Beautiful, thanks, I'll check this out.
– Vignesh
Mainframe Infrastructure
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of
Horst Sinram
Sent: 12 November 2018 21:14
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [EXTERNAL] Re: Service class changes
See SMF Type 90, subtype
Tony,
Speaking as a former vendor (a long time ago in a galaxy far, far away . . . ),
far be it from me to suggest that you give away valuable intellectual property.
That is contrary to all self-interest (never mind the enlightened kind), and I
would not ask or expect any vendor to do that.
Hi Folks,
The CBT Tape web site, www.cbttape.org, has just been updated with
CBT Version 496. The updates will (hopefully) now go to Version 497.
Please check the site to make sure things were done correctly, and all
the updates that were supposed to be there, are there. Thanks much
Speaking as a vendor.
There are several interfaces that I had to invest a *lot* of time to get
working right. And using those interfaces is what makes my products
efficient and market worthy.
If I were to publish some of my interface code, some new guy would have
75% of a product that can
+1
Good way of suggesting justification for examples!
Best Regards,
Doug
.
On Nov 12, 2018, at 19:55, Charles Mills wrote:
The profit comes from the potential for increased utility for the platform.
It's hard to connect specific dots "if you show Peter Farley how to do DUCT
TRAP somewhere
The profit comes from the potential for increased utility for the platform.
It's hard to connect specific dots "if you show Peter Farley how to do DUCT
TRAP somewhere someone will buy another z box" but it is not hard to imagine
the ultimate connection.
Charles
-Original Message-
From:
+1
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Farley, Peter x23353
Sent: Monday, November 12, 2018 3:26 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Why are sophisticated system-level coding examples not
available? [was:
Just my $.02...
Back when I was learning to program I was told the best way to learn to
program well was to read well-written code.
Lou
--
Artificial Intelligence is no match for Natural Stupidity
- Unknown
On Mon, Nov 12, 2018 at 4:21 PM Paul Gilmartin <
Then the not-yet-available examples ought to include all the error recovery
infrastructure needed to assure the least system impact possible.
Like the brief discussions I had with others on this list a few years back
about code to set the DUCT TRAP fields so that TRAP and COMPARE-AND-TRAP
Or pass the address of a shared memory segment to the SRB routine, attach it to
the target (current) address space, move the data to it, then detach it from
the target address space before the SRB terminates.
Wayne Driscoll
Rocket Software
Note - All opinions are strictly my own.
There are a large number of parts to make sure that things are done the right
way, and that a fault will not bring the system to a crash.
While one might be able to show examples of simple techniques, there is a lot
of infrastructure required to handle problems.
For example, what happens if you
On Mon, 12 Nov 2018 22:11:15 +, Farley, Peter x23353 wrote:
>
>Of course, all that isaancient history now. No university or education center
>offers anything like that anymore. Much more profitable to offer
>certification courses in Windows.
>
Marist? But still, a limited choice.
-- gil
And that was my whole point -- Where are the examples for programmers to see
how to do it the right way?
If SHARE has some presentations it is good to know that. Not the easiest place
to search for stuff, but at least it is accessible.
Yes, of course experience is the best teacher, but
See SMF Type 90, subtype 30:
https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.1.0/com.ibm.zos.v2r1.ieag200/iea3g2_RESET_command_complete.htm
Horst Sinram - STSM, z/OS Workload and Capacity Management
--
For IBM-MAIN
What features of XL C are you using that really needs a PDS/E? XPLINK
comes to mind, but there are others.
IAC try linking it to a PDS/E (library) and not a PDS.
Good Luck,
John
--
This message (and reply) was read by Google and the NSA.
It does sound reasonable, but there are some caveats: First, many
"acronyms" in our world are merely names -- the underlying words mean
virtually nothing (e.g IMS, CICS, TSO, ISPF...). You'd need to describe
what they actually are as well, for it to be something better than mere
pedantry.
Also,
On Fri, 31 Aug 2018 15:30:29 -0700, Charles Mills wrote:
>From The New York Times:
>
>E.U. Will Let Countries Decide Whether to Use Daylight Saving
>
>Some countries have lobbied to end the requirement that all 28 member states
>spring forward and fall back each year.
>
I was in several of the OCO sessions at SHARE. They were heated but in summary
there were two major points. Intellectual property(the clones were trying to
reverse engineer MVS), change control-Hursley was saying the large majority of
their problems were coming from modified IBM code. Our post
There are some good SHARE presentations on some of these techniques.
Unfortunately for you, I'm too lazy to search for them.
However, and this is important, anything and everything you do that uses
authorized services entails exposure of system integrity. It behooves any
organization to ensure
In answer to the last question, GUPI interfaces. "Do the right thing in the
right way."
In these sophisticated cases GUPI may also require APF authorization, which is
OK if that is what the process requires to make it "done right". If you don't
have it you probably shouldn't be trying to use
With the use of a little bit of statistical analysis, I target 35% utilization
of CSA, ECSA, SQA, ESQA.
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of
Mark Jacobs - Listserv
Sent: Monday, November 12, 2018 2:22 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: ECSA
On 11/12/2018 10:56 AM, David W Noon wrote:
I think most of the low-level techniques were derived from code seen on
the IBM-supplied microfiche (remember that?) that arrived with MVS
installation media. It would benefit the mainframe industry if
microfiche (or a more modern medium) were
As with most things the answer is "it depends." There is no one size fits all
answer. Depends on your workload and the ECSA requirements as well as the need
for above the line private region. My standard was 250MB ECSA on each system,
with a target of about 50-60 percent used, to allow for
On Mon, 12 Nov 2018 10:52:02 -0800, Charles Mills wrote:
>+1
>I would say that sometimes right after a feature comes out there is a
>presentation at SHARE, e.g., "How to use the new PC-ss facility." That is not
>optimal if your first need to use PC-ss comes five or ten years after it first
>is
On Mon, 12 Nov 2018 18:13:30 +, Farley, Peter X23353
(peter.far...@broadridge.com) wrote about "Why are sophisticated
system-level coding examples not available? [was: RE: Recommended method
for accessing secondary access spaces]" (in
):
> Not jumping on Ed Jaffe or Peter Relson or any of the
+1
I would say that sometimes right after a feature comes out there is a
presentation at SHARE, e.g., "How to use the new PC-ss facility." That is not
optimal if your first need to use PC-ss comes five or ten years after it first
is available. Some SHARE presentations are available online;
I meant the size
On Mon 12 Nov, 2018, 10:08 PM Mark Jacobs - Listserv <
mark.jac...@custserv.com wrote:
> By tuning, do you mean size of, or something else?
>
> Peter wrote on 11/12/18 12:43 PM:
>
> Hi
>
> This is just general question and ignorant about this area. So wanted to
> get some
Not jumping on Ed Jaffe or Peter Relson or any of the other thoughtful and
helpful responders in this email chain, but it still rankles me that there are
no good examples anywhere (not at IBM and not at CBT) for programmers to review
that show exactly how to set up and use "SRB to the other
By tuning, do you mean size of, or something else?
Peter wrote on 11/12/18 12:43 PM:
Hi
This is just general question and ignorant about this area. So wanted to
get some suggestions and pointers about ECSA running.
What are the factors that decides the tunning of ECSA value for zOS ?
Please
Hi
This is just general question and ignorant about this area. So wanted to
get some suggestions and pointers about ECSA running.
What are the factors that decides the tunning of ECSA value for zOS ?
Please share your opinion and suggestions so that I can note down the
points and research it
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
On Mon, 12 Nov 2018 09:28:44 -0600, Tom Marchant wrote:
>On Fri, 9 Nov 2018 15:35:55 -0600, Paul Gilmartin wrote:
>
>>It's a shame that the capabilities of PDSE aren't a superset of the
>>capabilities
>>of PDS.
>
>They are, with the exception of scatter-load. I believe that is used only for
Close: BSC and local non-SNA.
They say that the memory is the second thing to go; I don't remember the first.
--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
From: IBM Mainframe Discussion List on behalf of
David Spiegel
Sent: Wednesday,
Well, foreground TSO is time sharing, and it is still orional in the sense that
you have to define TSO segments or (obsolete) UADS entries.
--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
From: IBM Mainframe Discussion List on behalf of
Jesse
Actually, that advise sounds reasonable, although I will confess that I don't
always follow it!
--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
From: IBM Mainframe Discussion List on behalf of
Charles Mills
Sent: Wednesday, November 7, 2018
On Sun, 11 Nov 2018 23:51:00 -0700, Mark Post wrote:
>
>More than likely, PMAINT or someone else has the CF0 disk linked read-write.
>You'll need to figure out who that is and have them either detach the disk, or
>re-link it as read only. As Jake mentioned, you could FTP it to another disk
On 11/12/2018 7:28 AM, Joseph Reichman wrote:
I can use CSA storage to pass back the data if after I copy it over I
release it
We used to do that back in the pre-ESA/390 days.
That technique carries with it all sorts of hideous timing/cleanup
issues that simply don't exist with the PC-ss
I’m quite aware of not using CSA but its only while I’m running the SRB and
then I’ll release it
I’m displaying SDSF type info on a Windows Client via TCP/IP
EZASMI/CAsyncSockets
Thanks
On Mon, Nov 12, 2018 at 11:26 AM Rob Scott
wrote:
> Bear in mind that CSA is a limited resource - so make
Bear in mind that CSA is a limited resource - so make sure your recovery code
solid.
And obviously you need to "bounds check" to make sure you are not *that guy*
that overlays common storage.
64-bit is available as alternative to traditional 31-bit (or 24-bit - yuk).
Is any of the data
Well, I would say (1) it is part of IBM z/OS now. IBM charges big bucks for it,
so they own the problem, no matter where it came from originally.
But (2) nowhere did I blame IBM explicitly. It is shamefully poor programming
practice no matter what company hat the programmer was wearing at the
I can use CSA storage to pass back the data if after I copy it over I
release it
On Mon, Nov 12, 2018 at 10:26 AM Ed Jaffe
wrote:
> On 11/12/2018 5:21 AM, Joseph Reichman wrote:
> > I’m changing my code to use a SRB
>
>
> That's what we do in many similar situations... and then PC-ss back to
>
On Fri, 9 Nov 2018 15:35:55 -0600, Paul Gilmartin wrote:
>It's a shame that the capabilities of PDSE aren't a superset of the
>capabilities
>of PDS.
They are, with the exception of scatter-load. I believe that is used only for
the system nucleus.
--
Tom Marchant
On 11/12/2018 5:21 AM, Joseph Reichman wrote:
I’m changing my code to use a SRB
That's what we do in many similar situations... and then PC-ss back to
the requesting address space from the SRB to pass back the necessary data.
--
Phoenix Software International
Edward E. Jaffe
831 Parkview
Yes, SYS1.SIEALNKE contains GSKSSL and many more:
DSLISTSYS1.SIEALNKE
Name
GSKCMS31
GSKCMS64
GSKC31
GSKC31F
GSKC64
GSKC64F
GSKKYMAN
GSKSCTSS
GSKSRBRD
GSKSRBWT
I’m changing my code to use a SRB
On Nov 12, 2018, at 7:38 AM, Peter Relson wrote:
>> ASCBFLG1,ACBLSAS+ACBTERM
>
>
> These are not programming interfaces. You use them at your client's risk.
>
>
> Peter Relson
> z/OS Core Technology Design
>
>
>
>ASCBFLG1,ACBLSAS+ACBTERM
These are not programming interfaces. You use them at your client's risk.
Peter Relson
z/OS Core Technology Design
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to
> > I wrote a loadmodule (e.g. SENDEM) in C which can send unencryptet emails i=
> > n OMVS, Batch Environment and CICS Environment. Now I got the task to modif=
> > y this module using TLS 1.2. I included the GSK library by setting
> >
> > GSKDIR =3D /usr/lpp/gskssl
> > GSKINC =3D
an update about syssrc & syscpu under systemrexx:
I opened a PMR. IBM agrees it does not work. However, they supplied a long
explanation how it works under TSO/E, why it doesn't work under SystemRexx,
and a workaround based on Rexx STORAGE function. If I want the issue to be
fixed, I need to open
DFsort evaluates the status of the system at each run, so different runs will
produce different results and predicting is difficult.
DFsort statistics will show how the sort ran:
ICE055I 0 INSERT 442351, DELETE 442351
ICE054I 0 RECORDS - IN: 0, OUT: 0
49 matches
Mail list logo