Dear list,
This Friday it is time for some good news and extraordinary displays.
Via some complex construction 16GB of memory dropped from the skies onto
our laps and we had the choice to put it on the shelf or build it into
one of our systems. We did the last and I saw, what I had never
co
I had heard long ago something like:
Sociality and Conviviality Informal Discussion Session
Peter Relson
z/OS Core Technology Design
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.
>If a system routine does not wish to be interrupted by an IRB it can take
a
>lock or ENQ SMC or STATUS SET,MC,PROCESS
Or even just set TCBNOIRB.within TCBFLGS8
Peter Relson
z/OS Core Technology Design
--
For IBM-MAIN subscribe
I think that there is another bit of wisdom there.
First, I don't think mainframe hacking would be very profitable. In my opinion
information would be the most valuable, and an inside job would be easiest.
Give someone, perhaps disgruntled, a large sum of money and the information
might be bo
> -Original Message-
> From: IBM Mainframe Discussion List On Behalf Of Vernooij, CP - SPLXM
>
> Dear list,
>
>
>
> This Friday it is time for some good news and extraordinary displays.
Ours used to look like that, until z/OS 1.11. Now they're at around 3%
(all 16 of them).
-jc-
The meaning of SCIDS - Ah yes, going back a bunch of years when the Air
Force and Marines were heavily represented. I always heard it as
Society to "Ceep" Inebriated Drunks of the Streets (which it most certainly
did).
Imagine a Grand Ballroom with 4-5K folks and about 50-60% SYSPROGs and
> -Original Message-
> From: IBM Mainframe Discussion List
> [mailto:ibm-m...@bama.ua.edu] On Behalf Of Peter Relson
> Sent: Friday, October 15, 2010 6:30 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: STIMER(M) EXIT= question
>
> >If a system routine does not wish to be interrupted by an
I don't think we can call it hacking if IBM uses such techniques to implement
simulators, emulators, virtualization, etc. But other vendors' using the same
techniques in order to make it easier for their products to achieve
authorization is a different matter, IMHO.
Bill Fairchild
Rocket Softw
IEBCOPY was developed in the early- to mid-1960s, when EXCP appendages were the
leading edge way to do cruel and unusual things in low-level I/O. Such has not
been the case since the advent of MVS/XA and a redesigned IOS in 1983. New, or
older and still strategic, products typically use the la
Hi
Sorry, you are right it is Bus-Tech
(We are contact over "mainstorconcept")
On 10/14/2010 10:10 PM, Pratt Parrish wrote:
Bus-Tech has a zDASD product as you have described. I am not aware that
StorageTek has such a product. Based on my web searches and searching
the Oracle (STK) websi
Barry,
What do you think of contacting Lindy off list to see if we can't get
into contact with "heavily customized systems with lots of system
exits". KRI could help them with their technical expertise...
Ray
On 10/15/2010 06:46 AM, Lindy Mayfield wrote:
I think that there is another b
On 10/15/2010 5:46 AM, Lindy Mayfield wrote:
I think that there is another bit of wisdom there.
First, I don't think mainframe hacking would be very profitable. In my opinion
information would be the most valuable, and an inside job would be easiest.
Give someone, perhaps disgruntled, a larg
My apologies to this the list. I did not mean for this email to be
sent there..
On 10/15/2010 07:42 AM, Ray Overby wrote:
Barry,
What do you think of contacting Lindy off list to see if we can't get
into contact with "heavily customized systems with lots of system
exits". KRI could hel
Really ?
Would never have guessed.
Been there, done that.
Shane ...
On Fri, 15 Oct 2010 08:05:39 -0500
Ray Overby wrote:
> My apologies to this the list. I did not mean for this email to be
> sent there..
--
For I
Ray Overby wrote:
> My apologies to this the list. I did not mean for this email to be sent
there..
Apology accepted of course. For three and half nanoseconds, it seemed you
want to 'hack' into this very discussion list... ;-D ;-D ;-D
Groete / Greetings
Elardus Engelbrecht
--
I say heavily customized but that's only a few of my customers. Just about
every mainframe shop I've seen, especially those that have been around a while,
have enough customization, exits, etc. to be in trouble soon. And, honestly,
who will they call? Serious question. Who, consulting compan
A number of people in this newsgroup have wanted long parameters and
symbolic parameter replacement in card image control cards.
The following programs are now available that will allow the above to
happen, using conventional JCL or TSO.
1. EXECLONG will execute a program with up to 3,000 byt
On 10/15/2010 7:20 AM, Lindy Mayfield wrote:
I say heavily customized but that's only a few of my customers.
Just about every mainframe shop I've seen, especially those that
have been around a while, have enough customization, exits, etc.
to be in trouble soon. And, honestly, who will they call?
> -Original Message-
> From: IBM Mainframe Discussion List
> [mailto:ibm-m...@bama.ua.edu] On Behalf Of Lindy Mayfield
> Sent: Friday, October 15, 2010 8:20 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: Mainframe hacking?
>
> I say heavily customized but that's only a few of my
> customer
Rick brings up a good point: "/But as these types of problems grow,
I'm sure that IBM and REPUTABLE vendors are working to close any holes
that might exist./" As I see it there are two parts to this. Vendor
testing prior to shipping code and Vendor response when problems are
reported in the fi
I apologize in advance if...
1) This has already been discussed (I did not find it in the archives)
2) This is not the proper forum for this question (but IBM-Main is always
a good place to start)
We have a number of C programs that need to be converted from SAS to IBM. The
reason
Sounds like an invitation for Dave Rivers to pipe up ... ;-)
Shane ...
On Fri, 15 Oct 2010 10:05:26 -0400
Clark Kidd wrote:
> We have a number of C programs that need to be converted from SAS to
> IBM. The reason for this is because SAS has decided to drop support
> for their C/C++ compiler, so
Clark:
Have you looked at Dignus (http://www.dignus.com/) ?
It really makes things much easier.
Harry
P.S. I use Dignus for my mainframe C/C++ work, but have no affiliation with
them.
> Date: Fri, 15 Oct 2010 10:05:26 -0400
> From: clark.k...@asg.com
> Subject: Converting SAS C to IBM C
On Thu, 14 Oct 2010 19:54:44 -0500, John McKown wrote:
>The SPFCOPY that I remember simply used a "magic" SVC to set the APF on
>before calling IEBCOPY and back off afterwards.
>
I've heard of this. And that the "magic SVC" did extensive checkinf
of control blocks to verify that it was properly c
Howard Dean probably had a funny button that defined the meaning of SCIDS.
--
This is not an exit from SCIDS.
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the messag
On 10/15/2010 4:05 PM, Clark Kidd wrote:
I apologize in advance if...
1) This has already been discussed (I did not find it in the archives)
2) This is not the proper forum for this question (but IBM-Main is always
a good place to start)
We have a number of C programs that need to
I have one of those paper signs taken from my first ever Share conf in
New York City back in the late 80's hanging on my door...
On 10/15/2010 10:34 AM, David Alcock wrote:
Howard Dean probably had a funny button that defined the meaning of SCIDS.
--
This is not an exit from SCIDS.
-
The button man has this one...
http://www.mxg.com/thebuttonman/buttons/button792.jpg
From: David Alcock
Q IBM-MAIN
Jon Fouts
Systems Engineer
515-557-7779
"This message may contain confidential and/or privileged information. If you
are not the addressee or authorized to receive this for the addressee, you must
not use, copy, disclose, or take any action based on this message or any
information
On Fri, Oct 15, 2010 at 10:46 AM, Larry Macioce wrote:
> [deleted], but my question is why are you
> defining a "dummy" dataset? Why not use a br14 or like(if you have another
> exact dataset) ?
> Mace
>
It actually opens and closes the dataset, forceing a complete
definition of the dataset.
--
M
At 10/14/2010 07:54 PM, Rick Fochtman wrote:
For example, why do IDCAMS and IEBCOPY have to be authorized? The
IEBCOPY replacement doesn't have to be authorized. Would it be
worthwhile for both vendors and users to see what t
> -Original Message-
> From: IBM Mainframe Discussion List
> [mailto:ibm-m...@bama.ua.edu] On Behalf Of Mike Schwab
> Sent: Friday, October 15, 2010 10:59 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: S013-64-IEBGENER
>
> On Fri, Oct 15, 2010 at 10:46 AM, Larry Macioce
> wrote:
> > [dele
On Fri, Oct 15, 2010 at 10:43 AM, Ricc Harding wrote:
> SPFCopy's "magic" SVC went thru several iterations to make it secure too.
> It
> was one of those SVC's that was written to be "serially secure" but in
> a
> multi-tasking environment when two or more tasks could be set up to run
> concur
Mace
Something has been inplace since...before I was here..
Having them change to br14 when error occurs..but have many to go
through..other alternative is to run on other lpar...since most runs are
at night and no one around to alter jcl.
From: Larry Macioce
To: IBM-MAIN@bama.ua.edu
I don't think there is shortages in systems programmers yet. I know the last 4
years, there has been maybe 3 or 4 jobs open in the Milwaukee area, out of I
figure about 10 z/OS shops. Each opening had plenty of applicants, as far as I
can figure.
In 5 to 10 years, that could all change, but
On 10/15/2010 9:28 AM, Paul Gilmartin wrote:
On Fri, 15 Oct 2010 07:24:08 -0600, Steve Comstock wrote:
On 10/15/2010 7:20 AM, Lindy Mayfield wrote:
I say heavily customized but that's only a few of my customers.
Just about every mainframe shop I've seen, especially those that
have been around
Each and every time I try to point out new or good points about the z, Iget
the same response: "It is simply not cost effective!" or more simply: "It
costs too much!". This despite the __documented fact__ that the z does over
80% or the production work at less than 50% of the IT budget. Of course,
Paul
Did that and no word as yet from ibm.
From: Paul Gilmartin
To: IBM-MAIN@bama.ua.edu
Date: 10/15/2010 10:49 AM
Subject:Re: S013-64-IEBGENER
Sent by:IBM Mainframe Discussion List
On Fri, 15 Oct 2010 08:24:13 -0500, Ron Wells wrote:
>Anyone run across where a IEBGE
On Fri, 15 Oct 2010 10:28:21 -0500, Paul Gilmartin
>On Fri, 15 Oct 2010 07:24:08 -0600, Steve Comstock wrote:
>>
>>Most management will ignore it until it's too late and
>>then declare "it's time to move off the mainframe".
>>
>But why, when hit by a Windows exploit, don't they likewise say,
>"I
SPFCopy's "magic" SVC went thru several iterations to make it secure too. It
was one of those SVC's that was written to be "serially secure" but in a
multi-tasking environment when two or more tasks could be set up to run
concurrently, then a "serially secure" task, doing what it did in a secur
On Fri, 15 Oct 2010 10:23:18 -0400, Harry Wahl wrote:
>
>Have you looked at Dignus ( http://www.dignus.com/ ) ?
>It really makes things much easier.
>
>P.S. I use Dignus for my mainframe C/C++ work, but have no affiliation with
>them.
>
>> Date: Fri, 15 Oct 2010 10:05:26 -0400
>> From: Clark K
On Fri, 15 Oct 2010 09:48:01 -0600, Steve Comstock wrote:
>
>Don't hate EBCDIC, be amazed at the ability
>to work with EBCDIC, ASCII, and Unicode all on one
>system.
>
EBCDIC is easy enough to use. It's just too difficult to
avoid. The OS is biased. A fair operating system would
let me NFS mount
Do know why it would fail all the sudden, but my question is why are you
defining a "dummy" dataset? Why not use a br14 or like(if you have another
exact dataset) ?
Mace
--
For IBM-MAIN subscribe / signoff / archive access instr
On Fri, 15 Oct 2010 08:24:13 -0500, Ron Wells wrote:
>Anyone run across where a IEBGENER fails with a S013-64
>
>//SYSUT1 DD DUMMY,
>// DISP=SHR,LRECL=4096,RECFM=FB
>
>//SYSUT2 DD DSN=XX15.TEST.DATA.SET,
>// DISP=(NEW,CATLG,DELETE),
>//UNIT=DASD,
>//
Anyone run across where a IEBGENER fails with a S013-64
//SYSUT1 DD DUMMY,
// DISP=SHR,LRECL=4096,RECFM=FB
//SYSUT2 DD DSN=XX15.TEST.DATA.SET,
// DISP=(NEW,CATLG,DELETE),
//UNIT=DASD,
//SPACE=(15000,15000)
If RECFM changed to F it works.
On Fri, 15 Oct 2010 07:24:08 -0600, Steve Comstock wrote:
>On 10/15/2010 7:20 AM, Lindy Mayfield wrote:
>> I say heavily customized but that's only a few of my customers.
>> Just about every mainframe shop I've seen, especially those that
>> have been around a while, have enough customization, exi
The true facts, verbally to me, from Tom Steele, SHARE
Historian, and Mort Bernstein, Founder, in 1980 when
I was documenting my collection of SHARE buttons for
the SHARE 25th Anniversary Button Show in Atlanta, GA.
When SHARE started, there was no fee nor organization,
so there was no funding
Maybe BPAM while doing a FIND or BLDL? E.g., //INPUT DD
DSN=MY.PDS(MEMBER),..etc.
Just a guess. I never traced it with GTF, so I don't know for sure. Or maybe
at the instant of OPEN the DCB access method bits were all zeroes. Or maybe
since only SAM is supported the message is simply mislea
Hi,
I am trying to allocate dataset with 6672 cylinders of space across two
volumes as a primary extent. I am told that the allocation should look
as shown below...
//DD1 DD DSN=TEST.DATASET,
// DISP=(,KEEP),
// SPACE=(CYL,
Your primary extent cannot span volumes.
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of
Veena, Sridhar
Sent: Friday, October 15, 2010 1:23 PM
To: IBM-MAIN@bama.ua.edu
Subject: Space allocation question...
Hi,
I am trying to allocate
If the dataset is SMS managed, the second volume won't allocate until you
fill up the first volume and a second volume is needed. Why is it that you
want to allocate the 2 volumes?
*George Rodriguez*
*Specialist II - IT Solutions*
*Application Support / Quality Assurance*
*PX - 47652*
*(561) 357-7
Unless the STORCLAS is GUARANTEED SPACE, in which case both volumes are used
immediately.
John McKown
Maranatha! <><
On Oct 15, 2010 12:29 PM, "George Rodriguez" <
george.rodrig...@palmbeachschools.org> wrote:
If the dataset is SMS managed, the second volume won't allocate until you
fill up the
To be more precise...I will quote from an online posting: "an extent is a
contiguous area of disk space". The key word is 'contiguous'. Since an extent
must be 'contiguous' you primary extent cannot span volumes. The largest extent
you can allocate is equal to the largest free space on a volume.
Customers who are need to pay for CA-PDSMAN or SEA PDSFAST just to get
acceptable performance when supporting large environments may disagree about
IEBCOPY not being broken.
Best Regards,
Sam Knutson, GEICO
System z Team Leader
mailto:s
I stand corrected...
*George Rodriguez*
*Specialist II - IT Solutions*
*Application Support / Quality Assurance*
*PX - 47652*
*(561) 357-7652 (office)*
*(561) 707-3496 (mobile)*
*School District of Palm Beach County*
*3348 Forest Hill Blvd.*
*Room B-332*
*West Palm Beach, FL. 33406-5869*
*Florida'
Sridhar,
>I am trying to allocate dataset with 6672 cylinders of space across two
>volumes as a primary extent. I am told that the allocation should look
>as shown below...
>//DD1 DD DSN=TEST.DATASET,
>// DISP=(,KEEP),
>// SPACE=(CYL,(3336,20)),
>// V
Yes, however, since he didn't get the amount of space he expected, he is not in
a guaranteed space pool.
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of
George Rodriguez
Sent: Friday, October 15, 2010 1:49 PM
To: IBM-MAIN@bama.ua.edu
Subj
>> If the dataset is SMS managed, the second volume won't allocate until
you
>> fill up the first volume and a second volume is needed. Why is it that
you
>> want to allocate the 2 volumes?
As someone stated earlier - a primary allocation can not span 2 volumes
(for the most part). However, yo
Just for S&Gs ran it on my 1.6 system(still havent got 1.9 up), and it worked
fine. I think as someone said before PMR time
mace
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.ed
Sridar,
This will work if you also use a Guarenteed Space Storage Class. The size of
the primary allocation on each volume will depend on how the MB/sec rate has
been specified in the Storage Class. It's an old technique that many people
used to use for SAS before they got their multi-volume suppo
There is extensive information on NJE jobs in the
TYPE 26 JES2 Purge Record, since there is a purge
record created every time any job leaves any node
for any purpose. While the data may not be left
on the SPOOL dataset, you can identify which node
and job numbers in these SMF fields:
EXECNODE
Note that I'm not using my work email any more.
This one is my smartphone. I will use it or my home email.
John McKown
Maranatha! <><
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.
On 10/15/2010 09:27 AM, Paul Gilmartin wrote:
On Thu, 14 Oct 2010 19:54:44 -0500, John McKown wrote:
The SPFCOPY that I remember simply used a "magic" SVC to set the APF on
before calling IEBCOPY and back off afterwards.
I've heard of this. And that the "magic SVC" did extensive checkinf
of
I am looking for a LISTSERV for IBM's Clearquest.
Does one exist?
Subscribe Clearquest doesn't find one for me.
Thanks
Rick Bargar
Clearquest Administration
NYSDTF
This communication may contain confidential and/or legally privileged
information. It is intended only for the individuals named as
I've discarded the original message but didn't it say that isfJesName has to
*precede* isfCalls()? Aside from that, I'll add the caveat that I've *never*
worked with this.
--> signature = 6 lines follows <--
Neil Duffee, Joe SysProg, U d'Ottawa, Ottawa, Ont, Canada
telephon
In a message dated 10/15/2010 1:04:42 P.M. Central Daylight Time,
richard_bar...@tax.state.ny.us writes:
Subscribe Clearquest doesn't find one for me.
>>
A list exists, but it's not a LISTSERV list.
clearqu...@lists.ca.ibm.com
---
ISPF doesn't run APF. It uses the TSO IKJEFTSR function to run properly
authorized programs and commands. At least, I think that's how it works.
--
John McKown
Maranatha! <><
Sent from my Vibrant Android phone.
On Oct 15, 2010 1:03 PM, "Joel C. Ewing" wrote:
On 10/15/2010 09:27 AM, Paul Gilmar
Sridar,
A correction to my post. The data rate is only used by striped datasets.
If you use a STORCLAS with guaranteed space=YES and nothing else then you
will get the primary allocation you request on each volume you requested, or
on the number of non-specific volumes you request in the UNIT par
Darth,
Were you thinking of the sustained data rate value, rather than initial
access time?
Note that you can use unitcnt and guaranteed space to control the number and
size of stripes from JCL, rather than using the data rate. I've always
preferred this method.
Ron
>
> Another way to get yo
On 10/15/2010 10:49 AM, Paul Gilmartin wrote:
On Fri, 15 Oct 2010 08:24:13 -0500, Ron Wells wrote:
Anyone run across where a IEBGENER fails with a S013-64
//SYSUT1 DD DUMMY,
// DISP=SHR,LRECL=4096,RECFM=FB
//SYSUT2 DD DSN=XX15.TEST.DATA.SET,
// DISP=(NEW,CATLG,D
As a new z/OS applications developer I'm curious as to what types of things use
custom user exits et al for. From what I've heard from our sysprogs, our
philosophy is to "never" use inhouse written user exits. Of course there are
vendor supplied user exits, but the only inhouse user exit I kno
On Fri, 15 Oct 2010 13:07:54 -0500, John McKown
wrote:
>ISPF doesn't run APF. It uses the TSO IKJEFTSR function to run properly
>authorized programs and commands. At least, I think that's how it works.
True, but IKEFTSR did not exist back when the SPFCOPY SVC was needed.
--
Walt Farrell
IBM S
>>Darth,
>>Were you thinking of the sustained data rate value, rather than initial
>>access time?
>>Note that you can use unitcnt and guaranteed space to control the number
and
>>size of stripes from JCL, rather than using the data rate. I've always
>>preferred this method.
>>Ron
Ron - you are co
Richard
Thought that too...and yesbut then--just to verify I steplib'd to
where original IEBGENER was located...failed again..
From: Richard L Peurifoy
To: IBM-MAIN@bama.ua.edu
Date: 10/15/2010 01:26 PM
Subject:Re: S013-64-IEBGENER
Sent by:IBM Mainframe Discussion
On 10/15/2010 12:53 PM, Darth Keller wrote:
If the dataset is SMS managed, the second volume won't allocate until
you
fill up the first volume and a second volume is needed. Why is it that
you
want to allocate the 2 volumes?
As someone stated earlier - a primary allocation can not span 2 vo
In <4cb76d72.3010...@terra.com.br>, on 10/14/2010
at 05:52 PM, Carlos Bodra - Pessoal said:
>I was checking erep output to try to discover more about MCIC
>(Machine Check Interruption Code)
Look in Principles of Operation.
>External Damage
Damage to storage or channels, not related to cu
On 15 Oct 2010 05:28:21 -0700, in bit.listserv.ibm-main you wrote:
>IEBCOPY was developed in the early- to mid-1960s, when EXCP appendages were
>the leading edge way to do cruel and unusual things in low-level I/O. Such
>has not been the case since the advent of MVS/XA and a redesigned IOS in 1
I thought the isfJesName just had to precede the ADDRESS SDSF call.
Nonetheless, one of my coworkers has it working per following CA's Technical
input. See programs and CA's info. Thanks to all's input.
/*REXX MEMBER SDSFTEST */
ADDRESS 'OSF' "SDSFTES1"
EXIT
/* REXX MEMBER SDSFTES1
Hi List,
John McKown's response to Ron's S013-64 issue interested me. I had not realized
that SMS automatically wrote an EOF to newly-allocated datasets.
John pointed me to
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/dgt2i650/8.1
which states "For sequential data sets, SMS write
>I tried above allocation but I am getting just 3336 cylinders as initial
>allocation.
>What could be wrong here? Should the volumes be non-SMS?
>If they are SMS does it need some SMS rule to allocate primary space specified
>across each of the volumes?!
Space management 101:
1. The primary is
Determine what track the dataset was allocated to then run this utility
specifying the first track of the dataset.
//DFDSS EXEC PGM=ADRDSSU
//volume DD VOL=SER=volume,UNIT=3390,DISP=SHR
//SYSPRINT DD SYSOUT=*
//SYSINDD *
Ted, I would disagree with your point (2) in one case.
For a VSAM dataset with the allocation coming from IDCAMS DEFINE
parameters, the primary is remembered in the catalog listing. If the file is
defined in a non-guaranteed-space environment with more than one volume
specified, the a
>>2. The primary is never 'remembered'. So, if you go to a subsequent
volume, the secondary allocation is always used (and must, again, be
>>satisfied within 5 extents.
>From the DataClass: "Additional Volume Amt":
Primary - Primary allocation amount has been
reque
>I have it buried in my mind that when a job comes to a
new node, if the original Job Number is not in use at
that node, that the original Job Number is used for the job, otherwise the job
gets a new number on the new node, but I have absolutely no documentation to
support that memory.
I have w
On 15 October 2010 14:03, Joel C. Ewing wrote:
> On 10/15/2010 09:27 AM, Paul Gilmartin wrote:
>>
>> On Thu, 14 Oct 2010 19:54:44 -0500, John McKown wrote:
>>
>>> The SPFCOPY that I remember simply used a "magic" SVC to set the APF on
>>> before calling IEBCOPY and back off afterwards.
>>>
>> I've
>Ted, I would disagree with your point (2) in one case.
Yes, I'm aware of of the difference of VSAM vs PS.
But, I thought the OP was talking PS.
Also, I've never used guaranteed space for non-VSAM files, so I wasn't aware of
the impact on the primary allocation for subsequent volumes.
Any day
Darth,
>>>2. The primary is never 'remembered'. So, if you go to a subsequent
>>volume, the secondary allocation is always used (and must, again, be
>>>satisfied within 5 extents.
>>
>From the DataClass: "Additional Volume Amt":
> Primary - Primary allocation amount has
It can also print the VTOC so you can find where the dataset is located.
//jobname JOB 'acct','pgmr name',
//STEP02 EXEC PGM=ADRDSSU ,PARM='TYPRUN=NORUN' (to test control card syntax)
//SYSPRINT DD SYSOUT=*
//DDA DD UNIT=DISK,DISP=SHR,VOL=SER=vv
//SYSINDD *
PRINT INDD(DDA)
I should have gone back & reviewed the original email as it's too far down
in the chain & too late in the day.
thanks - ddk
This e-mail message and all attachments transmitted with it may
contain legally privileged and/or confidential information intended
solely for the use of the addressee(s). I
David,
>Ted, I would disagree with your point (2) in one case.
>For a VSAM dataset with the allocation coming from IDCAMS DEFINE
> parameters, the primary is >remembered in the catalog listing. If the file
> is defined in a non-guaranteed-space environment with more than >one volume
>
The manual Network Job Entry (Format and Protocols) SA22-7539-02, in
appendix A.2.3.7 specifically states:
When a job is transmitted from one system to another, the receiving system
attempts to assign the original jobid ( from the job header) to the job that
is being received. ...
--
John McKown
>When a job is transmitted from one system to another, the receiving system
>attempts to assign the original jobid ( from the job header) to the job that
>is being received. ...
But, if that jobnum is already in use?
-
I'm a SuperHero with neither powers, nor motivation!
Kimota!
--
As I recall, it selects a new number like when a new job is submitted.
--
John McKown
Maranatha! <><
Sent from my Vibrant Android phone.
On Oct 15, 2010 3:46 PM, "Ted MacNEIL" wrote:
>When a job is transmitted from one system to another, the receiving system
attempts to assign the o...
But, if
>As I recall, it selects a new number like when a new job is submitted.
So, that all supports Dr. Barry's memory, and my (long ago) experimentation.
-
I'm a SuperHero with neither powers, nor motivation!
Kimota!
--
For IBM-MAIN
Shane wrote:
Sounds like an invitation for Dave Rivers to pipe up ... ;-)
pipe!
Yes! definately - we think Dignus' Systems/C is a perfect
alternative; especially if you have situations where you
have to intermingle between assembly and C and if you're
doing things like WAIT and POST.
I believe you meant "the last six digits of COUNT" instead of "the 1st 4".
Bill Fairchild
Rocket Software
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of
David Kreiss
Sent: Friday, October 15, 2010 2:54 PM
To: IBM-MAIN@bama.ua.edu
Subject
Bill,
Yes, my mistake, as you know the count has 2 digits of key length and 4 of
data length at the end.
COUNT 000D0100
RRKK
Or cRKK for EAS tracks
Dave
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Please don't anyone believe this overly simplistic statement from IBM whose
legal staff apparently didn't get to proofread it. Certainly do not bet your
critical data on this statement.
Writing an EOF record at the beginning of a newly allocated sequential data set
will only prevent data integ
On 10/14/2010 3:07 AM, Mary Anne Matyaz wrote:
I'd always heard Social Conversation in a Drunken Stupor.
According to a fairly recent article I read describing the founding of SHARE at
the Rand Corporation in 1955, SCIDS = SHARE Committee for Informal Discussion
Sessions. Now, if I can just
Also, IIRC, IEBCOPY uses I/O appendages that require authorization, since they
are loaded from SYS1.SVCLIB.
Yes. That's true.
But, what about the fact that work-alikes (eg: SPFCOPY) don't need them?
--
1 - 100 of 122 matches
Mail list logo