I probably should have also mentioned that z/OS Management Facility
(z/OSMF) provides REST APIs for such tasks as provisioning services,
submitting jobs, console interface services, and much more. z/OSMF is a no
additional charge feature in the base z/OS operating system, and it's now
(in z/OS
IBM Data Virtualization Manager for z/OS (5698-DVM) appears to provide what
you're asking, assuming you're not asking about file transfer or Network
File System (NFS) access. Details here:
https://www.ibm.com/us-en/marketplace/data-virtualization-manager-for-zos
l...@garlic.com (Anne & Lynn Wheeler) writes:
> also from bitsavers:
> http://www.bitsavers.org/pdf/amdahl/datapro/70C-044-01_7709_Amdahl_470.pdf
re:
http://www.garlic.com/~lynn/2018c.html#27 Software Delivery on Tape to be
Discontinued
other trivia ... from 470.pdf article
The system that
000433f07816-dmarc-requ...@listserv.ua.edu (Paul Gilmartin) writes:
> I don't understand digital signatures beyond what I just read in:
> https://en.wikipedia.org/wiki/Digital_signature
>
> ... Digital signatures are equivalent to traditional handwritten
> signatures
> in many
On 4/04/2018 10:53 AM, Charles Mills wrote:
No, a digital signature does not require an authority.
I publish my public key on my Web site.
How do I verify that the key that I see browsing your website is really
yours and hasn't been e.g. substituted in transit? Key exchange is the
hardest
000a2a8c2020-dmarc-requ...@listserv.ua.edu (Tom Marchant) writes:
> I'm pretty sure that the 470/6 was never shipped. The way I heard it was that
> work on the 470/V started very soon after the introduction of virtual memory
> on 370 machines and the announcement of OS/VS1 and OS/VS2. OS/VS1
On 4/04/2018 10:29 AM, Paul Gilmartin wrote:
So is a signature any more secure than an independently verifiable checksum,
or just more practical?
If you get the checksum via a reliable channel I think it is as secure.
The digital signature allows the checksum to be included with the file,
and
No, a digital signature does not require an authority.
I publish my public key on my Web site.
I send you a message along with a hash encrypted with my private key.
If you decrypt that encrypted hash with my public key and it matches the hash
of the message that you compute then the signature
On Wed, 4 Apr 2018 08:17:14 +1000, Andrew Rowley wrote:
>On 3/04/2018 9:21 PM, John Eells wrote:
>>
>> If you have a requirement for packages signed with strong algorithms,
>> please open an RFE.
>>
>Is the SMP/E package signed, or just checksummed? A stronger hash is no
>real value if the hash
Cics atom will put a file available to user
On Tue, Apr 3, 2018, 2:42 PM IT-Beratung wrote:
> Again the tcACCESS product from B.O.S. Software allows SQL based access
> to VSAM, IMS, PDS/PS, DB2, ADABAS, IDMS, DATACOM from Windows, Linux,
> Unix. It uses various
Alan Altmark wrote:
>Boys, the issue is not whether TLS can be broken. "Anything you can do,
>I can do better!" the song goes. Given time and energy, any economically
>viable crypto can be broken. The entire industry is about making time
>and energy the limiting factor as opposed to the strength
On 3/04/2018 9:21 PM, John Eells wrote:
If you have a requirement for packages signed with strong algorithms,
please open an RFE.
Is the SMP/E package signed, or just checksummed? A stronger hash is no
real value if the hash itself can be substituted because it is not
cryptographically
Thanks for this heads up. We also installed OA53355 (for 2.1 RSU) recently. I
totally missed this hold item. The relevant health check
ZOSMIGV2R3_NEXT_VSM_USERKEYCOMM was not activated. After reading this post, I
turned it on. Ouch. We have some work to do.
.
.
J.O.Skip Robinson
Southern
On 4/3/18, 4:24 PM, "IBM Mainframe Discussion List on behalf of Alan Altmark"
wrote:
> The entire industry is about making time and energy the limiting factor as
> opposed to the strength of the algorithms themselves.
Agreed.
>
On Mon, 2 Apr 2018 15:24:27 -0500, Edward Gould wrote:
>You are probably not missing anything. I think its me that is missing
>something.
>I get from you that you do “something” on the HMC (something about a FTP
>server) I haven’t see it but it may be hidden I don’t use
On Tue, 3 Apr 2018 19:39:57 +, David Boyes wrote:
>On 4/3/18, 3:00 PM, "IBM Mainframe Discussion List on behalf of Phil Smith"
> wrote:
>I believe we're talking about different things. What you're describing
john.archie.mck...@gmail.com (John McKown) writes:
> Not exactly correct. OS/VS1 was a single large address space. That one
> address space was divided up into a _fixed_ number of _fixed sized_
> partitions (not regions). That is, if you had a step which required, say,
> 128M to run, you had to
In the Concorde accident. They didn't get up to minimum speed for 2
engine flying and landed on a hotel.
On Tue, Apr 3, 2018 at 2:02 PM, zMan wrote:
> How much can those planes slow down before they fall out of the sky?? (Old
> joke, punchline: "If we lose that last
OS/VS2 R1 (SVS) had a single 16 MiB address space, but it had swapping for TSO
sessions.
--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
From: IBM Mainframe Discussion List on behalf of
Paul Gilmartin
Keep in mind that SVS supported TSO, so one region might contain multiple
sessions, only one of which was swapped in at any given time.
--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
From: IBM Mainframe Discussion List
On 4/3/18, 3:00 PM, "IBM Mainframe Discussion List on behalf of Phil Smith"
wrote:
I believe we're talking about different things. What you're describing isn't
civilian use of TLS. It's probably stream-cipher stuff (which is weaker anyway)
On Tue, Apr 3, 2018 at 1:52 PM, Paul Gilmartin <
000433f07816-dmarc-requ...@listserv.ua.edu> wrote:
> On Tue, 3 Apr 2018 13:31:02 -0500, Tom Marchant wrote:
> >
> >... OS/VS1 and
> >OS/VS2 release 1 were both introduced in 1972 and OS/VS2 release 2 (MVS)
> >in 1973, though I don't know when
How much can those planes slow down before they fall out of the sky?? (Old
joke, punchline: "If we lose that last engine, we'll be stuck up here!")
On Tue, Apr 3, 2018 at 2:30 PM, Itschak Mugzach wrote:
> The European air traffic control reports data loss causing slowdown in
David Boyes wrote:
>No, I'm referring to devices installed in a CO (with or without the
>acquiescence of the telco in question, usually with) where they can
>benefit from high-volume data capture. Their purpose is to intercept
>traffic flows at a carrier-grade scale, and are not generally
IBM prepares for the removal of support for user key common areas
I was presented with this PTF on our recent z/OS 2.2 Maintenance upgrade.
.
UA94606
.
The allocating, obtaining, or changing common areas ofvirtual
storage, such that
On Tue, 3 Apr 2018 13:31:02 -0500, Tom Marchant wrote:
>
>... OS/VS1 and
>OS/VS2 release 1 were both introduced in 1972 and OS/VS2 release 2 (MVS)
>in 1973, though I don't know when it actually shipped.
What was OS/VS2 without MVS? To me:
OS/VS1 means a single large (up to 24-bit address
Again the tcACCESS product from B.O.S. Software allows SQL based access
to VSAM, IMS, PDS/PS, DB2, ADABAS, IDMS, DATACOM from Windows, Linux,
Unix. It uses various connectivity methods (today mostly TCP/IP, but
also supports 3270, TELNET, MS and more). Standard SQL can be used to
READ, UPDATE,
On Tue, 3 Apr 2018 13:01:56 -0500, John McKown wrote:
>On Tue, Apr 3, 2018 at 12:44 PM, Ward, Mike S wrote:
>
>> Hello all, does anyone know of any software that allows access to VSAM,
>> SEQ, CICS files from remote systems. I.E. distributed systems. How is the
>> access done? Web service calls?
On Tue, 3 Apr 2018 17:48:52 +, Seymour J Metz wrote:
>A point of idle curiosity. When Amdahl dropped the 470 and announced the 470V,
>did they change the panel color?
I'm pretty sure that the 470/6 was never shipped. The way I heard it was that
work on the 470/V started very soon after the
The European air traffic control reports data loss causing slowdown in air
traffic. AFAIK they are mainframe. Are they?
ITschak
נשלח מה-iPad שלי
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to
On Tue, Apr 3, 2018 at 12:44 PM, Ward, Mike S wrote:
> Hello all, does anyone know of any software that allows access to VSAM,
> SEQ, CICS files from remote systems. I.E. distributed systems. How is the
> access done? Web service calls? MQ calls?
>
Do you mean forms of "file
zConnect and a lot of others.
ITschak
בתאריך יום ג׳, 3 באפר׳ 2018, 20:45, מאת Ward, Mike S :
> Hello all, does anyone know of any software that allows access to VSAM,
> SEQ, CICS files from remote systems. I.E. distributed systems. How is the
> access done? Web service calls?
A point of idle curiosity. When Amdahl dropped the 470 and announced the 470V,
did they change the panel color?
--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
From: IBM Mainframe Discussion List on behalf of
Pew,
Hello all, does anyone know of any software that allows access to VSAM, SEQ,
CICS files from remote systems. I.E. distributed systems. How is the access
done? Web service calls? MQ calls?
Thanks.
==
This email, and any files transmitted with it, is confidential and
On 4/3/18, 11:59 AM, "IBM Mainframe Discussion List on behalf of Phil Smith"
wrote:
> They suggest that you're referring to intranet proxies, which can certainly
> terminate TLS, but that's not at all the same thing.
No, I'm referring to
David Boyes wrote, in part:
>I'm not a security guy either, but I do know a fair amount about the transport
>infrastructure used in the Internet core and what gets connected to what and
>how.
>Carrier-level surveillance devices such as the ones manufactured by Palantir
>Systems
>are capable of
Sorry it wasnt meant to offend anyone.
On Mon, Apr 2, 2018 at 3:05 PM Edward Finnell <
000248cce9f3-dmarc-requ...@listserv.ua.edu> wrote:
> We're on baby watch so haven't been following closely, but definitely not
> good form for a technical list. We've all got our pet peccadilloes but
Timothy,
I really appreciate this. We are looking at future roadmaps for products
and future direction for
provisioning and reconciliation for IDM ..
Best Regards,
Scott
On Mon, Apr 2, 2018 at 1:40 AM Timothy Sipples wrote:
> Here's a reasonably complete answer
>
> 1.
R.S. wrote:
From the other hand why SHA-1, not something stronger? I guess IBM
decided to use the most available algorithm in the z/OS. Even if you
haven't set up ICSF.
It seemed perfectly adequate at the time, there was an available Java
class for those who did not have ICSF set up as you
Phillip,
What you are trying to do is NOT an IDCAMS process.
This is a FDR ABR process. You are adding volumes to the ABR archive pool.
(Think DFHSM ML1 if you know / understand DFHSM)
Unfortunately, the site I'm currently at doesn't use FDR ABR, so I don't have
access to the FDR manuals,
40 matches
Mail list logo