Maybe via SMF records ?
On 21.11.2013 13:48, Robin Atwood wrote:
I want our file server to be able to tell the clients when a data set last
changed. For non-VSAM it's easy (if a bit vague), there's the last reference
date in the F1 DSCB. For VSAM you can see a SYSTEM-TIMESTAMP in the
Dear all
Our shop is z/OS 1.13+CICS 4.2+DB 10 with 6 members parallel sysplexs.
SMF don't use logstream. SMF data always is writed to SYS1.MANX.
If we change the interval of SMF, we found that IXGLOGR always use CPU
following SMF interval
Please see the RMF III report below.
The F1 DSCB does contain a flag, DS1IND02, which indicates a dataset has
been opened for other-than-input. This is the flag that alerts your backup
software that the dataset needs a backup. The backup software will reset
this flag. If you run your synchronization check prior to the backup
Interesting idea but the information is needed during a file transfer so
analysing the SMF records might be a bit lengthy! I have just noticed that
ISPF 3.4 'S' line command gives you a last reference date for the DATA
component. This would be better than nothing.
Thanks
Robin
-Original
Thanks, that's very helpful. Thus prompted, I now notice that IGGCSI00 has a
last backup timestamp field name (LTBACKDT), so with all these bits of
information I should be able to determine if a sync with the workstation is
necessary. Excellent stuff!
Cheers
Robin
-Original Message-
Walt Farrell wrote:
Not quite right, Elardus, if he asked the right question. He asked about
creating/updating/deleting *profiles*, not resources.
Ouch. Thanks, I have overlooked that word 'proflies'. Yuck, my fault, but
thanks again! :-)
Groete / Greetings
Elardus Engelbrecht
One possibility, which is not simply by any means, is to use the SMF data
in real time, with the SMF IEFU8x exits, to trap the SMF type 15 records
(non-VSAM open for OUTPUT or UPDAT) and type 62 (VSAM cluster opened). With
the type 62, you need to test SMF62MC1 to see if the open is for
Don't know the -71, but -16 is the fixed portion of a TIOT entry. The rest of
the 255 bytes can hold pointers to UCB's.
Chris Blaicher
Principal Software Engineer, Software Development
Syncsort Incorporated
50 Tice Boulevard, Woodcliff Lake, NJ 07677
P: 201-930-8260 | M: 512-627-3803
E:
For the BLKSIZE= constraint mod(32760,8) = 0, mod(32767,8) ¬= 0.
For the extents-per-volume question it is hard to see any basis for an
alignment issue, and in any case both 123 and 127 are odd. (Of the
two 123 is composite and 127 = 2^7 - 1 is a Mersenne prime, but this
difference too is
Given the recent discussion on early Fortran implementations and other
historical stuff on IBMVM, you folks may want to hunt down the current issue of
the IEEE Annals of the History of Computing (volume 35, #4). This issue
contains a really good article on industry approaches in the early days
I was in a class a long time ago and the explanation at that time was as
follows, to the best of my recollection.
They can handle up to 127 extents, but any request for secondary can take up to
5 extents to satisfy it. The comment was that the developers didn't want to
have to deal with the
Ingenious and it would be technically fascinating to try and implement!
However I imagine it would be a bit of a hard sell to the customers. :)
Thanks
Robin
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of John McKown
Sent: 22 November
Ah, my bad, I didn't realize this was not for an in-house type project.
On Fri, Nov 22, 2013 at 8:32 AM, Robin Atwood abend...@gmail.com wrote:
Ingenious and it would be technically fascinating to try and implement!
However I imagine it would be a bit of a hard sell to the customers. :)
IMO, the short answer is just before the next APPLY.
HTH,
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
This excerpt from an 8-31-2010 post by Alan Starr, in reply to a question from
R.S. who also started the current thread:
(begin quote)
I believe that the answers to your questions may be found in the Data Extent
Block (DEB) and the murky depths of history.
Due to its age, its close connections
John is correct.
Many scheduling products (CA Workload Automation/ESP, CA7, Jobtrac, etc)
will monitor SMF data and have a function called a dataset trigger.
If you have such a tool, then you could review if it could help in your
situation.
Otherwise, you will need to look at the SMF Exits.
Hello Jake ,
This actually means The system could not add the specified path to a path
group.
Is the cable connected properly ? That's the first thing to be checked .
Also look at logrec data Sounds to me like a no resources condition over the
control unit . Try these commands
a) DS
The latest volume does not yet appear to be available electronically on the
IEEE sites - latest available seems to be volume 35 #3. Do you have a link to
#4?
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of David Boyes
Sent: Friday,
We have 5 isolated systems running clones of our z/OS operating system. Our
current zFS root file system has not been controlled and now we are now using a
Serverpac to upgrade. I am planning to implement the maintenance procedure at
the bottom of this message but first here are my questions:
See below
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Donald Likens
Sent: Friday, November 22, 2013 1:14 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Managing the OMVS Root zFS FileSystem
We have 5 isolated systems running clones of
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5255174
Date: Fri, 22 Nov 2013 12:26:51 -0500
From: peter.far...@broadridge.com
Subject: Re: Computer Industry Strategies: IEEE Annals of the History of
Computing articles on IBM and others.
To: IBM-MAIN@LISTSERV.UA.EDU
The latest
Robin -
What checksum are you using that is too CPU intensive?
Have you considered http://en.wikipedia.org/wiki/MurmurHash ? It is about 4
to 8 times as fast as most hash schemes because (1) it is of
non-cryptographic quality and (2) it operates on entire words at once,
rather than bytes. You
Bill [Godfrey],
Thank you.
Alan Starr's explication is persuasive. It has the right sort of
murky period flavor: a length value in doublewords kept in a byte!
John Gilmore, Ashland, MA 01721 - USA
--
For IBM-MAIN subscribe /
There are tools to do this. Data Propagator and STRIVA come to mind. Overhead
is pretty steep.
In a message dated 11/22/13 08:32:31 Central Standard Time, abend...@gmail.com
writes:
However I imagine it would be a bit of a hard sell to the customers. :)
On Fri, 22 Nov 2013 12:13:34 -0600, Donald Likens dlik...@infosecinc.com
wrote:
We have 5 isolated systems running clones of our z/OS operating system. Our
current
zFS root file system has not been controlled and now we are now using a
Serverpac to
upgrade. I am planning to implement the
Thanks for the link.
Peter
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Harry Wahl
Sent: Friday, November 22, 2013 2:01 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Computer Industry Strategies: IEEE Annals of the History of
He's also betting against Warren Buffet, of course... and against IBM
technology providing cloud computing.
From Bloomberg, Nov 22, 2013, 16:18:03
Stan Druckenmiller, who has one of the best track records in the
hedge-fund industry over the past three decades, said he’s betting
against the
How about not until IBM tells you to? As in you must accept
before apply this PTF?
On Fri, Nov 22, 2013 at 8:40 AM, Staller, Allan allan.stal...@kbmg.com wrote:
IMO, the short answer is just before the next APPLY.
HTH,
Hello Roger,
The output are as :
COMMAND INPUT === /DS P,3000 SCROLL ===
CSR
RESPONSE=DEV1
IEE459I 19.13.40 DEVSERV PATHS 065
UNIT DTYPE M CNT VOLSER CHPID=PATH STATUS
RTYPE SSID CFW TC DFW PIN DC-STATE CCA DDC CYL CU-TYPE
03000,33903
29 matches
Mail list logo