Hi Paul,
In respect of your query about EXCP with DEB:
Hello: Does anyone have any sample code that does I/O (read only) by manually
building a DEB? (Bypassing OPEN and CLOSE.) ..
I want to be able to read the directory blocks of a PDS via EXCP in this
manner.
I cannot answer your
On Saturday 19 August 2006 01:26, Paul Schuster wrote:
Does anyone have any sample code that does I/O (read only)
by manually building a DEB? (Bypassing OPEN and CLOSE.)
See section K0EXCP in ShowMVS which is used to read the first blocks of
the PLPA page data set to extract the date of last
In a message dated 8/19/2006 1:23:40 A.M. Central Daylight Time,
[EMAIL PROTECTED] writes:
Does anyone have any sample code that does I/O (read only) by
manually building a DEB? (Bypassing OPEN and CLOSE.)
I have only general comments and not specific code samples to offer.
Of course
Bill Fairchild has told you the most important thing you need to know.
There are ways to do what you want to do. They would be APARable as z/OS
security breaches if they werje described in sufficient detail to be usable.
The presence of bank vaults in the world means that there must also be
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of john gilmore
Sent: Saturday, August 19, 2006 9:14 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: EXCP with a DEB
Bill Fairchild has told you the most important thing you need to know.
There
The greatest software has to obviously be Datacom from C/A. .
I don't understand why this wasn't mentioned earlier than this.
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL
Kuredjian, Michael wrote:
Is it possible to display more than 27x132 characters at a time through a 3270
emulator?
For users that need to use TSO/ISPF, I recommend 51x80 primary (default)
screen size and either 51x132 or 62x132 alternate screen size. Once
APAR* OA17477* closes, I will
In a recent note, john gilmore said:
Date: Sat, 19 Aug 2006 15:14:20 +
There are ways to do what you want to do. They would be APARable as z/OS
security breaches if they werje described in sufficient detail to be usable.
The presence of bank vaults in the world means that
In a message dated 8/19/2006 10:22:08 A.M. Central Daylight Time,
[EMAIL PROTECTED] writes:
The only security breach would be granting authorization to an adversary
to use an APF library or installing a user SVC. That's not a z/OS issue;
it's site policy issue. By definition, an
On Saturday 19 August 2006 11:14, john gilmore wrote:
There are ways to do what you want to do. They would be APARable as
z/OS security breaches if they were described in sufficient detail
to be usable.
What you describe is security through obscurity.
I believe most people on this list
In a message dated 8/19/2006 9:12:58 A.M. Central Standard Time,
[EMAIL PROTECTED] writes:
There were, although Micro-soft [sic] was quite early to the party because
they produced the BASIC implementation for the Altair, arguably the world's
first personal computer. (There's some debate
Is here anyone with good knowledge about internals of Enterprise PL/I??
Before Enterprise PL/I ALL PL/I Versions uses the first two Bytes of the
DSA resp. CEEDSA for Flags (i.e.: Dummy DSA, Begin-, On-Unit, Proc-DSA
etc.). But since Enterprise these Bytes are unused.
I have an Module which
Are you kidding?
We had CA Datacom installed for some CA product that we never used. Then, I
was going to upgrade CA11, and I found out that CA Datacom was required for
that. I installed the current version of Datacom at the time, but never got
it working before we stopped upgrading any of
Yes, I am kidding, check my previous posts on datacom for exactly (well,
maybe not exactly, this is a public forum after all), how I feel about it. .
datacom, the database of choice for large corporations like enron and
worldcom
- Original Message -
From: Eric N. Bielefeld [EMAIL
On Saturday 19 August 2006 12:10, [EMAIL PROTECTED] wrote:
The greatest software has to obviously be Datacom from C/A. .
Perhaps it would help it you told us why you think so?
BTW, Datacom was developed by ADR, not CA.
I don't understand why this wasn't mentioned earlier than this.
Perhaps
Robert,
It's hard to remember just what everyone says about every product. That
might be a good thing to keep in mind when saying something tongue in cheek,
myself included. With the number of people on this list who post regularly,
it's hard to remember just what each person said on a
Well, actually Datacom (both DB and the long forgotten DC) was developed by
Insyte Datacom before they were acquired by ADR. And, Insyte Datacom was
previously Computer Information Management (CIM), just for the complete
history. :)
Chuck Arney
illustro Systems International, LLC
not a problem. I completely agree with you ...i.e.,
I couldn't see any reason for installing the Datacom product other than CA
wanted people to use it so they required its use. I wasn't very impressed
with what I saw of it.
however, Not very impressed with datacom is a severe understatement
On Aug 19, 2006, at 1:46 PM, Robert Justice wrote:
Yes, I am kidding, check my previous posts on datacom for exactly
(well, maybe not exactly, this is a public forum after all), how I
feel about it. .
datacom, the database of choice for large corporations like enron
and worldcom
no they have not, you still need to run datacom to replace two ca11 files,
one pds, and one vsam.
Instead of saying here, make this one a pdse, and make this one an extended
vsam format vsam,
(and then maybe actually having c/a fix their world famous jehf lockout
problem), c/a in it's
Gilbert Saint-Flour writes:
What you describe is security through obscurity. I believe most people
on this list agree that it is
an ineffective way to protect a computer system.
and he may well be right that they do, although how he knows this is not
clear to me.
His view is
john gilmore wrote:
Gilbert Saint-Flour writes:
What you describe is security through obscurity. I believe most
people on this list agree that it is
an ineffective way to protect a computer system.
and he may well be right that they do, although how he knows this is not
clear to me.
I
== Paul Gilmartin == wrote2006-08-18 16:28:
In a recent note, Thomas Berg said:
Date: Fri, 18 Aug 2006 15:43:12 +0200
Yes, but at least regarding REXX I haven't found any mentionable
wartifications
.
Do You think of any specific points ?
o Absence of construct to
== Shmuel Metz (Seymour J.) == wrote2006-08-18 22:27:
In [EMAIL PROTECTED], on 08/18/2006
at 03:43 PM, Thomas Berg [EMAIL PROTECTED] said:
Yes, but at least regarding REXX I haven't found any mentionable
wartifications. Do You think of any specific points ?
Quite a few. See
Interesting. I knew that VM had to use some special instructions but not much
more.
Thomas Berg
== Thompson, Steve (SCI TW) == wrote2006-08-18 17:15:
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Thomas Berg
Sent: Friday,
In a recent note, Thomas Berg said:
Date: Sun, 20 Aug 2006 00:24:19 +0200
o Absence of construct to pass arguments by reference.
Right. Although I only really missed it when returning results sometimes.
Well, yes. That would be its use.
o Absence of facility to enumerate
In a recent note, john gilmore said:
Date: Sat, 19 Aug 2006 20:28:56 +
I have not exploited these weaknesses for fun or profit, and I will not do
so, but I cannot as a practical matter spend time writing up a PMR every
There are so many?
time I identify a possible security
On Sat, 19 Aug 2006 14:33:48 +0900, Timothy Sipples
[EMAIL PROTECTED] wrote:
Shmuel Metz writes:
Weren't there other early BASIC compiler/interpreter systems with
small footprints?
There were, although Micro-soft [sic] was quite early to the party because
they produced the BASIC implementation
In [EMAIL PROTECTED], on 08/19/2006
at 12:26 AM, Paul Schuster [EMAIL PROTECTED] said:
Hello: Does anyone have any sample code that does I/O (read only) by
manually building a DEB? (Bypassing OPEN and CLOSE.)
EXHIBIT and MVTDEBE did that; the latter should be on one of the mods
tapes. But why
In
[EMAIL PROTECTED],
on 08/18/2006
at 07:01 PM, Ted MacNEIL [EMAIL PROTECTED] said:
Considering you can only get 59 volumes on a multi-volume dataset 64
doesn't make sense.
It makes perfect sense if you know anything about JES2. You're making
an unwarranted assumption about JES2;
On Fri, 18 Aug 2006 07:21:49 +0800, Tommy Tsui [EMAIL PROTECTED] wrote:
thanks BOB and TOM briefly explanation..thanks again...
Under non-sms managed, we have to allocate some double journal VSAM file
into different volumes such as IBMA01, IBMB01, (for performance purpose)
In SMS managed, the two
Are you sure you still need to ensure that these two data sets go to different
volumes for performance reasons?
If it is a concern on today's DASD, you should be looking at other techniques
to improve performance, such as striped data sets.
I agree!
With Cache, PAV, buffers, faster DASD, you
A *LONG* time ago we had a user who created BDAM LIKE datasets. At
the time we could not back these dataset up with any known utilities
except for the ones supplied by the vendor.
When we looked at (at the time HSM) it didn't look like it supported
calling a user program to backup these data
33 matches
Mail list logo