>I submit that many of those TCO studies don't include the cost of personel and
>the resources required to support that inflated staff.
You'll get absolutely no argument from me on that one, having done a few
studies, myself.
In general, if it doesn't support management's agenda, it won't be inc
-SNIP-
DYL280 has a VERY strong set of procedural capabilities including bit
manipulation, the ability to use COBOL record descriptions, SORT verb,
etc. I have used it to reformat SMF 30 records and play with
directory b
http://www.youtube.com/watch?v=mZ9J0EYUlhg
Sounds interesting wonder what will happen as a result in a few years.
Ed
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with t
Paul Gilmartin wrote:
On Fri, 23 Apr 2010 18:32:24 +0800, David Crayford wrote:
I would like to see those TCO studies. Truth is there are a lot of
companies (big ones included) that are moving
off mainframes to reduce the TCO. Those "distributed" systems come in
"very" big iron configuration
When the economy recovers and we have money in budget for things like Share,
then they might let me look at ACC.
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Ron Hawkins
> Sent: Friday, April 23, 2010 8:34 PM
> To: IBM-MAIN@bama.u
Don,
You can spoof this with a product like Allocation Control Centre. Where
required ACC can programmatically tailor the allocation you require using a
combination of altered JCL/IDCAMS and generic DATACLASSES.
The actual JCL does not have to change. ACC acts like an exit and changes it
before a
Can they run the application under ISPF dialog test?
Do the application's PF keys use an ISPF command table?
On Fri, Apr 23, 2010 at 16:25, Bathmaker, Jon
wrote:
> Hi Tom,
>
> We redefine all 24 PF keys so the SPLIT key disappears and we do CONTROL
> MAIN in the CLIST to prevent PA interruptions
On Fri, 23 Apr 2010 17:01:29 -0400, Robert A. Rosenberg wrote:
>At 10:54 -0500 on 04/23/2010, Tom Marchant wrote about Re: ACCEPT and
>RELFILES deleted:
>
>>I have always considered the possibility of cloning an additional DLIB zone
>>for those cases where I needed to restore some maintenance but
Over time, we are creating more and more data classes. Typically, it is some
problem that prompts us to create a new data class. It is not practical or
even desirable to try to pre-create data classes for all of the "reasonable"
combinations of parameters that a data class can provide. There would
On 23 April 2010 16:25, Bathmaker, Jon wrote:
> We redefine all 24 PF keys so the SPLIT key disappears and we do CONTROL
> MAIN in the CLIST to prevent PA interruptions from giving them control.
>
> There's nowhere to enter normal commands so that can't be done.
> Everything is PF key driven. The
IBM Mainframe Discussion List wrote on 04/23/2010
04:25:24 PM:
> We redefine all 24 PF keys so the SPLIT key disappears and we do CONTROL
> MAIN in the CLIST to prevent PA interruptions from giving them control.
>
> There's nowhere to enter normal commands so that can't be done.
> Everything i
At 10:54 -0500 on 04/23/2010, Tom Marchant wrote about Re: ACCEPT and
RELFILES deleted:
I have always considered the possibility of cloning an additional DLIB zone
for those cases where I needed to restore some maintenance but couldn't
because of prereqs.
This points out what is IMO a MAJOR d
That's interesting ! Thanks.
You're right that C-S would not permit an anything in their system that
would compromise security. They are managed very conservatively, which
is why they suffered a lot less than the other major banks. They're also
very serious about auditing and unlike most places, r
My opinion
There are bits in control blocks which will allow the access you seek. An
exit, such as an ACF2 exit, would have authority to fiddle with those bits.
The control block(s) involved are protected by storage protect key - thus
to fiddle with those bits requires APF authorization and/
Hi Tom,
We redefine all 24 PF keys so the SPLIT key disappears and we do CONTROL
MAIN in the CLIST to prevent PA interruptions from giving them control.
There's nowhere to enter normal commands so that can't be done.
Everything is PF key driven. They can do low level ACF2 admin and that's
it.
I
ACF2 SECURITY attribute allows insert, change, delete of any ACF2
database record. It also changes an access violation to an allow and
log (assuming requester does not have authority from some other source).
It is pretty powerful...
You would not be able to turn off ACF2 checking other th
> -Original Message-
> From: IBM Mainframe Discussion List
> [mailto:ibm-m...@bama.ua.edu] On Behalf Of Schwarz, Barry A
> Sent: Friday, April 23, 2010 2:46 PM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: Turning on ACF2 SECURITY Privilege through an exit . . .
>
> Isn't it even a bigger pro
Isn't it even a bigger problem? The only purpose of having the authority is to
issue the commands that require the authority. What prevents such an
authorized user from issuing commands that make other users privileged? Or
create a new user account with privileges that is not so restricted to
On Fri, 23 Apr 2010 11:20:04 -0400, Bathmaker, Jon wrote:
>
>We want the users to have the SECURITY privilege while they are using an
>ISPF application and ONLY while they are using this app.
How do you prevent the user from using split screen to invoke
another application while your app is activ
The CA ACF2 R14 system programmers guide chapter 7 user exits should
contain most of the doc on ACF2 exits. I believe you should look at
VLDEXIT (dataset and program preval exit) and RSCXIT1 (resource preval
exit). With these exits you could "simulate" SECURITY authority.
Elliot, David wrote:
> -Original Message-
> From: IBM Mainframe Discussion List
> [mailto:ibm-m...@bama.ua.edu] On Behalf Of Ted MacNEIL
> Sent: Friday, April 23, 2010 1:32 PM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: Turning on ACF2 SECURITY Privilege through an exit . . .
>
> >I wanted an ACF2 exit, not gen
>I wanted an ACF2 exit, not general advice. Thanks.
Awfully snitty for somebody getting things for free.
People are trying to help.
They would be remiss if they didn't point issues out.
They're trying to help, not hinder.
Besides, why should they write your exit for you?
There is nothing compuls
It was an absurd discussion anyway even by Friday afternoon standards. At least
now we know why the land of cow bells and cuckoo clocks needs to keep it's
banking activities a secret. I must remember not to put any money in that bank!
David Elliot
zSeries Software Support
-Original Mes
I can handle the truth.
It's the smoke and mirrors which bugs me !
Regards,
Jon
IBM Certified zSeries Technical Specialist,
Senior Systems Programmer
RDO Americas - Workspace Security
D: 212-325-4714
M: 519-500-7927
-Original Message-
From: IBM Mainframe Discussion List [mailto:ib
LOL.
Point taken !
Regards,
Jon
IBM Certified zSeries Technical Specialist,
Senior Systems Programmer
RDO Americas - Workspace Security
D: 212-325-4714
M: 519-500-7927
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Kirk Wolf
Sent:
Jon,
Do you have ETFA from EKC? If the product is available for you then
there is a facility called FIRECALL. You could use that to accomplish
and its protected by resource rule and bit on users TSO profile. I am
sure you can accomplish the same using ACF2 logon processing exits.
Natarajan
On 0
On Fri, 23 Apr 2010 14:01:38 -0400, Bathmaker, Jon
wrote:
>I wanted an ACF2 exit, not general advice. Thanks.
I can only comment in the context of RACF, not ACF2. With RACF there are
exits where you could make RACF pretend a user had an extraordinary
authority while the exit thinks some applica
LOL !
following a guideline of the thread relating to the question. ;-)
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf
Of Kirk Wolf
Sent: Friday, April 23, 2010 1:08 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Turning on ACF2 SECURI
> -Original Message-
> From: IBM Mainframe Discussion List
> [mailto:ibm-m...@bama.ua.edu] On Behalf Of Kirk Wolf
> Sent: Friday, April 23, 2010 1:08 PM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: Turning on ACF2 SECURITY Privilege through an exit . . .
>
> On Fri, Apr 23, 2010 at 1:01 PM,
On Fri, Apr 23, 2010 at 1:01 PM, Bathmaker, Jon
wrote:
> Tony,
>
> I wanted an ACF2 exit, not general advice. Thanks.
>
You think you only get what you ask for on IBM-MAIN?
Be happy if the thread even remotely relates to your question :-)
--
On Thu, 22 Apr 2010 05:47:27 -0500, Jim Elliott, IBM
wrote:
>The specific department involved here regarding DMSII
>(Human Resources Development Canada, HRDC) is running an older UNISYS
>environment.
Funny, while working on a report today (for the government), I ran across a
request to run our s
Tony,
I wanted an ACF2 exit, not general advice. Thanks.
Regards,
Jon
IBM Certified zSeries Technical Specialist,
Senior Systems Programmer
RDO Americas - Workspace Security
D: 212-325-4714
M: 519-500-7927
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bam
It's been many years since I've worked at an ACF2 shop so my comments must
be viewed in the contexts of RACF or Top Secret, products I am familiar
with. Another poster likened ACF2's security privilege as being quite
powerful. That being the case, I'd recommend that you ruthlessly restrict
and gu
On Thu, 22 Apr 2010 19:19:29 +0100, Sam Siegel wrote:
>The requirements exists because I'm trying to write something that will be
>Ziip enabled and leased as a product.
>
>Prior to passing the buffer to a work queue for the SRB, there is the
>possibility that the user (which can be a normal progr
>
>
> If you keep the privileged part completely separate from the non-privileged
> part then you will still have quite a lot of work to do, but you are at
> least in with a shot of making it work out. Every other scheme that you (or
> anyone else) can come up with will fail. I promise.
>
I see
Darth,
Thanks very much for your help. Your suggestions worked.
Thanks again
--- On Fri, 23/4/10, Darth Keller wrote:
From: Darth Keller
Subject: Re: DCOLLECT QUESTION
To: IBM-MAIN@bama.ua.edu
Received: Friday, 23 April, 2010, 4:24 AM
>>I am using the DATA SET SELECTION ENTRY PANEL i.e
Oh geez...
On Fri, Apr 23, 2010 at 8:41 AM, Sam Siegel wrote:
> On Fri, Apr 23, 2010 at 1:05 PM, Peter Relson wrote:
>
> > By definition, the subject seems to me to be an oxymoron.
>
Yes exactly!!!
> Yes ... I agree that the subject lines is not properly worded and is
> technically incorrec
General comments on what is being asked for:
- It appears poster is asking for a way to dynamically elevate
security authority for an ISPF application.
- The elevated security authority is about as high as it gets - With
SECURITY you can do anything you want in an ACF2 system.
- Are you s
> -Original Message-
> From: IBM Mainframe Discussion List
> [mailto:ibm-m...@bama.ua.edu] On Behalf Of Ray Overby
> Sent: Friday, April 23, 2010 11:03 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: Turning on ACF2 SECURITY Privilege through an exit . . .
>
> ACF2 Security privilege is a co
On Fri, 23 Apr 2010 10:54:09 -0500, Tom Marchant
wrote:
>On Fri, 23 Apr 2010 09:03:02 -0500, Mark Zelden wrote:
>
>>
>>I share the a single global but multiple target / 2 different dlib zones for
>>the 2
>>companies I support at my client. You have to set the options to NOPURGE
>>and run REJECT
On my sandbox lpar, I do
1) $PJES2,ABEND and reply END
2) V GRS(TEST),Q
3) if any other systems in grs... V GRS(TEST),P and reply YES
4) go to HMC, do SYSTEM RESET CLEAR
and it is really STOPPED.
One would bring a production system down more gracefully, of course, but
SYSTEM RESET CLEAR at
ACF2 Security privilege is a combination of RACF SYSTEM SPECIAL + SYSTEM
OPERATIONS
McKown, John wrote:
-Original Message-
From: IBM Mainframe Discussion List
[mailto:ibm-m...@bama.ua.edu] On Behalf Of Bathmaker, Jon
Sent: Friday, April 23, 2010 10:20 AM
To: IBM-MAIN@bama.ua.edu
Subje
> -Original Message-
> From: IBM Mainframe Discussion List
> [mailto:ibm-m...@bama.ua.edu] On Behalf Of Bathmaker, Jon
> Sent: Friday, April 23, 2010 10:20 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: Turning on ACF2 SECURITY Privilege through an exit . . .
>
> Hi Tony,
>
> We want the
On Fri, 23 Apr 2010 09:03:02 -0500, Mark Zelden wrote:
>
>I share the a single global but multiple target / 2 different dlib zones for
>the 2
>companies I support at my client. You have to set the options to NOPURGE
>and run REJECT in purge mode to clean up. Otherwise once you accept in
>one env
Yes, and I believe it even warns you that it is going to do just that.
>>> Joe Reichman 4/23/2010 11:34 AM >>>
Found the problem
If go into ISPF/EDIT on the ds it chops off trailing blanks
Thankx
Sent from my iPhone
On Apr 23, 2010, at 9:48 AM, Paul Gilmartin
wrote:
> On Fri, 23 Apr 2010
On 23 April 2010 11:20, Bathmaker, Jon wrote:
> Hi Tony,
I'm another Tony, but...
> We want the users to have the SECURITY privilege while they are using an
> ISPF application and ONLY while they are using this app. If we grant
> them SECURITY using a command they will have that privilege the n
On Fri, 23 Apr 2010 10:55:52 -0400, Bathmaker, Jon
wrote:
>Hi All,
>
>We have a need to grant security to a class of users they log on to a
>specific app. We want them to lose it when they log off.
>
>Ideally there will be a nice exit somewhere where we can set the
>security bit in memory just af
Are they updating the ACF2 databases in this special app?
Regards,
John K
From: "Bathmaker, Jon"
> -Original Message-
> From: IBM Mainframe Discussion List
> [mailto:ibm-m...@bama.ua.edu] On Behalf Of Tony @ Comcast
> Sent: Friday, April 23, 2010 10:13 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: Turning on ACF2 SECURITY Privilege through an exit . . .
>
> Is this Friday humor or am
Found the problem
If go into ISPF/EDIT on the ds it chops off trailing blanks
Thankx
Sent from my iPhone
On Apr 23, 2010, at 9:48 AM, Paul Gilmartin
wrote:
On Fri, 23 Apr 2010 06:16:57 -0500, Jim Marshall wrote:
I am reproing a VB qsam file to Variable KSDS
When I look the VB qsam in I
Paul Gilmartin wrote:
On Fri, 23 Apr 2010 18:32:24 +0800, David Crayford wrote:
I would like to see those TCO studies. Truth is there are a lot of
companies (big ones included) that are moving
off mainframes to reduce the TCO. Those "distributed" systems come in
"very" big iron configurations
On 23 April 2010 09:41, Sam Siegel wrote:
> Now a question about TCB creation. After control is returned from the
> problem state program to the caller, it should be possible to see if it
> ATTACHed any new TCBs. If new TCBs were created, I could abend the entire
> process instead of flipping t
Hi Tony,
We want the users to have the SECURITY privilege while they are using an
ISPF application and ONLY while they are using this app. If we grant
them SECURITY using a command they will have that privilege the next
time they logon to TSO, regardless of the app., and that 'would be
wrong' (as
Several years ago, I asked IBM why they prohibit users from concurrent
sign-on to multiple consoles, and was told that it is working as designed.
He noted that I was not the first to complain. I hope that IBM will change
their design and allow users to sign-on to multiple consoles. Until then,
you'
Is this Friday humor or am I misinterpreting the question? What's the point
of "losing it" after they log off. How could they possibly access anything
after they log off (unless they submitted some batch jobs while logged on?).
Should their batch jobs lose their authorization after EOJ?
Where's
Hi All,
We have a need to grant security to a class of users they log on to a
specific app. We want them to lose it when they log off.
Ideally there will be a nice exit somewhere where we can set the
security bit in memory just after the user has logged onto the app.
Thanks.
Best Regards,
Jon
"Jim McAlpine" wrote in message
news:...
> On Fri, Apr 23, 2010 at 11:16 AM, Jim McAlpine
wrote:
>
> >
> >
> > On Fri, Apr 23, 2010 at 10:54 AM, Jim McAlpine
wrote:
> >
> >>
> >>>
> >>
> >> So can I still have the response time goals and add the resource
cap or
> >> is it one or the other.
> >>
After stop sub-system, Z EOD, V XCF,,... ZOS is stoped, no I/O is running,
what you need more?
2010/4/21 Elardus Engelbrecht
> Vernooij, CP wrote:
>
> >After stopping all these subsystems, z/OS is still running. ;-)
>
> running, running and running while waiting for that magic command: Z EOD
Ted MacNEIL pisze:
I bet the number of customers migrated off the mainframe is higher than number
of new customers.
Sucker bet!
Can you prove it?
Nobody will/has ever published the number of mainframes (or even mainframe
shops) in use.
Somebody observe world around. Noticed many shops clos
>TCA is usually _the only_ part considered and that
is why you can see so many x86 servers there.
That I disagree with, because I've been involved in some studies.
>They are cheap to buy,
so TCA is low.
Individually, they are cheap to buy.
But, when you need 1-3 for production, 1-2 for QA, 1 for
On Fri, Apr 23, 2010 at 3:04 PM, Rob Scott wrote:
> >If this was true, would it be acceptable to turn the JSCBAUTH bit back on?
>
> No
>
> Take a (google) look through the archives of IBM-MAIN for discussions that
> include any of the following keywords :
>
>JSCBAUTH
>Magic SVCs
>
>If this was true, would it be acceptable to turn the JSCBAUTH bit back on?
No
Take a (google) look through the archives of IBM-MAIN for discussions that
include any of the following keywords :
JSCBAUTH
Magic SVCs
AUTHON SVCs
JSCBAUTH flipping is a "no-no" - do not go t
On Fri, 23 Apr 2010 09:33:29 -0400, Pinnacle wrote:
>- Original Message -
>From: "R.S."
>Newsgroups: bit.listserv.ibm-main
>Sent: Friday, April 23, 2010 9:27 AM
>Subject: ACCEPT and RELFILES deleted
>
>
>> Relfiles are deleted after succesful ACCEPT and then unavailable for other
>> zone
paulgboul...@aim.com (Paul Gilmartin) writes:
> I don't understand what you see as "sad". Do you consider it likewise
> sad that in some respects the F-22 Raptor outperforms the Ford Model T?
> (Well, not TCO, but for the F-22 TCO is not the primary objective.)
i periodically referenced that i sp
On Fri, 23 Apr 2010 09:29:39 -0400, Kurt Quackenbush wrote:
>
>> Or copy the ZFS files, and retry the RECEIVE ORDER. It should detect that
>> the files have already been transferred and resume from the point of failure.
>
>Just a point of clarification... If the transfer was complete for all
>file
Ted,
I have to disagree. TCA is usually _the only_ part considered and that
is why you can see so many x86 servers there. They are cheap to buy,
so TCA is low. But administering many of them is different story,
which is covered in TCO.
Marian Gasparovic
IBM Slovakia
On Fri, Apr 23, 2010 at 3:46 P
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf
Of john gilmore
Sent: Friday, April 23, 2010 6:28 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Callin g unauthor ized code from an au thorized a ddress spa
ce
The first is that IBM's OCO policy h
You can do as Kees said. But in WLM you put your goals according to your
business objectives. I have worked and work on Dallas systems (or
P390 / FLEX) also and the most important work in that environment
(other than the OS tasks) is usually TSO.
So you might want to consider changing TSO to Im
On Fri, 23 Apr 2010 14:41:55 +0100 Sam Siegel wrote:
:>On Fri, Apr 23, 2010 at 1:05 PM, Peter Relson wrote:
:>> By definition, the subject seems to me to be an oxymoron.
:>Yes ... I agree that the subject lines is not properly worded and is
:>technically incorrect ... I'm pretty sure that the
> I bet the number of customers migrated off the mainframe is higher than
> number of new customers.
Sucker bet!
Nobody will/has ever published the number of mainframes (or even mainframe
shops) in use.
-
Too busy driving to stop for gas!
>We also know that the answer "but the number of MIPS is growing" is
smokescreen - number of MIPS on my desktop grew up significantly, but the
number of PCs remained the same.
The number of mainframes remain the same, or shrink.
But, I can do more with my mainframe than you can do with your PC.
On Fri, 23 Apr 2010 06:16:57 -0500, Jim Marshall wrote:
>>I am reproing a VB qsam file to Variable KSDS
>>When I look the VB qsam in ISPF there are 50 trailing blanks at the
>>end of the record However after the repro
>>The 50 trailing blanks get trucated
>>
>Had the same problem debugging some VB
>I would like to see those TCO studies.
TCO is one of most political things out there.
One thing that is always missed is TCA.
-
Too busy driving to stop for gas!
--
For IBM-MAIN subscribe / signoff / archive access instruction
On Fri, Apr 23, 2010 at 1:16 AM, Tony Harminc wrote:
> On 22 April 2010 14:19, Sam Siegel wrote:
>
> > The requirements exists because I'm trying to write something that will
> be
> > Ziip enabled and leased as a product.
> >
> > Prior to passing the buffer to a work queue for the SRB, there is
>Is there a way to limit the cpu resources used by CICS in this scenario.
Yes.
Use region goals, and a resource group.
I assume it's not production, or else you have to live with it.
-
Too busy driving to stop for gas!
--
For IBM
> -Original Message-
> From: IBM Mainframe Discussion List
> [mailto:ibm-m...@bama.ua.edu] On Behalf Of john gilmore
> Sent: Friday, April 23, 2010 8:28 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: Callin g unauthor ized code from an au thorized
> a ddress spa ce
>
> Chris Craddock writ
On Fri, Apr 23, 2010 at 1:05 PM, Peter Relson wrote:
> By definition, the subject seems to me to be an oxymoron.
>
Yes ... I agree that the subject lines is not properly worded and is
technically incorrect ... I'm pretty sure that the intent was understood. :)
>
> An authorized address space ha
On Fri, 23 Apr 2010 18:32:24 +0800, David Crayford wrote:
>
>I would like to see those TCO studies. Truth is there are a lot of
>companies (big ones included) that are moving
>off mainframes to reduce the TCO. Those "distributed" systems come in
>"very" big iron configurations and are
>starting to
There is at least one college that is continuing mainframe education,
please see
http://www.mainframezone.com/it-management/historic-marist-college-embra
ces-mainframes-future.
For one, I look forward to using my "dead" mainframe skills to make my
retirement a bit easier. Maybe then I will again
Relfiles are deleted after succesful ACCEPT and then unavailable for
other zones.
What can I do in SMP/E to avoid deletion of relfiles?
Set the NOPURGE subentry in your active OPTIONS entry. NOPURGE tells
ACCEPT processing to keep SYSMOD entries in the global zone, MCS in the
SMPPTS, and the
- Original Message -
From: "R.S."
Newsgroups: bit.listserv.ibm-main
Sent: Friday, April 23, 2010 9:27 AM
Subject: ACCEPT and RELFILES deleted
Relfiles are deleted after succesful ACCEPT and then unavailable for other
zones.
What can I do in SMP/E to avoid deletion of relfiles?
--
R.S. pisze:
Relfiles are deleted after succesful ACCEPT and then unavailable for
other zones.
What can I do in SMP/E to avoid deletion of relfiles?
Just found it: NOPURGE in OPTions.
--
Radoslaw Skorupka
Lodz, Poland
--
BRE Bank SA
ul. Senatorska 18
00-950 Warszawa
www.brebank.pl
Sąd Rejo
At this point, the transfer should have been complete. Try a RECEIVE FROMNTS,
possibly with a bigger SMPWKDIR.
Exactly.
Or copy the ZFS files, and retry the RECEIVE ORDER. It should detect that
the files have already been transferred and resume from the point of failure.
Just a point of cl
Chris Craddock writes:
| The big problem is that this platform has evolved over 45
| years or so. Back when it started out nobody knew about | integrity and there
wasn't a lot of difference between the | programming environment seen by the
system and the
| application. As time passed things g
Relfiles are deleted after succesful ACCEPT and then unavailable for
other zones.
What can I do in SMP/E to avoid deletion of relfiles?
--
Radoslaw Skorupka
Lodz, Poland
--
BRE Bank SA
ul. Senatorska 18
00-950 Warszawa
www.brebank.pl
Sąd Rejonowy dla m. st. Warszawy
XII Wydział Gospodarczy K
> -Original Message-
> From: IBM Mainframe Discussion List On Behalf Of Eyal Rothfeld
>
> Does anybody know any new technologies which can be used in order to
> develop new modern applications for the mainframe platform ?
>
> IBM offers EGL (
http://en.wikipedia.org/wiki/EGL_%28programmin
On Fri, 23 Apr 2010 14:12:17 +0200 Miklos Szigetvari
wrote:
:>What is this "LDUMP" ?
:>Never heard
Sorry. LISTDUMP.
It is an IPCS subcommand.
:>On 4/23/2010 1:16 PM, Binyamin Dissen wrote:
:>> On Fri, 23 Apr 2010 11:36:57 +0200 Miklos Szigetvari
:>> wrote:
:>> :>Any standard method to check
Hi
What is this "LDUMP" ?
Never heard
On 4/23/2010 1:16 PM, Binyamin Dissen wrote:
On Fri, 23 Apr 2010 11:36:57 +0200 Miklos Szigetvari
wrote:
:>Any standard method to check , if a SYSMDUMP is complete(full) or not?
:>We got a number of core and SYSMDUMPs from our customers , and sometimes
> -Original Message-
> From: IBM Mainframe Discussion List On Behalf Of J R
>
> > He's actually a she -- Sheila Fraser.
>
> Not that there's anything wrong with that!
Just goes to show that this kind of mind pollution is gender-agnostic.
-jc-
---
By definition, the subject seems to me to be an oxymoron.
An authorized address space has JSCBAUTH on. There can be no unauthorized
code running in such a situatino.
Now, if you meant a space in which JSCBAUTH is not on (perhaps it was on)
and there are tasks that are supervisor state and/or sy
Richards, Robert B. pisze:
I bet the number of customers migrated off the mainframe is higher than number
of new customers.
And I bet that most of those decisions probably cost those companies MORE money
in the long term. Isn't management by magazine great? :-(
Again, the above does not ne
> -Original Message-
> From: IBM Mainframe Discussion List [On Behalf Of Kirk Wolf
>
> [ snip ] Please...its much easier for them to
> blame their problems on COBOL than to admit that they have done a
> crappy job managing their legacy assets. At each step in maintenance
> it is always
> I bet the number of customers migrated off the mainframe is higher than
> number of new customers.
And I bet that most of those decisions probably cost those companies MORE money
in the long term. Isn't management by magazine great? :-(
Bob
-Original Message-
From: IBM Mainframe Di
ADRNAPF: this is provided for only one non-system case -- loading
non-executable code which, for some reason, the authorized application
does not need protection against modification. It is definitely not
appropriate to use it for loading code that you will then call (although I
suppose you cou
Richards, Robert B. pisze:
Bang! For passing biased opinions! :-)
TCO studies are not always commissioned with predicable conclusions. Lots are
done in-house.
In-house TCO studies can also be biased. Of course that general remark,
YMMV.
And if you have ever seen stupidity in action on TCO j
Bang! For passing biased opinions! :-)
TCO studies are not always commissioned with predicable conclusions. Lots are
done in-house.
And if you have ever seen stupidity in action on TCO just look at any
datacenter that has an "acre" of racks of blades and tell me that those onesies
and twosies
On Fri, 23 Apr 2010 11:36:57 +0200 Miklos Szigetvari
wrote:
:>Any standard method to check , if a SYSMDUMP is complete(full) or not?
:>We got a number of core and SYSMDUMPs from our customers , and sometimes
:>the dump is incomplete (no disk space etc. )
You can run LDUMP to see what is in it.
>I am reproing a VB qsam file to Variable KSDS
>When I look the VB qsam in ISPF there are 50 trailing blanks at the
>end of the record However after the repro
>The 50 trailing blanks get trucated
>
Had the same problem debugging some VB data and learned ISPF lies to you
and makes you think there a
David Crayford pisze:
Marian Gasparovic wrote:
But I see TCO studies that show how System z is competitive and how
customers can save money running on z instead of distributed.
I would like to see those TCO studies. Truth is there are a lot of
companies (big ones included) that are moving
On Fri, Apr 23, 2010 at 11:16 AM, Jim McAlpine wrote:
>
>
> On Fri, Apr 23, 2010 at 10:54 AM, Jim McAlpine wrote:
>
>>
>>>
>>
>> So can I still have the response time goals and add the resource cap or
>> is it one or the other.
>>
>> Jim McAlpine
>>
>
> It's OK, I've found what I wanted.
>
> Jim
1 - 100 of 110 matches
Mail list logo