Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread Ted MacNEIL
>I submit that many of those TCO studies don't include the cost of personel and >the resources required to support that inflated staff. You'll get absolutely no argument from me on that one, having done a few studies, myself. In general, if it doesn't support management's agenda, it won't be inc

Re: COBOL - no longer being taught - is a problem

2010-04-23 Thread Ed Gould
-SNIP- DYL280 has a VERY strong set of procedural capabilities including bit manipulation, the ability to use COBOL record descriptions, SORT verb, etc. I have used it to reformat SMF 30 records and play with directory b

O/T IBM Research Creates Worlds Smallest 3D Map

2010-04-23 Thread Ed Gould
http://www.youtube.com/watch?v=mZ9J0EYUlhg Sounds interesting wonder what will happen as a result in a few years. Ed -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with t

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread Rick Fochtman
Paul Gilmartin wrote: On Fri, 23 Apr 2010 18:32:24 +0800, David Crayford wrote: I would like to see those TCO studies. Truth is there are a lot of companies (big ones included) that are moving off mainframes to reduce the TCO. Those "distributed" systems come in "very" big iron configuration

Re: Multiple SMS Data Classes?

2010-04-23 Thread Don Williams
When the economy recovers and we have money in budget for things like Share, then they might let me look at ACC. > -Original Message- > From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On > Behalf Of Ron Hawkins > Sent: Friday, April 23, 2010 8:34 PM > To: IBM-MAIN@bama.u

Re: Multiple SMS Data Classes?

2010-04-23 Thread Ron Hawkins
Don, You can spoof this with a product like Allocation Control Centre. Where required ACC can programmatically tailor the allocation you require using a combination of altered JCL/IDCAMS and generic DATACLASSES. The actual JCL does not have to change. ACC acts like an exit and changes it before a

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Don Leahy
Can they run the application under ISPF dialog test? Do the application's PF keys use an ISPF command table? On Fri, Apr 23, 2010 at 16:25, Bathmaker, Jon wrote: > Hi Tom, > > We redefine all 24 PF keys so the SPLIT key disappears and we do CONTROL > MAIN in the CLIST to prevent PA interruptions

Re: ACCEPT and RELFILES deleted

2010-04-23 Thread Paul Gilmartin
On Fri, 23 Apr 2010 17:01:29 -0400, Robert A. Rosenberg wrote: >At 10:54 -0500 on 04/23/2010, Tom Marchant wrote about Re: ACCEPT and >RELFILES deleted: > >>I have always considered the possibility of cloning an additional DLIB zone >>for those cases where I needed to restore some maintenance but

Multiple SMS Data Classes?

2010-04-23 Thread Don Williams
Over time, we are creating more and more data classes. Typically, it is some problem that prompts us to create a new data class. It is not practical or even desirable to try to pre-create data classes for all of the "reasonable" combinations of parameters that a data class can provide. There would

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Tony Harminc
On 23 April 2010 16:25, Bathmaker, Jon wrote: > We redefine all 24 PF keys so the SPLIT key disappears and we do CONTROL > MAIN in the CLIST to prevent PA interruptions from giving them control. > > There's nowhere to enter normal commands so that can't be done. > Everything is PF key driven. The

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Jim Mulder
IBM Mainframe Discussion List wrote on 04/23/2010 04:25:24 PM: > We redefine all 24 PF keys so the SPLIT key disappears and we do CONTROL > MAIN in the CLIST to prevent PA interruptions from giving them control. > > There's nowhere to enter normal commands so that can't be done. > Everything i

Re: ACCEPT and RELFILES deleted

2010-04-23 Thread Robert A. Rosenberg
At 10:54 -0500 on 04/23/2010, Tom Marchant wrote about Re: ACCEPT and RELFILES deleted: I have always considered the possibility of cloning an additional DLIB zone for those cases where I needed to restore some maintenance but couldn't because of prereqs. This points out what is IMO a MAJOR d

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Bathmaker, Jon
That's interesting ! Thanks. You're right that C-S would not permit an anything in their system that would compromise security. They are managed very conservatively, which is why they suffered a lot less than the other major banks. They're also very serious about auditing and unlike most places, r

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Brian Peterson
My opinion There are bits in control blocks which will allow the access you seek. An exit, such as an ACF2 exit, would have authority to fiddle with those bits. The control block(s) involved are protected by storage protect key - thus to fiddle with those bits requires APF authorization and/

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Bathmaker, Jon
Hi Tom, We redefine all 24 PF keys so the SPLIT key disappears and we do CONTROL MAIN in the CLIST to prevent PA interruptions from giving them control. There's nowhere to enter normal commands so that can't be done. Everything is PF key driven. They can do low level ACF2 admin and that's it. I

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Ray Overby
ACF2 SECURITY attribute allows insert, change, delete of any ACF2 database record. It also changes an access violation to an allow and log (assuming requester does not have authority from some other source). It is pretty powerful... You would not be able to turn off ACF2 checking other th

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread McKown, John
> -Original Message- > From: IBM Mainframe Discussion List > [mailto:ibm-m...@bama.ua.edu] On Behalf Of Schwarz, Barry A > Sent: Friday, April 23, 2010 2:46 PM > To: IBM-MAIN@bama.ua.edu > Subject: Re: Turning on ACF2 SECURITY Privilege through an exit . . . > > Isn't it even a bigger pro

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Schwarz, Barry A
Isn't it even a bigger problem? The only purpose of having the authority is to issue the commands that require the authority. What prevents such an authorized user from issuing commands that make other users privileged? Or create a new user account with privileges that is not so restricted to

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Tom Marchant
On Fri, 23 Apr 2010 11:20:04 -0400, Bathmaker, Jon wrote: > >We want the users to have the SECURITY privilege while they are using an >ISPF application and ONLY while they are using this app. How do you prevent the user from using split screen to invoke another application while your app is activ

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Ray Overby
The CA ACF2 R14 system programmers guide chapter 7 user exits should contain most of the doc on ACF2 exits. I believe you should look at VLDEXIT (dataset and program preval exit) and RSCXIT1 (resource preval exit). With these exits you could "simulate" SECURITY authority. Elliot, David wrote:

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread McKown, John
> -Original Message- > From: IBM Mainframe Discussion List > [mailto:ibm-m...@bama.ua.edu] On Behalf Of Ted MacNEIL > Sent: Friday, April 23, 2010 1:32 PM > To: IBM-MAIN@bama.ua.edu > Subject: Re: Turning on ACF2 SECURITY Privilege through an exit . . . > > >I wanted an ACF2 exit, not gen

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Ted MacNEIL
>I wanted an ACF2 exit, not general advice. Thanks. Awfully snitty for somebody getting things for free. People are trying to help. They would be remiss if they didn't point issues out. They're trying to help, not hinder. Besides, why should they write your exit for you? There is nothing compuls

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Elliot, David
It was an absurd discussion anyway even by Friday afternoon standards. At least now we know why the land of cow bells and cuckoo clocks needs to keep it's banking activities a secret. I must remember not to put any money in that bank! David Elliot zSeries Software Support -Original Mes

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Bathmaker, Jon
I can handle the truth. It's the smoke and mirrors which bugs me ! Regards, Jon IBM Certified zSeries Technical Specialist, Senior Systems Programmer RDO Americas - Workspace Security D: 212-325-4714 M: 519-500-7927 -Original Message- From: IBM Mainframe Discussion List [mailto:ib

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Bathmaker, Jon
LOL. Point taken ! Regards, Jon IBM Certified zSeries Technical Specialist, Senior Systems Programmer RDO Americas - Workspace Security D: 212-325-4714 M: 519-500-7927 -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Kirk Wolf Sent:

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Natarajan Mohan
Jon, Do you have ETFA from EKC? If the product is available for you then there is a facility called FIRECALL. You could use that to accomplish and its protected by resource rule and bit on users TSO profile. I am sure you can accomplish the same using ACF2 logon processing exits. Natarajan On 0

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Walt Farrell
On Fri, 23 Apr 2010 14:01:38 -0400, Bathmaker, Jon wrote: >I wanted an ACF2 exit, not general advice. Thanks. I can only comment in the context of RACF, not ACF2. With RACF there are exits where you could make RACF pretend a user had an extraordinary authority while the exit thinks some applica

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Tony @ Comcast
LOL ! following a guideline of the thread relating to the question. ;-) -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Kirk Wolf Sent: Friday, April 23, 2010 1:08 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Turning on ACF2 SECURI

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread McKown, John
> -Original Message- > From: IBM Mainframe Discussion List > [mailto:ibm-m...@bama.ua.edu] On Behalf Of Kirk Wolf > Sent: Friday, April 23, 2010 1:08 PM > To: IBM-MAIN@bama.ua.edu > Subject: Re: Turning on ACF2 SECURITY Privilege through an exit . . . > > On Fri, Apr 23, 2010 at 1:01 PM,

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Kirk Wolf
On Fri, Apr 23, 2010 at 1:01 PM, Bathmaker, Jon wrote: > Tony, > > I wanted an ACF2 exit, not general advice. Thanks. > You think you only get what you ask for on IBM-MAIN? Be happy if the thread even remotely relates to your question :-) --

Re: COBOL - no longer being taught - is a problem

2010-04-23 Thread Mike Baldwin
On Thu, 22 Apr 2010 05:47:27 -0500, Jim Elliott, IBM wrote: >The specific department involved here regarding DMSII >(Human Resources Development Canada, HRDC) is running an older UNISYS >environment. Funny, while working on a report today (for the government), I ran across a request to run our s

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Bathmaker, Jon
Tony, I wanted an ACF2 exit, not general advice. Thanks. Regards, Jon IBM Certified zSeries Technical Specialist, Senior Systems Programmer RDO Americas - Workspace Security D: 212-325-4714 M: 519-500-7927 -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bam

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Tony @ Comcast
It's been many years since I've worked at an ACF2 shop so my comments must be viewed in the contexts of RACF or Top Secret, products I am familiar with. Another poster likened ACF2's security privilege as being quite powerful. That being the case, I'd recommend that you ruthlessly restrict and gu

Re: Calling unauthorized code from an authorized address space

2010-04-23 Thread Walt Farrell
On Thu, 22 Apr 2010 19:19:29 +0100, Sam Siegel wrote: >The requirements exists because I'm trying to write something that will be >Ziip enabled and leased as a product. > >Prior to passing the buffer to a work queue for the SRB, there is the >possibility that the user (which can be a normal progr

Re: Calling unauthorized code from an authorized address space

2010-04-23 Thread Sam Siegel
> > > If you keep the privileged part completely separate from the non-privileged > part then you will still have quite a lot of work to do, but you are at > least in with a shot of making it work out. Every other scheme that you (or > anyone else) can come up with will fail. I promise. > I see

Re: DCOLLECT QUESTION

2010-04-23 Thread John Dawes
Darth,   Thanks very much for your help.  Your suggestions worked.   Thanks again --- On Fri, 23/4/10, Darth Keller wrote: From: Darth Keller Subject: Re: DCOLLECT QUESTION To: IBM-MAIN@bama.ua.edu Received: Friday, 23 April, 2010, 4:24 AM >>I am using the DATA SET SELECTION ENTRY PANEL i.e

Re: Calling unauthorized code from an authorized address space

2010-04-23 Thread Chris Craddock
Oh geez... On Fri, Apr 23, 2010 at 8:41 AM, Sam Siegel wrote: > On Fri, Apr 23, 2010 at 1:05 PM, Peter Relson wrote: > > > By definition, the subject seems to me to be an oxymoron. > Yes exactly!!! > Yes ... I agree that the subject lines is not properly worded and is > technically incorrec

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Ray Overby
General comments on what is being asked for: - It appears poster is asking for a way to dynamically elevate security authority for an ISPF application. - The elevated security authority is about as high as it gets - With SECURITY you can do anything you want in an ACF2 system. - Are you s

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread McKown, John
> -Original Message- > From: IBM Mainframe Discussion List > [mailto:ibm-m...@bama.ua.edu] On Behalf Of Ray Overby > Sent: Friday, April 23, 2010 11:03 AM > To: IBM-MAIN@bama.ua.edu > Subject: Re: Turning on ACF2 SECURITY Privilege through an exit . . . > > ACF2 Security privilege is a co

Re: ACCEPT and RELFILES deleted

2010-04-23 Thread Mark Zelden
On Fri, 23 Apr 2010 10:54:09 -0500, Tom Marchant wrote: >On Fri, 23 Apr 2010 09:03:02 -0500, Mark Zelden wrote: > >> >>I share the a single global but multiple target / 2 different dlib zones for >>the 2 >>companies I support at my client. You have to set the options to NOPURGE >>and run REJECT

Re: Stopping zOS

2010-04-23 Thread John Mattson
On my sandbox lpar, I do 1) $PJES2,ABEND and reply END 2) V GRS(TEST),Q 3) if any other systems in grs... V GRS(TEST),P and reply YES 4) go to HMC, do SYSTEM RESET CLEAR and it is really STOPPED. One would bring a production system down more gracefully, of course, but SYSTEM RESET CLEAR at

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Ray Overby
ACF2 Security privilege is a combination of RACF SYSTEM SPECIAL + SYSTEM OPERATIONS McKown, John wrote: -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Bathmaker, Jon Sent: Friday, April 23, 2010 10:20 AM To: IBM-MAIN@bama.ua.edu Subje

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread McKown, John
> -Original Message- > From: IBM Mainframe Discussion List > [mailto:ibm-m...@bama.ua.edu] On Behalf Of Bathmaker, Jon > Sent: Friday, April 23, 2010 10:20 AM > To: IBM-MAIN@bama.ua.edu > Subject: Re: Turning on ACF2 SECURITY Privilege through an exit . . . > > Hi Tony, > > We want the

Re: ACCEPT and RELFILES deleted

2010-04-23 Thread Tom Marchant
On Fri, 23 Apr 2010 09:03:02 -0500, Mark Zelden wrote: > >I share the a single global but multiple target / 2 different dlib zones for >the 2 >companies I support at my client. You have to set the options to NOPURGE >and run REJECT in purge mode to clean up. Otherwise once you accept in >one env

Re: Repro Variable blocked records

2010-04-23 Thread Scott Rowe
Yes, and I believe it even warns you that it is going to do just that. >>> Joe Reichman 4/23/2010 11:34 AM >>> Found the problem If go into ISPF/EDIT on the ds it chops off trailing blanks Thankx Sent from my iPhone On Apr 23, 2010, at 9:48 AM, Paul Gilmartin wrote: > On Fri, 23 Apr 2010

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Tony Harminc
On 23 April 2010 11:20, Bathmaker, Jon wrote: > Hi Tony, I'm another Tony, but... > We want the users to have the SECURITY privilege while they are using an > ISPF application and ONLY while they are using this app. If we grant > them SECURITY using a command they will have that privilege the n

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Mark Zelden
On Fri, 23 Apr 2010 10:55:52 -0400, Bathmaker, Jon wrote: >Hi All, > >We have a need to grant security to a class of users they log on to a >specific app. We want them to lose it when they log off. > >Ideally there will be a nice exit somewhere where we can set the >security bit in memory just af

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread John P Kalinich
Are they updating the ACF2 databases in this special app? Regards, John K From: "Bathmaker, Jon"

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread McKown, John
> -Original Message- > From: IBM Mainframe Discussion List > [mailto:ibm-m...@bama.ua.edu] On Behalf Of Tony @ Comcast > Sent: Friday, April 23, 2010 10:13 AM > To: IBM-MAIN@bama.ua.edu > Subject: Re: Turning on ACF2 SECURITY Privilege through an exit . . . > > Is this Friday humor or am

Re: Repro Variable blocked records

2010-04-23 Thread Joe Reichman
Found the problem If go into ISPF/EDIT on the ds it chops off trailing blanks Thankx Sent from my iPhone On Apr 23, 2010, at 9:48 AM, Paul Gilmartin wrote: On Fri, 23 Apr 2010 06:16:57 -0500, Jim Marshall wrote: I am reproing a VB qsam file to Variable KSDS When I look the VB qsam in I

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread David Crayford
Paul Gilmartin wrote: On Fri, 23 Apr 2010 18:32:24 +0800, David Crayford wrote: I would like to see those TCO studies. Truth is there are a lot of companies (big ones included) that are moving off mainframes to reduce the TCO. Those "distributed" systems come in "very" big iron configurations

Re: Calling unauthorized code from an authorized address space

2010-04-23 Thread Tony Harminc
On 23 April 2010 09:41, Sam Siegel wrote: > Now a question about TCB creation.  After control is returned from the > problem state program to the caller, it should be possible to see if it > ATTACHed any new TCBs.  If new TCBs were created, I could abend the entire > process instead of flipping t

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Bathmaker, Jon
Hi Tony, We want the users to have the SECURITY privilege while they are using an ISPF application and ONLY while they are using this app. If we grant them SECURITY using a command they will have that privilege the next time they logon to TSO, regardless of the app., and that 'would be wrong' (as

Re: Multiple logon SMCS possibility

2010-04-23 Thread Don Williams
Several years ago, I asked IBM why they prohibit users from concurrent sign-on to multiple consoles, and was told that it is working as designed. He noted that I was not the first to complain. I hope that IBM will change their design and allow users to sign-on to multiple consoles. Until then, you'

Re: Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Tony @ Comcast
Is this Friday humor or am I misinterpreting the question? What's the point of "losing it" after they log off. How could they possibly access anything after they log off (unless they submitted some batch jobs while logged on?). Should their batch jobs lose their authorization after EOJ? Where's

Turning on ACF2 SECURITY Privilege through an exit . . .

2010-04-23 Thread Bathmaker, Jon
Hi All, We have a need to grant security to a class of users they log on to a specific app. We want them to lose it when they log off. Ideally there will be a nice exit somewhere where we can set the security bit in memory just after the user has logged onto the app. Thanks. Best Regards, Jon

Re: WLM question

2010-04-23 Thread Vernooij, CP - SPLXM
"Jim McAlpine" wrote in message news:... > On Fri, Apr 23, 2010 at 11:16 AM, Jim McAlpine wrote: > > > > > > > On Fri, Apr 23, 2010 at 10:54 AM, Jim McAlpine wrote: > > > >> > >>> > >> > >> So can I still have the response time goals and add the resource cap or > >> is it one or the other. > >>

Re: Stopping zOS

2010-04-23 Thread carlos roberto visconde
After stop sub-system, Z EOD, V XCF,,... ZOS is stoped, no I/O is running, what you need more? 2010/4/21 Elardus Engelbrecht > Vernooij, CP wrote: > > >After stopping all these subsystems, z/OS is still running. ;-) > > running, running and running while waiting for that magic command: Z EOD

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread R.S.
Ted MacNEIL pisze: I bet the number of customers migrated off the mainframe is higher than number of new customers. Sucker bet! Can you prove it? Nobody will/has ever published the number of mainframes (or even mainframe shops) in use. Somebody observe world around. Noticed many shops clos

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread Ted MacNEIL
>TCA is usually _the only_ part considered and that is why you can see so many x86 servers there. That I disagree with, because I've been involved in some studies. >They are cheap to buy, so TCA is low. Individually, they are cheap to buy. But, when you need 1-3 for production, 1-2 for QA, 1 for

Re: Calling unauthorized code from an authorized address space

2010-04-23 Thread Sam Siegel
On Fri, Apr 23, 2010 at 3:04 PM, Rob Scott wrote: > >If this was true, would it be acceptable to turn the JSCBAUTH bit back on? > > No > > Take a (google) look through the archives of IBM-MAIN for discussions that > include any of the following keywords : > >JSCBAUTH >Magic SVCs >

Re: Calling unauthorized code from an authorized address space

2010-04-23 Thread Rob Scott
>If this was true, would it be acceptable to turn the JSCBAUTH bit back on? No Take a (google) look through the archives of IBM-MAIN for discussions that include any of the following keywords : JSCBAUTH Magic SVCs AUTHON SVCs JSCBAUTH flipping is a "no-no" - do not go t

Re: ACCEPT and RELFILES deleted

2010-04-23 Thread Mark Zelden
On Fri, 23 Apr 2010 09:33:29 -0400, Pinnacle wrote: >- Original Message - >From: "R.S." >Newsgroups: bit.listserv.ibm-main >Sent: Friday, April 23, 2010 9:27 AM >Subject: ACCEPT and RELFILES deleted > > >> Relfiles are deleted after succesful ACCEPT and then unavailable for other >> zone

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread Anne & Lynn Wheeler
paulgboul...@aim.com (Paul Gilmartin) writes: > I don't understand what you see as "sad". Do you consider it likewise > sad that in some respects the F-22 Raptor outperforms the Ford Model T? > (Well, not TCO, but for the F-22 TCO is not the primary objective.) i periodically referenced that i sp

Re: Another Receive Order Problem

2010-04-23 Thread Paul Gilmartin
On Fri, 23 Apr 2010 09:29:39 -0400, Kurt Quackenbush wrote: > >> Or copy the ZFS files, and retry the RECEIVE ORDER. It should detect that >> the files have already been transferred and resume from the point of failure. > >Just a point of clarification... If the transfer was complete for all >file

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread Marian Gasparovic
Ted, I have to disagree. TCA is usually _the only_ part considered and that is why you can see so many x86 servers there. They are cheap to buy, so TCA is low. But administering many of them is different story, which is covered in TCO. Marian Gasparovic IBM Slovakia On Fri, Apr 23, 2010 at 3:46 P

Re: Callin g unauthor ized code from an au thorized a d dress spa ce‏

2010-04-23 Thread Charles Mills
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of john gilmore Sent: Friday, April 23, 2010 6:28 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Callin g unauthor ized code from an au thorized a ddress spa ce‏ The first is that IBM's OCO policy h

Re: WLM question

2010-04-23 Thread Mark Zelden
You can do as Kees said. But in WLM you put your goals according to your business objectives. I have worked and work on Dallas systems (or P390 / FLEX) also and the most important work in that environment (other than the OS tasks) is usually TSO. So you might want to consider changing TSO to Im

Re: Calling unauthorized code from an authorized address space

2010-04-23 Thread Binyamin Dissen
On Fri, 23 Apr 2010 14:41:55 +0100 Sam Siegel wrote: :>On Fri, Apr 23, 2010 at 1:05 PM, Peter Relson wrote: :>> By definition, the subject seems to me to be an oxymoron. :>Yes ... I agree that the subject lines is not properly worded and is :>technically incorrect ... I'm pretty sure that the

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread Ted MacNEIL
> I bet the number of customers migrated off the mainframe is higher than > number of new customers. Sucker bet! Nobody will/has ever published the number of mainframes (or even mainframe shops) in use. - Too busy driving to stop for gas!

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread Ted MacNEIL
>We also know that the answer "but the number of MIPS is growing" is smokescreen - number of MIPS on my desktop grew up significantly, but the number of PCs remained the same. The number of mainframes remain the same, or shrink. But, I can do more with my mainframe than you can do with your PC.

Re: Repro Variable blocked records

2010-04-23 Thread Paul Gilmartin
On Fri, 23 Apr 2010 06:16:57 -0500, Jim Marshall wrote: >>I am reproing a VB qsam file to Variable KSDS >>When I look the VB qsam in ISPF there are 50 trailing blanks at the >>end of the record However after the repro >>The 50 trailing blanks get trucated >> >Had the same problem debugging some VB

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread Ted MacNEIL
>I would like to see those TCO studies. TCO is one of most political things out there. One thing that is always missed is TCA. - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instruction

Re: Calling unauthorized code from an authorized address space

2010-04-23 Thread Sam Siegel
On Fri, Apr 23, 2010 at 1:16 AM, Tony Harminc wrote: > On 22 April 2010 14:19, Sam Siegel wrote: > > > The requirements exists because I'm trying to write something that will > be > > Ziip enabled and leased as a product. > > > > Prior to passing the buffer to a work queue for the SRB, there is

Re: WLM question

2010-04-23 Thread Ted MacNEIL
>Is there a way to limit the cpu resources used by CICS in this scenario. Yes. Use region goals, and a resource group. I assume it's not production, or else you have to live with it. - Too busy driving to stop for gas! -- For IBM

Re: Callin g unauthor ized code from an au thorized a d dress spa ce‏

2010-04-23 Thread McKown, John
> -Original Message- > From: IBM Mainframe Discussion List > [mailto:ibm-m...@bama.ua.edu] On Behalf Of john gilmore > Sent: Friday, April 23, 2010 8:28 AM > To: IBM-MAIN@bama.ua.edu > Subject: Re: Callin g unauthor ized code from an au thorized > a ddress spa ce‏ > > Chris Craddock writ

Re: Calling unauthorized code from an authorized address space

2010-04-23 Thread Sam Siegel
On Fri, Apr 23, 2010 at 1:05 PM, Peter Relson wrote: > By definition, the subject seems to me to be an oxymoron. > Yes ... I agree that the subject lines is not properly worded and is technically incorrect ... I'm pretty sure that the intent was understood. :) > > An authorized address space ha

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread Paul Gilmartin
On Fri, 23 Apr 2010 18:32:24 +0800, David Crayford wrote: > >I would like to see those TCO studies. Truth is there are a lot of >companies (big ones included) that are moving >off mainframes to reduce the TCO. Those "distributed" systems come in >"very" big iron configurations and are >starting to

Re: COBOL - no longer being taught - is a problem

2010-04-23 Thread Miller, Robert W (GE Tech Infra, US)
There is at least one college that is continuing mainframe education, please see http://www.mainframezone.com/it-management/historic-marist-college-embra ces-mainframes-future. For one, I look forward to using my "dead" mainframe skills to make my retirement a bit easier. Maybe then I will again

Re: ACCEPT and RELFILES deleted

2010-04-23 Thread Kurt Quackenbush
Relfiles are deleted after succesful ACCEPT and then unavailable for other zones. What can I do in SMP/E to avoid deletion of relfiles? Set the NOPURGE subentry in your active OPTIONS entry. NOPURGE tells ACCEPT processing to keep SYSMOD entries in the global zone, MCS in the SMPPTS, and the

Re: ACCEPT and RELFILES deleted

2010-04-23 Thread Pinnacle
- Original Message - From: "R.S." Newsgroups: bit.listserv.ibm-main Sent: Friday, April 23, 2010 9:27 AM Subject: ACCEPT and RELFILES deleted Relfiles are deleted after succesful ACCEPT and then unavailable for other zones. What can I do in SMP/E to avoid deletion of relfiles? --

Re: ACCEPT and RELFILES deleted

2010-04-23 Thread R.S.
R.S. pisze: Relfiles are deleted after succesful ACCEPT and then unavailable for other zones. What can I do in SMP/E to avoid deletion of relfiles? Just found it: NOPURGE in OPTions. -- Radoslaw Skorupka Lodz, Poland -- BRE Bank SA ul. Senatorska 18 00-950 Warszawa www.brebank.pl Sąd Rejo

Re: Another Receive Order Problem

2010-04-23 Thread Kurt Quackenbush
At this point, the transfer should have been complete. Try a RECEIVE FROMNTS, possibly with a bigger SMPWKDIR. Exactly. Or copy the ZFS files, and retry the RECEIVE ORDER. It should detect that the files have already been transferred and resume from the point of failure. Just a point of cl

Re: Callin g unauthor ized code from an au thorized a ddress spa ce‏

2010-04-23 Thread john gilmore
Chris Craddock writes: | The big problem is that this platform has evolved over 45 | years or so. Back when it started out nobody knew about | integrity and there wasn't a lot of difference between the | programming environment seen by the system and the | application. As time passed things g

ACCEPT and RELFILES deleted

2010-04-23 Thread R.S.
Relfiles are deleted after succesful ACCEPT and then unavailable for other zones. What can I do in SMP/E to avoid deletion of relfiles? -- Radoslaw Skorupka Lodz, Poland -- BRE Bank SA ul. Senatorska 18 00-950 Warszawa www.brebank.pl Sąd Rejonowy dla m. st. Warszawy XII Wydział Gospodarczy K

Re: Mainframe Applications Development using a modern GUI

2010-04-23 Thread Chase, John
> -Original Message- > From: IBM Mainframe Discussion List On Behalf Of Eyal Rothfeld > > Does anybody know any new technologies which can be used in order to > develop new modern applications for the mainframe platform ? > > IBM offers EGL ( http://en.wikipedia.org/wiki/EGL_%28programmin

Re: SYSMDUMP complete ?

2010-04-23 Thread Binyamin Dissen
On Fri, 23 Apr 2010 14:12:17 +0200 Miklos Szigetvari wrote: :>What is this "LDUMP" ? :>Never heard Sorry. LISTDUMP. It is an IPCS subcommand. :>On 4/23/2010 1:16 PM, Binyamin Dissen wrote: :>> On Fri, 23 Apr 2010 11:36:57 +0200 Miklos Szigetvari :>> wrote: :>> :>Any standard method to check

Re: SYSMDUMP complete ?

2010-04-23 Thread Miklos Szigetvari
Hi What is this "LDUMP" ? Never heard On 4/23/2010 1:16 PM, Binyamin Dissen wrote: On Fri, 23 Apr 2010 11:36:57 +0200 Miklos Szigetvari wrote: :>Any standard method to check , if a SYSMDUMP is complete(full) or not? :>We got a number of core and SYSMDUMPs from our customers , and sometimes

Re: COBOL - no longer being taught - is a problem

2010-04-23 Thread Chase, John
> -Original Message- > From: IBM Mainframe Discussion List On Behalf Of J R > > > He's actually a she -- Sheila Fraser. > > Not that there's anything wrong with that! Just goes to show that this kind of mind pollution is gender-agnostic. -jc- ---

Re: Calling unauthorized code from an authorized address space

2010-04-23 Thread Peter Relson
By definition, the subject seems to me to be an oxymoron. An authorized address space has JSCBAUTH on. There can be no unauthorized code running in such a situatino. Now, if you meant a space in which JSCBAUTH is not on (perhaps it was on) and there are tasks that are supervisor state and/or sy

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread R.S.
Richards, Robert B. pisze: I bet the number of customers migrated off the mainframe is higher than number of new customers. And I bet that most of those decisions probably cost those companies MORE money in the long term. Isn't management by magazine great? :-( Again, the above does not ne

Re: COBOL - no longer being taught - is a problem

2010-04-23 Thread Chase, John
> -Original Message- > From: IBM Mainframe Discussion List [On Behalf Of Kirk Wolf > > [ snip ] Please...its much easier for them to > blame their problems on COBOL than to admit that they have done a > crappy job managing their legacy assets. At each step in maintenance > it is always

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread Richards, Robert B.
> I bet the number of customers migrated off the mainframe is higher than > number of new customers. And I bet that most of those decisions probably cost those companies MORE money in the long term. Isn't management by magazine great? :-( Bob -Original Message- From: IBM Mainframe Di

Re: ADRNAPF was IEBCOP Y losing APF authori sation i n mi ddle of JOB - etc

2010-04-23 Thread Peter Relson
ADRNAPF: this is provided for only one non-system case -- loading non-executable code which, for some reason, the authorized application does not need protection against modification. It is definitely not appropriate to use it for loading code that you will then call (although I suppose you cou

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread R.S.
Richards, Robert B. pisze: Bang! For passing biased opinions! :-) TCO studies are not always commissioned with predicable conclusions. Lots are done in-house. In-house TCO studies can also be biased. Of course that general remark, YMMV. And if you have ever seen stupidity in action on TCO j

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread Richards, Robert B.
Bang! For passing biased opinions! :-) TCO studies are not always commissioned with predicable conclusions. Lots are done in-house. And if you have ever seen stupidity in action on TCO just look at any datacenter that has an "acre" of racks of blades and tell me that those onesies and twosies

Re: SYSMDUMP complete ?

2010-04-23 Thread Binyamin Dissen
On Fri, 23 Apr 2010 11:36:57 +0200 Miklos Szigetvari wrote: :>Any standard method to check , if a SYSMDUMP is complete(full) or not? :>We got a number of core and SYSMDUMPs from our customers , and sometimes :>the dump is incomplete (no disk space etc. ) You can run LDUMP to see what is in it.

Re: Repro Variable blocked records

2010-04-23 Thread Jim Marshall
>I am reproing a VB qsam file to Variable KSDS >When I look the VB qsam in ISPF there are 50 trailing blanks at the >end of the record However after the repro >The 50 trailing blanks get trucated > Had the same problem debugging some VB data and learned ISPF lies to you and makes you think there a

Re: 25 reasons why hardware is still hot at IBM

2010-04-23 Thread R.S.
David Crayford pisze: Marian Gasparovic wrote: But I see TCO studies that show how System z is competitive and how customers can save money running on z instead of distributed. I would like to see those TCO studies. Truth is there are a lot of companies (big ones included) that are moving

Re: WLM question

2010-04-23 Thread Jim McAlpine
On Fri, Apr 23, 2010 at 11:16 AM, Jim McAlpine wrote: > > > On Fri, Apr 23, 2010 at 10:54 AM, Jim McAlpine wrote: > >> >>> >> >> So can I still have the response time goals and add the resource cap or >> is it one or the other. >> >> Jim McAlpine >> > > It's OK, I've found what I wanted. > > Jim

  1   2   >