk or other users who have little knowledge of RACF and TSO. We have to figure out a way to automate the ALIAS creation process when a RACF ID with TSO segment is defined but I'm not sure how we can do that yet. -Original Message- From: IBM Mainframe Discussion List On Behalf Of Carmen Vitullo Sent: May-22-19 1:56 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: [E!] Re: Automatic Alias Creation who is responsible for setting up the ID's? most places I've been its the security team that creates the ID' provides the access to resources and creates the alias's, that can be, and have been streamlined in a lot of places I worked, the SECADMIN's only need to run a REXX or CLIST, provide the ID to get started and that script creates all the required security, and creates the ALIAS for the ID Carmen Vitullo - Original Message - From: "Sasan Mirkhani" To: IBM-MAIN@LISTSERV.UA.EDU Sent: Wednesday, May 22, 2019 12:41:13 PM Subject: Automatic Alias Creation Hi list, We're currently provisioning RACF IDs using the Tivoli Directory Server (LDAP SDBM backend). For IDs that are defined with TSO segment we need to figure out a way to automatically create an ALIAS. What would be the best way to go about this? I've thought about doing it in our LOGON PROC, however that would require users to have UPDATE access to the master catalog which we would like to avoid. How else can we go about this? Thanks -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the messa
Re: [E!] Re: Automatic Alias Creation
Sasan, SailPoint IIQ can be customized to issue the IDCAMS DEFINE ALIAS and the IDCAMS DELETE ALIAS commands. The "CTSx" STCs will need to have the requisite "READ" access to resource ID "STGADMIN.IGG.DEFDEL.UALIAS" in resource class ID "FACILITY". John P. Baker -Original Message- From: IBM Mainframe Discussion List On Behalf Of Sasan Mirkhani Sent: Wednesday, May 22, 2019 2:03 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: [E!] Re: Automatic Alias Creation That's actually what we've been doing for a long time. Our Sec admins use ISPF interface to make all RACF/TSO definitions. We will soon be using a new product to provision RACF IDs called Sailpoint IIQ. IIQ uses LDAP Server to provision RACF IDs and that will most likely be done by Helpdesk or other users who have little knowledge of RACF and TSO. We have to figure out a way to automate the ALIAS creation process when a RACF ID with TSO segment is defined but I'm not sure how we can do that yet. -Original Message- From: IBM Mainframe Discussion List On Behalf Of Carmen Vitullo Sent: May-22-19 1:56 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: [E!] Re: Automatic Alias Creation who is responsible for setting up the ID's? most places I've been its the security team that creates the ID' provides the access to resources and creates the alias's, that can be, and have been streamlined in a lot of places I worked, the SECADMIN's only need to run a REXX or CLIST, provide the ID to get started and that script creates all the required security, and creates the ALIAS for the ID Carmen Vitullo - Original Message - From: "Sasan Mirkhani" To: IBM-MAIN@LISTSERV.UA.EDU Sent: Wednesday, May 22, 2019 12:41:13 PM Subject: Automatic Alias Creation Hi list, We're currently provisioning RACF IDs using the Tivoli Directory Server (LDAP SDBM backend). For IDs that are defined with TSO segment we need to figure out a way to automatically create an ALIAS. What would be the best way to go about this? I've thought about doing it in our LOGON PROC, however that would require users to have UPDATE access to the master catalog which we would like to avoid. How else can we go about this? Thanks -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Automatic Alias Creation
Sasan, If the SDBM backend provides a means by which to issue a TSO command to create the alias, you can give that userid "READ" access to resource ID "STGADMIN.IGG.DEFDEL.UALIAS" which will permit the SDBM backend to create and delete aliases to user catalogs without permitting the SDBM backend "UPDATE" access to the ICF master catalog. John P. Baker -Original Message- From: IBM Mainframe Discussion List On Behalf Of Sasan Mirkhani Sent: Wednesday, May 22, 2019 1:41 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Automatic Alias Creation Hi list, We're currently provisioning RACF IDs using the Tivoli Directory Server (LDAP SDBM backend). For IDs that are defined with TSO segment we need to figure out a way to automatically create an ALIAS. What would be the best way to go about this? I've thought about doing it in our LOGON PROC, however that would require users to have UPDATE access to the master catalog which we would like to avoid. How else can we go about this? Thanks -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: RACF x CA-TopSecret
Carlos, Please see my answers below. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Carlos Bodra - Pessoal Sent: Wednesday, October 11, 2017 5:14 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: RACF x CA-TopSecret I need to convert some RACF commands showed bellow to CA-TOP SECRET commands. Since I do not know nothing about CA-TS syntaxes, can anyone help me? Or tell me if there is any document about this? RDEFINE FACILITY LUMXPROC.SFTP.PUT.** LEVEL(00) OWNER(MDIADMIN) UACC(NONE) ==> TSS ADDTO(MDIADMIN) IBMFAC(LUMXPROC) RALTER FACILITY LUMXPROC.SFTP.PUT.** LEVEL(00) OWNER(MDIADMIN) UACC(NONE) ==> n/a RALTER FACILITY LUMXPROC.SFTP.PUT.** AUDIT(NONE) ==> n/a SETROPTS RACLIST(FACILITY) REFRESH ==> n/a PERMIT LUMXPROC.SFTP.PUT.** CLASS(FACILITY) RESET(STANDARD) ==> n/a PERMIT LUMXPROC.SFTP.PUT.** CLASS(FACILITY) ID(JOBMAN) ACCESS(READ) ==> TSS PERMIT(JOBMAN) IBMFAC(LUMXPROC.SFTP.PUT.) ACCESS(READ) Thanks a lot for helping Carlos Bodra IBM System Certified System z São Paulo - Brazil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Vector processing instructions
Amrith, Converting a 128-bit unsigned fixed binary integer to packed decimal is not particularly difficult. The following methodology should meet your needs - IVFB - Input Value (128-bit Unsigned Fixed Binary) WVFB - Working Value (128-bit Unsigned Fixed Binary) AFPD - Adjustment Factor (11-byte Packed Decimal) QUFB - Quotient (64-bit Unsigned Fixed Binary) RMFB - Remainder (64-bit Unsigned Fixed Binary) QUPD - Quotient (11-byte Packed Decimal) RMPD - Remainder (10-byte Packed Decimal) OVPD - Output Value (20-byte Packed Decimal) WVFB = IVFB ; AFPD = 0 ; Do While (WVFB >= 100) ; /* (10**38) */ WVFB = (WVFB - 100) ; /* (10**38) */ AFPD = AFPD + 1000 ; /* (10**19) */ End ; Do While (WVFB >= 9223372036854775807000) ; /* ((2**63) - 1) * (10**19) */ WVFB = WVFB - 10 ; /* (10**37) */ AFPD = AFPD + 100 ; /* (10**18) */ End ; QUFB = WVFB / 1000 ; /* (10**19) ; Remainder in "RMFB" */ QUPD = QUFB ; /* Convert to Packed Decimal */ RMPD = RMFB ; /* Convert to Packed Decimal */ QUPD = QUPD + AFPD ; OVPD = QUPD (20 digits)) || RMPD (19 digits) ; Please note than in the last pseudo-code instruction, the 19 digits of RMPD + the sign field fill ten (10) bytes. However, the sign field of QUPD must be ignored, so an MVO instruction can be used to shift the value one (1) nibble to the left. The QUPD value (after discarding the rightmost byte) can be appended to the front of RMPD, giving you a 30-byte packed decimal value. Please note that a packed decimal field of this length is NOT supported by IBM machine instructions except (I believe) for the ED/EDMK instructions ( I have not tested this). The logic for converting a signed 128-bit value is slightly more complex, but is also do-able without any significant difficulty. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Amrith Sent: Sunday, August 6, 2017 9:49 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Vector processing instructions Folks, Recently I was working with vector processing on z13 and noticed that we have 128bit add and sub instructions but no multiply(correct me here but the multiply is on 64bit) or divide. Any idea on how to convert the 128bit signed/unsigned binary integer to packed decimal. If anyone is working with the vector instructions on z13 please IM me. Thanks Amrith -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Suspended SRB scheduled with SYNCH=YES?
Don, My expectation is that the caller's work unit will remain suspended. Per the manual, the caller's work unit will be unsuspended when the SRB completes, is purged, or completes abnormally. It does not mention a suspension of the SRB, so I expect there to be no associated state change to the caller's work unit. John P. Baker Sent from my iPhone > On May 25, 2017, at 11:39 PM, Donald Likens wrote: > > I am attempting something that per the manual will not work (but I think > makes sense). Does anyone know what happens when an SRB that is scheduled > with SYNCH=YES is suspended? > > Per the manual: > > SYNCH=YES > The SRB is to be scheduled and synchronized with the caller's work unit; > the caller's work unit is suspended until the SRB completes, is purged, or > ends abnormally. > > SYNCH-YES does not say what happens when the SRB is suspended. > > I am hoping that the work unit will resume when the SRB is suspended. Now > that I think about it, I do not think I should do this unless IBM says it > will work (or you all say it will work and has for a long time). > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: new member, need old iron assistance
I recommend that you take a look at IBM publication GA23-0214-03. Do a Google search on "3174 customization" and select the entry starting "Full text of...". John P. Baker Sent from my iPhone > On Apr 29, 2017, at 7:39 PM, Parwez Hamid wrote: > > Dave, > > I have sent a 18 MB pdf file - 3274 Control Unit customization, planning and > set-up guide direct to you. For a 3290 attached to a 3174 you need the > configuration support T licensed microcode disk for the 3274 and for a 3173 > CU I think its configuration support C. The 3274 used a 8 inch floppy disk > for the microcode! > > Parwez Hamid > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Mainframe operating systems?
Phil, BOS/360 (predecessor to DOS), TOS/360, TSS/360, RTOS/360, MTS, DPPX/370, and UTS (Amdahl UNIX) should be added to your list. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Phil Smith Sent: Saturday, April 15, 2017 5:28 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Mainframe operating systems? Today's random wondering: how many operating systems can folks remember having run on S/360 and descendants? I can think of: OS/360 (including MFT, MVT, MVS, up thru z/OS, including MSP and VOS3) VM (CP/40 up thru z/VM) DOS (or did it start as TOS? Not my turf! up thru z/VSE) ACP (up thru z/TPF) TSS MUMPS MUSIC PICK AIX Linux, of course Solaris, almost ORVYL? WYLBUR? I think ORVYL was the OS and WYLBUR was the user environment - sort of the CP-CMS or z/OS-TSO relationship, but canna remember for sure; someone here will know VICOM What others? No credit for things like DDR or ICKDSF, which, while IPLable, aren't really "OSes" in any kind of real sense! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
OMVS Automount Processing
Given the following setup - /etc/auto.master - /home /etc/default.map /etc/default.map - name* type ZFS filesystem.ZFS.&SYSNAME moderdwr duration 30 delay10 parm aggrgrow Am I correct in my belief that a reference to directory "/home/test1" by userid "TEST123" on system PROD will automount dataset "TEST1.ZFS.PROD" at "/home/TEST1"? In other words, do "uc_name" and "asis_name" refer to the directory qualifier immediately subordinate to the directory specified in "/etc/auto.master" which is being referenced by the userid? John P. Baker -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
R_cacheserv
All, I am currently looking into the benefits, if any, of the R_cacheserv service in an environment running CA Top Secret Security. What products are able to make use of it and is cache hardening worthwhile? John P. Baker -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: OMVS Mass Reassign of File Owner
Nathan, The find/chgrp/chown worked great. Thanks for pointing it out to me. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Pfister, Nathan Sent: Thursday, February 9, 2017 4:20 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: OMVS Mass Reassign of File Owner You don't need sed to do so, that may just complicate it I would suggest find/exec. Example below will find in current directory (.) all files belonging to user 5001 (UID unless you have a user named "5001") and change the owner to 0 (root). find . -user 5001 -exec chown 0 {} \; Second example, finds files in current directory (.) that belong to group 5001 (GID unless you have a group named "5001") and change the group to SOMEGROUP find . -group 5001 -exec chgrp SOMEGROUP {} \; Notice that chgrp, chown, and the user/group parameters of find will accept either a user/group name or a UID/GID -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Ed Jaffe Sent: Thursday, February 09, 2017 4:11 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: OMVS Mass Reassign of File Owner On 2/9/2017 1:04 PM, John P. Baker wrote: > Is there an OMVS command or utility, either from IBM or from a 3rd > party, to search thru the OMVS filesystem, locate all directories > and/or files having a specific GID and/or UID, and to then reassign > those directories and/or files to a new GID and/or UID? You can probably do this in one command by using the output of 'find' as input to 'sed' or similar. -- Edward E Jaffe Phoenix Software International, Inc 831 Parkview Drive North El Segundo, CA 90245 http://www.phoenixsoftware.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN E-MAIL CONFIDENTIALITY NOTICE: This e-mail from Donegal Insurance Group may contain CONFIDENTIAL and legally protected information. If you are not an intended recipient, please do not copy, use or disclose this email or its contents to others; and please notify us by calling toll free (800) 877-0600 x7880 or by replying to this message, and then delete it from your system. Delivery of this email to an unintended recipient is not a waiver of any attorney-client or other applicable privilege. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
OMVS Mass Reassign of File Owner
All, Is there an OMVS command or utility, either from IBM or from a 3rd party, to search thru the OMVS filesystem, locate all directories and/or files having a specific GID and/or UID, and to then reassign those directories and/or files to a new GID and/or UID? John P. Baker -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: BPXWUNIX and sort
Bill, Including" LC_COLLATE=S370" resolved the problem. Thanks for your insight. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Bill Godfrey Sent: Friday, November 6, 2015 7:11 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: BPXWUNIX and sort On Thu, 5 Nov 2015 23:13:34 -0500, John P. Baker wrote: >Kirk, > >The following example illustrates what I am trying to do -- > >Call BPXWUNIX "sort -k 3 -k 4 -k 1 -k 2", table_in., table_out., >messages_out. ; > >In the above example, "table_in." in a stem variable containing the rows to be >sorted, "table_out." Is a stem variable into which the sorted rows are to be >written, and "messages_out." Is a stem variable into which any error messages >are to be written. > >The "-k n" parameters indicates the space/tab delimited fields which are to be >used as sort keys. > >The problem that I am experiencing is that the data is being sorted using the >ASCII collating sequence (i.e., numerics precede alphabetics). > >Which I get the table back, "B12" precedes "BBB". > >This makes the subsequent binary search subroutine fail since as far as it is >concerned, the rows contained in stem variable "table_out." are not sorted. > >There is an optional fifth parameter (another stem variable) which allows >environmental variable settings to be passed. > >I tried setting LC_COLLATE to no effect. > >Any recommendations will be most welcome. > Try setting LC_COLLATE=S370 or SAA env.0=1 env.1='LC_COLLATE=S370' Call BPXWUNIX "sort -k 3 -k 4 -k 1 -k 2", table_in., table_out., messages_out.,env.; Bill -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: BPXWUNIX and sort
Kirk, The following example illustrates what I am trying to do -- Call BPXWUNIX "sort -k 3 -k 4 -k 1 -k 2", table_in., table_out., messages_out. ; In the above example, "table_in." in a stem variable containing the rows to be sorted, "table_out." Is a stem variable into which the sorted rows are to be written, and "messages_out." Is a stem variable into which any error messages are to be written. The "-k n" parameters indicates the space/tab delimited fields which are to be used as sort keys. The problem that I am experiencing is that the data is being sorted using the ASCII collating sequence (i.e., numerics precede alphabetics). Which I get the table back, "B12" precedes "BBB". This makes the subsequent binary search subroutine fail since as far as it is concerned, the rows contained in stem variable "table_out." are not sorted. There is an optional fifth parameter (another stem variable) which allows environmental variable settings to be passed. I tried setting LC_COLLATE to no effect. Any recommendations will be most welcome. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Kirk Wolf Sent: Thursday, November 5, 2015 10:40 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: BPXWUNIX and sort Have you looked at "man sort" for an explanation of the options that control ordering of keys? Can you provide an isolated example of the sort command, its options and some data to illustrate your problem? For example: zos> sort - <http://dovetail.com On Thu, Nov 5, 2015 at 7:49 PM, John P. Baker wrote: > I am using the BPXWUNIX service from a TSO/E REXX procedure to invoke > the OMVS sort command to sort a REXX stem variable. > > The sort works fine except that it uses the ASCII collating sequence > as opposed to the EBCDIC collating sequence. > > This makes the output stem variable unsuitable for use by a binary > search algorithm. > > Can anyone provide an example of how to make the sort command utilize > the EBCDIC collating sequence? > > John P. Baker > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, send > email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
BPXWUNIX and sort
I am using the BPXWUNIX service from a TSO/E REXX procedure to invoke the OMVS sort command to sort a REXX stem variable. The sort works fine except that it uses the ASCII collating sequence as opposed to the EBCDIC collating sequence. This makes the output stem variable unsuitable for use by a binary search algorithm. Can anyone provide an example of how to make the sort command utilize the EBCDIC collating sequence? John P. Baker -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: SK3T-4271-28
Robert, You can get all of the z/OS v1.12 manuals via the IBM Softcopy Librarian. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Robert Prins Sent: Sunday, October 4, 2015 4:37 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: SK3T-4271-28 I'm trying to find the full (~5GB collection) of z/OS 1.12 manuals, does anyone know if the above (.zip) is still around anywhere. Tried changing URL's, but to no avail... Robert -- Robert AH Prins robert.ah.pr...@gmail.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Volkswagen Programmed Vehicle to Deactivate Pollution Control Systems
Scott, I agree that ethics is a large part of it. I will suggest that it is reasonable to anticipate that an attorney may well argue that the programmers in fact became co-conspirators by virtue of the fact that they cannot reasonably argue that they did not know that the code was intended to perpetuate a crime. Whether that argument is made in this case or in some future case, I strongly believe that at some point it will be made, and that it is more likely to occur sooner than later. I suggest that it would be better for the programming profession to take proactive steps to come up with ethical guidelines for members of our profession, rather than leaving it to government to do it, which as we all know, would not be in our best interests. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Scott Ford Sent: Sunday, September 20, 2015 11:20 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Volkswagen Programmed Vehicle to Deactivate Pollution Control Systems This is a question of ethics and ones moral compass. Regards, Scott On Friday, September 18, 2015, Richard Pinion wrote: > I understand the point you are making, that an employee is told to do > something that they know is illegal or immoral, and they do it anyway. > Having worked for a non-profit health insurance company many, many > years ago, I was often asked if we intentionally programmed the system > to automatically reject a claim on first submission, regardless of > whether the claim met all criteria for processing. I was never asked > to do that, nor was I aware of any such code within their claims > processing system. Yet, the public perspective was that the company > did that. > > Not sure how that story fits into the discussion at hand, but it is > late in the day, and I'm looking for ways to fill my time until > "Miller" time. > > --- jba...@ngssallc.com wrote: > > From: "John P. Baker" > > To: IBM-MAIN@LISTSERV.UA.EDU > Subject: Re: Volkswagen Programmed Vehicle to Deactivate Pollution > Control Systems > Date: Fri, 18 Sep 2015 16:54:45 -0400 > > Richard, > > I think that there is a big difference here in that the programming > staff at Volkswagen, if the initial reports are accurate, could not > reasonably not have known that what they were coding was in furtherance of a > crime. > > John P. Baker > > -Original Message- > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU > ] On Behalf Of Richard Pinion > Sent: Friday, September 18, 2015 4:30 PM > To: IBM-MAIN@LISTSERV.UA.EDU > Subject: Re: Volkswagen Programmed Vehicle to Deactivate Pollution > Control Systems > > As an employee of a company who deals with HIPPA controlled/protected > data, I feel very uncomfortable knowing that I can be charged either > with a civil or criminal violation in the event that HIPPA data, under > my control, is accidentally lost or stolen. And I am not talking > about an intentional leak of protected patient information. What > really floored me this year, when I took the yearly HIPPA > certification online class, was HIPPA is administered under the Office of > Civil Rights. > > Regardless of my personal political theology, it makes me > uncomfortable that if I offend a person or persons, the friendly > neighborhood OCR representative could be asked to "look at" my > activities as relating to HIPPA compliance. I'm sure an unbiased and > diligent OCR employee might uncover some violation(s) if they > investigated long and hard enough. > > --- jba...@ngssallc.com wrote: > > From: "John P. Baker" > > To: IBM-MAIN@LISTSERV.UA.EDU > Subject: Volkswagen Programmed Vehicle to Deactivate Pollution Control > Systems > Date: Fri, 18 Sep 2015 15:56:34 -0400 > > > http://www.foxbusiness.com/industries/2015/09/18/epa-says-vw-intention > ally-v > iolates-clean-air-standards/?intcmp=hpbt1 > > In the referenced article, it is being reported that Volkswagen had > their programming staff intentionally program the computers > controlling the pollution control systems on certain 2008-2015 Audi > and Volkswagen diesel vehicles to activate the full pollution control > systems ONLY when the vehicle was undergoing official emissions > testing. At all other times, the pollution control systems were > inactive and the vehicles were putting out emissions as high as 40 times the > legal limit. > > The company is facing $18 billion in fines. > > It is unclear whether the Volkswagen executives who directed the > scheme will face criminal charges. > > It is also unclear
Re: Volkswagen Programmed Vehicle to Deactivate Pollution Control Systems
Richard, I think that there is a big difference here in that the programming staff at Volkswagen, if the initial reports are accurate, could not reasonably not have known that what they were coding was in furtherance of a crime. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Richard Pinion Sent: Friday, September 18, 2015 4:30 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Volkswagen Programmed Vehicle to Deactivate Pollution Control Systems As an employee of a company who deals with HIPPA controlled/protected data, I feel very uncomfortable knowing that I can be charged either with a civil or criminal violation in the event that HIPPA data, under my control, is accidentally lost or stolen. And I am not talking about an intentional leak of protected patient information. What really floored me this year, when I took the yearly HIPPA certification online class, was HIPPA is administered under the Office of Civil Rights. Regardless of my personal political theology, it makes me uncomfortable that if I offend a person or persons, the friendly neighborhood OCR representative could be asked to "look at" my activities as relating to HIPPA compliance. I'm sure an unbiased and diligent OCR employee might uncover some violation(s) if they investigated long and hard enough. --- jba...@ngssallc.com wrote: From: "John P. Baker" To: IBM-MAIN@LISTSERV.UA.EDU Subject: Volkswagen Programmed Vehicle to Deactivate Pollution Control Systems Date: Fri, 18 Sep 2015 15:56:34 -0400 http://www.foxbusiness.com/industries/2015/09/18/epa-says-vw-intentionally-v iolates-clean-air-standards/?intcmp=hpbt1 In the referenced article, it is being reported that Volkswagen had their programming staff intentionally program the computers controlling the pollution control systems on certain 2008-2015 Audi and Volkswagen diesel vehicles to activate the full pollution control systems ONLY when the vehicle was undergoing official emissions testing. At all other times, the pollution control systems were inactive and the vehicles were putting out emissions as high as 40 times the legal limit. The company is facing $18 billion in fines. It is unclear whether the Volkswagen executives who directed the scheme will face criminal charges. It is also unclear whether the programming staff who wrote the code will face criminal charges. Even though this is not a mainframe issue, it is an issue that directly affects us and our industry. Hackers are already a significant black eye. This is much worse. It makes legitimate programmers look suspect. It raises the uncomfortable question of whether or not we can or should be held criminally liable if we are directed to code a program or a change to a program that we know would have the effect of violating the law and we then knowingly proceed to code that program or a change to a program. It has been suggested in the past that programmers should be licensed and/or bonded. I am not particularly fond of either idea. However, I would like to hear what others think. John P. Baker -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN _ Netscape. Just the Net You Need. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Volkswagen Programmed Vehicle to Deactivate Pollution Control Systems
http://www.foxbusiness.com/industries/2015/09/18/epa-says-vw-intentionally-v iolates-clean-air-standards/?intcmp=hpbt1 In the referenced article, it is being reported that Volkswagen had their programming staff intentionally program the computers controlling the pollution control systems on certain 2008-2015 Audi and Volkswagen diesel vehicles to activate the full pollution control systems ONLY when the vehicle was undergoing official emissions testing. At all other times, the pollution control systems were inactive and the vehicles were putting out emissions as high as 40 times the legal limit. The company is facing $18 billion in fines. It is unclear whether the Volkswagen executives who directed the scheme will face criminal charges. It is also unclear whether the programming staff who wrote the code will face criminal charges. Even though this is not a mainframe issue, it is an issue that directly affects us and our industry. Hackers are already a significant black eye. This is much worse. It makes legitimate programmers look suspect. It raises the uncomfortable question of whether or not we can or should be held criminally liable if we are directed to code a program or a change to a program that we know would have the effect of violating the law and we then knowingly proceed to code that program or a change to a program. It has been suggested in the past that programmers should be licensed and/or bonded. I am not particularly fond of either idea. However, I would like to hear what others think. John P. Baker -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: 64 bit ICMxx ?
Paul, There is an ICMH instruction, for which the mask bits indicate bit positions 0-7, 8-15, 16-23, and 24-31 of a 64-bit register. This instruction uses a 20-bit signed offset. There is also an ICMY instruction, which is equivalent to the ICM instruction except that this instruction uses a 20-bit signed offset. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Paul Schuster Sent: Friday, July 17, 2015 8:04 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: 64 bit ICMxx ? Recently got into some real 64-bit coding. Noticed that there is no 64-bit version of ICM. I am used to doing ICM R1,B'',FIELD and then a JZ. It seems for a 64 bit register, there is no ICMxx R1,B'',64bitfield equivalent. I have to do a LG R1,64bitfield and then a LTGR R1,R1 and then the JZ. I'm sure this was not overlooked by the engineers, so am I missing something? Or is this just a new paradigm going forward with 64 bit code? Thank you. Paul -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
DB2 Application Multitasking
I am looking for any pointers to documentation describing how to structure a multitasking assembler program where multiple subtasks are concurrently accessing DB2. No two (2) subtasks will be accessing the same DB2 table concurrently. Any assistance will be most welcome. John P. Baker -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Top-Secret
Scott, I suggest that you look at the RACF R_admin (IRRSEQ00) callable service, which can be used to pass commands to and retrieve output from CA Trop Secret Security. You can use it from a batch assembler program, and you do NOT require a TSO environment, and the overhead that establishing a TSO environment entails. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Scott Ford Sent: Sunday, February 1, 2015 2:30 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Top-Secret Peter: The command in question runs in TSO/E Option # 6 and can be executed via IKJEFT01 in batch. With these two options being true , can i write a command processor using IKJEFSI,IKJEFSR ..etc. ? My issue is we run as a STC ...i want to be able to call establish a temporary TSO environment and execute the command and retrieve out.. Is my thinking wrong ? If so ...how , If you dont mind .. Regards, Scott www.idmworks.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: IBM Launches the z13 Mainframe
Timothy, Will IBM be releasing a new edition of the z/Architecture Principles of Operation publication, or will the SIMD instruction set be documented in a separate publication, as was the case with the earlier vector facilities? John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Timothy Sipples Sent: Thursday, January 15, 2015 1:44 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: IBM Launches the z13 Mainframe If you'd like some introductory information on the Vector Facility for z/Architecture (SIMD) capabilities, this paper should help: http://www.redbooks.ibm.com/technotes/tips1259.pdf Yes, Mathematical Acceleration Subsystem (MASS), Basic Linear Algebra Subprograms (BLAS), and Automatically Tuned Linear Algebra Software (ATLAS) are among the functions arriving on z/OS and on Linux on z Systems that exploit SIMD. Yet another piece of fantastic news. Timothy Sipples IT Architect Executive, Industry Solutions, IBM z Systems, AP/GCG/MEA E-Mail: sipp...@sg.ibm.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: ASSIST Assembler
Cameron, It is available at http://www.jaymoseley.com/hercules/download/zips/assist.tgz. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Cameron Seay Sent: Sunday, November 17, 2013 10:50 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: ASSIST Assembler Anybody know where I can get a copy of the ASSIST assembler for academic only purposes. The Northern Illinois site is no longer active. Thanks. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: z/OS FBA Services (Was: PDS/E, Shared Dasd, and COBOL V5)
In addition to OA41040, there are at least three (3) related APARs -- OA41558 DEVSERV OA42887 SRM OA42912 [Not available] John P. Baker -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Looking for COBOL V5R1 Softcopy Librarian docs
Charles, I have taken a look at several XKS files and have determined that they are nothing more than XML, encoded in UTF-16 Big-Endian format. If you have an appropriate editor, you should be able to create your own. Here is the structure -- http://publib.boulder.ibm.com/epubs/df/dtd";> The specification for NAME in the SHELFHEADER section should be replaced by the 8-character filename of the XKS file, omitting the filename extension and retaining the double quotes, while the settings of the TITLE, AUTHOR, and UPDATE sections are self-explanatory. I do NOT have any information in respect to length limitations for the TITLE and AUTHOR settings. The DOCUMENT section should be repeated for each document to be included in the bookshelf. The specification for DOCID in the DOCUMENT section should be replaced by the IBM publication number, in the format "--nn", retaining the double quotes, NAME should be replaced by the 8-character filename of the PDF file, omitting the filename extension and retaining the double quotes, while the settings of the TITLE and UPDATE sections are self-explanatory. Again, I do NOT have any information in respect to length limitations for the TITLE settings. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Charles Mills Sent: Friday, September 13, 2013 3:15 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Looking for COBOL V5R1 Softcopy Librarian docs Okay! Dave, can you find any Enterprise COBOL 5.1 shelf for Softcopy Librarian? Charles -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Gibney, Dave Sent: Friday, September 13, 2013 2:15 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Looking for COBOL V5R1 Softcopy Librarian docs I still use and really like Softcopy Librarian. I have stated my opinion of the phase-out of Bookmanager format here before. My opinion of Infocenter is not fit for a public forum:) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: CPACF
Yes. Bit 17 of the result area of the STFLE (Store Facility List Extended) instruction is set to one (1) when the Message Security Assist (i.e., CPACF) is available. In addition, bit 76 is set to one (1) when the Message Security Assist Extension 3 is available, and bit 77 is set to one (1) when the Message Security Assist Extension 4 is available. You can then use the query function of each of the various CPACF-supplied instructions to determine the availability of more granular capabilities. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of gsg Sent: Thursday, August 29, 2013 2:35 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: CPACF Is there any command that can be issued to determine if CPACF is activated and/or FC 3863 is installed? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Is there a "reverse bits" hardware instruction?
Gil, The maximum negative value must also be treated as a special case. John P. Baker -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Paul Gilmartin Sent: Tuesday, July 23, 2013 7:13 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Is there a "reverse bits" hardware instruction? On Tue, 23 Jul 2013 17:49:00 -0400, Charles Mills wrote: > >Why? Those of you following another thread I started know I am looking >to implement a 64-bit version of the UNIX library function ffs(), which >returns the bit number of the least significant one bit of a word. z >architecture provides the FLOGR instruction but it works MSB to LSB. > Subtract 1. XOR with the original value. The leftmost 1 bit of the result now occupies the position of the rightmost 1 bit of the original value AND with the original value yields the mask to reset that bit. Zero must be treated as a special case. --gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Numeric Literal Specification Standard
Is anyone aware of any numeric literal specification standard, particularly insofar as IBM internal storage allocations (short (4-byte), long (8-byte), and extended (16-byte)) and storage formats (binary floating point, decimal floating point, and hexadecimal floating point) ? John P. Baker -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
IXGBRWSE (LogStream Browse)
When using IXGBRWSE to browse a LogStream, if a reason code of IxgRsnCodeEndReached is returned, indicating that I have reached the end of the LogStream, is there an interface by which I can be notified when additional data becomes available in the LogStream? John P. Baker President NGSSA, LLC -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Passing of Chris Mason reported
Chris, It translates as "Of the dead, nothing but good is to be said". John P. Baker President NGSSA, LLC -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Blaicher, Christopher Y. Sent: Tuesday, January 15, 2013 11:44 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Passing of Chris Mason reported John, Not being a Latin scholar, what does the Latin tag you quote mean in today's English? While many Latin tags are interesting, I never had the interest in learning a dead language. Yes, I am very aware it is the basis of many languages, and yes, I took a year of it and decided it was as interesting as watching grass (the lawn type) grow. Chris Blaicher Principal Software Engineer, Software Development Syncsort Incorporated 50 Tice Boulevard, Woodcliff Lake, NJ 07677 P: 201-930-8260 | M: 512-627-3803 E: cblaic...@syncsort.com -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of John Gilmore Sent: Tuesday, January 15, 2013 9:41 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Passing of Chris Mason reported Shmuel wrote: | De mortui which is perhaps a botched reference to the Latin tag De mortuis nil nisi bonum [dicendum est]. Latin dropouts would do better to refrain from pretention that betrays them into the ridiculous. In other words, get it right or avoid it: 'octopuses' is unobjectionable, albeit subliterate; 'octopi' instead of 'octopodes' is not. John Gilmore, Ashland, MA 01721 - USA -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Usefullness (or not) of STOC/LOC instructions?
Lloyd, According to the z/Architecture Principles of Operation, SA22-7832-09, page 5-9, all 64 bits of the index register are used. My interpretation is that it is not the AMODE, but the architectural mode that affects the interpretation of the index register. On a z/Architecture-capable machine, in ESA mode, bits 0-31 of the index register are ignored, and bits 32-63 are used. On a z/Architecture-capable machine, in z/Architecture mode, bits 0-63 of the index register are used. Perhaps someone from IBM can confirm or dispute this interpretation. John P. Baker President NGSSA, LLC -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Lloyd Fuller Sent: Thursday, November 29, 2012 7:29 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Usefullness (or not) of STOC/LOC instructions? The latter can also run into issues in AMODE 64. The index register is always 32 bits, not 24, 31, or 64 depending upon AMODE. Waste the extra nano-second, use the comma. It is meaningful. Lloyd -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Is there a correspondence between 64-bit IBM mainframes and PoOps editions levels?
Scott, BIF = "Built-in Function" John P. Baker President NGSSA, LLC -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Scott Ford Sent: Saturday, October 06, 2012 2:09 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Is there a correspondence between 64-bit IBM mainframes and PoOps editions levels? Ok John, I will bite what's a BIF ? Scott ford www.identityforge.com Tell me and I'll forget; show me and I may remember; involve me and I'll understand. - Chinese Proverb On Oct 6, 2012, at 8:49 AM, John Gilmore wrote: > Randy Hudson wrote: > > > I don't believe MVCIN was available on the 360/50; we used the TR > instruction to reverse fields, or otherwise re-arrange them. > > > and he at once quite correct and utterly wrong. As usual, it depends > upon what "was available" is thought to mean. > > There is and has "always" been a list of non-standard mainframe > instructions that IBM can make available for a [small] fee. Some > shops use one or more of them, and others are unaware of them. > > MVCIN is an instruction that shops that do text processing in a > semitic language (or in Farsi, which, while Indo-european, is also > written from right to left in an almost but not quite standard version > of the Arabic alphabet) had an early felt need for. IBM met that > need, and MVCIN was available early in the Middle East, certainly by > 1971 when I first encountered it there. > > It was, for example, installed on the mainframes of the National > Iranian Oil Company (Naft Melli) in Tehran and Abadan in the early > 1970s; and I remember writing and installing a BIF that made it > available in PL/I there. > > John Gilmore, Ashland, MA 01721 - USA > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, send > email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Updated z/Architecture Principles of Operation
Has any information been forthcoming in respect to when an updated z/Architecture Principles of Operation will be made available? John P. Baker -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: COBOL packed decimal
Phil, In the IBM z/Architecture Principles of Operation, publication number SA22-7832-08, on page 8-2 it states that X'F' is an alternate encoding for a positive sign. However, in the programming note to figure 8-1 on page 8-3, it suggests that X'F' be used in zoned decimal formats for the high-order nibble of all bytes save the rightmost, which should be encoded using one of the recognized sign encodings. I would note that if the value is nonnegative, an encoding of X'F' is preferable to X'C' in that in the zoned decimal format, the resulting character string consists of all decimal digits. It is worth noting that the PACK machine instruction does NO validation of the sign nibble in any byte of the field being packed. The sign nibble of the rightmost byte of the source (zoned) field is copied to the rightmost nibble of the target (packed) field. John P. Baker NGSSA, LLC -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Phil Smith Sent: Sunday, July 15, 2012 10:42 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: COBOL packed decimal John P. Baker wrote: >A positive value is identified by a sign encoded as -- >X'A' >X'C' (Preferred) >X'E' >X'F' >A negative value is identified by a sign encoded as -- >X'B' >X'D' (Preferred) >The preferred encoding are always generated by packed decimal >instructions, >The alternative encoding are accepted as input to packed decimal >instructions. I've read elsewhere that x'F' meant "unsigned". Not true? -- ...phsiii Phil Smith III p...@voltage.com<mailto:p...@voltage.com> Voltage Security, Inc. www.voltage.com<http://www.voltage.com/> (703) 476-4511 (home office) (703) 568-6662 (cell) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: COBOL packed decimal
A positive value is identified by a sign encoded as -- X'A' X'C' (Preferred) X'E' X'F' A negative value is identified by a sign encoded as -- X'B' X'D' (Preferred) The preferred encoding are always generated by packed decimal instructions, The alternative encoding are accepted as input to packed decimal instructions. John P. Baker NGSSA, LLC -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of zMan Sent: Saturday, July 14, 2012 11:12 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: COBOL packed decimal On Sat, Jul 14, 2012 at 5:46 PM, John P. Baker wrote: > By the way, a 5-byte field capable of containing a 9-digit packed > decimal value has a 0.55% probability of containing a valid packed > decimal value (taking into consideration all six (6) valid sign > representations) and a 0.18% probability of containing a valid packed > decimal value (taking into consideration only the two (2) preferred sign representations). OK, I'll byte...what are the six? I know of three (C, D, F). Would love a reference so I can understand this better. -- zMan -- "I've got a mainframe and I'm not afraid to use it" -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: COBOL packed decimal
Bernd, I can't agree that mainframe applications are more stable because of packed decimal arithmetic. Rather, I would argue that mainframe developers generally have a philosophically different approach to software development than distributed/workstation developers. In particular, I would argue that they generally take more time, both in the development process and in the code review process, and that this additional time is what makes the difference. By the way, a 5-byte field capable of containing a 9-digit packed decimal value has a 0.55% probability of containing a valid packed decimal value (taking into consideration all six (6) valid sign representations) and a 0.18% probability of containing a valid packed decimal value (taking into consideration only the two (2) preferred sign representations). John P. Baker NGSSA, LLC -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Bernd Oppolzer Sent: Saturday, July 14, 2012 4:42 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: COBOL packed decimal There is one thing I like very much about packed decimal data, that is its redundancy. With packed decimal data, the probability that the use of an un-initialized variable will lead to a run time error (0C7 abend) is very high. Take a nine digit decimal variable - the probability that it contains a valid decimal representation if all bit patterns have the same probability is not very high (0.1 percent). With all binary data types, all bit patterns are valid, and you have no chance to detect the use of an un-initialized variable (the german Telefunken hardware had tag bits in storage which allowed for the detection of such errors even in the binary case - the storage was initially tagged with a "strange" data type, and so the hardware produced a so-called "Typenkennungs-Alarm"). I believe that most of the rumour that mainframe applications are more "stable" than applications on other platforms comes from this property of the decimal data type, and from the fact, that most applications are written in COBOL and use this data type, so that such errors are detected during testing stage. The more decimal data you have in your applications, the more stable are your applications. This could also be one of the reasons for the programming language C being not so stable (among others, like pointer arithmetic, no control of subscripts etc): the absence of decimal arithmetic in C - normally. I'm not sure, if I told you already: in our shop, we run the PL/1 applications in production with SUBSCRIPTRANGE enabled since some years ago, and we are very happy with this. The performance is acceptable. Kind regards Bernd -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN