Chris,
I think you'll find Netview uses ATCCONxx just like VTAM does for deciding
what is initially active at startup. However, CNMCONxx is for specifying
any additional members that you want Netview to include in STATMON and that
are not in ATCCONxx. Perhaps one doesn't activate much at all in
Hi,
Are there any specific minimum MSU requirement for installing HOD ? Since
Our environment is capped at 13 MSU and 21 MSU wth no ZAAP and ZIIP
facility.
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send
Once you have interpreted which member(s) within VTAMLST are required by
address spaces other than NET, you can always split them into a separate
dataset and concatenate it under the VTAMLST DD. Then grant only the minimal
access required to each VTAMLST dataset. We used to do this to separate a
Swans, white and black, have a long history in scholastic and then
mathematical logic, figuring too frequently in illustrations of modus
ponens:
All swans are white. A is a swan. Ergo, A is white.
The heavy, unquestioning use of this scheme presumably reflects the
fact that northern hemisphere
Just tell Outlook to _not_ mark emails from IBM-MAIN@bama.ua.edu as Spam.
Regards,
Ulrich Krueger
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf
Of Andy Coburn
Sent: Sunday, March 11, 2012 2:48 PM
To: IBM-MAIN@bama.ua.edu
Subject: Aprapros
Finger check. Sorry.
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
Not due to anything I've overtly done, Microsoft Outlook 2003 has decided
that any e-mail with the subject "Re: Program FLIH backdoor - This is a
criminal breach of security!" is to be placed immediately in the Junk E-mail
folder. And does so.
Does Outlook know something I don't know?
Andy
---
In
,
on 03/11/2012
at 08:37 AM, Timothy Sipples said:
>I did not post my (unofficial) thoughts as merely an academic,
>theoretical exercise. In particular, I'm aware of one customer that
>grabbed Language Environment from OS/390, ran it on z/OS, and...
>well, that wasn't (isn't) free.
Never m
On 3/11/2012 9:07 AM, John Gilmore wrote:
There is a long intellectual tradition which has it that the
production of just one black swan is an unanswerable refutation of the
proposition that all swans are white.
I cringe at the word "production" - purportedly (google search
came up empty) not
I think I paid $39 for a Casio Wave-ceptor two years ago. Keeps good time,
DST has Auto, ON, and Off. Auto doesn't work. So have to set it when the
hurdles move.
In a message dated 3/11/2012 2:10:38 A.M. Central Daylight Time,
dalelmil...@comcast.net writes:
I can even get a wrist watch
Chris,
I have reviewed my JCL for TPX and it has an allocation for the SYS1.VTAMLST
in it. How or why it is in the STC JCL, I am unclear.
But thanks for checking further.
Lizette
>
> Lizette
>
> After posting I realised that I had an example - other than VTAM - of a
program which
> needs to
Hi Folks,
Here is a way that I TAPEMAP multiple tapes, with a PROC.
All the best...
Sam
//*
//* TAPEMAP UTILITY PROGRAM
//*
//TAPEMAP PROC VL=XX
//TAPEMAP EXEC PGM=TAPEMAP
//STEPLIB DD DISP=SHR,DSN=SYS2.LINKLIB
//SYSUT1 DD DISP=OLD,
// UNIT=562,
// VOL=(,RETAIN,SER=&VL),
Hi Folks,
To TAPEMAP a bunch of volumes, I use a PROC. Then, to specify the
volume list, all you have to do is have the volser as the one PROC
variable, and it is just a list of 100 PROC executions.
All the best...
Sam Golob
---
Lizette
After posting I realised that I had an example - other than VTAM - of a program
which needs to read members of VTAMLST partitioned data sets. This is the
NetView STATMON component pre-processor program. Just as VTAM has its ATCCONxx
member which provides the names of members as dreamed
Bob
There are a couple of points I missed from my previous post.
-
A. It was implied but I should have said that I would trust any advice
regarding access to data sets *only* from a publication originating from the
development authors of the product involved. Obvious really.
I did check the m
Since this sort of thing is expected of me, I will note that we find
ourselves between Scylla and Charybdis here.
Chris Craddock's formulation was open to the exception that Peter
Relson took: there is fetch-protected storage the contents of which
its owner is entirely free to make available to ot
>this is true, but it is not interesting.
(with respect to my pointing out some flaws in the examples)
I respectfully disagree.
When something is presented as a guideline or even perhaps a "rule of
thumb", that is one thing.
When something is presented as a rule, that is a different thing.
If i
17 matches
Mail list logo