Re: CPACF Metrics?

2007-01-18 Thread R.S.

Jeffrey Deaver wrote:

I've been told that IBM publishes some numbers that show CPACF overhead
metrics somewhere? Anyone know where?   I'm basically interested in
confirming something a vendor told me about an encryption product - so
many
MBs encrypted for so many CPU seconds.


I downloaded the following document:
IBM eServer zSeries 990 Performance of Cryptographic
Operations
(Cryptographic Hardware: CPACF, PCICA, PCIXCC, CEX2C)

I can't remeber URL (for sure it was IBM site), however I can sent it to 
you if you want.


--
Radoslaw Skorupka
Lodz, Poland

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe vs. Server (Was Just another example of mainframe costs.)

2007-01-18 Thread R.S.

Timothy Sipples wrote:

John Chase writes:

Indeed.  Windows is about as open as the former Soviet Union.


Amen.

Re: Anyone can build a hardware box to run Windows, well, yes, but you
must go to Intel or AMD for the chip.  So you have a duopoly -- AMD
argues
a monopoly -- on the component that matters.  
Currently almost every piece of hardware has drivers, and the drivers 
are certified by M$. Now it's optional, although customer get serious 
warning. Maybe in next version the functionality of unsupported 
hardware will be reduced, and finally it won't work at all. That's 
monopoly. You don't have to produce the hardware, it is enough when you 
govern it. For fee.



--
Radoslaw Skorupka
Lodz, Poland

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


HSM/RMM tape reuse

2007-01-18 Thread Ron MacRae
LadiesGentlemen,
 I'm sure this is an easy question for anyone who 
understands HSM  RMM, unfortunatly I'm not one of them.

We've been running HSM/RMM without problems for several years. Recently, 
not sure exactly when, HSM started spitting out the following msgs when it 
freed up a tape. 

ARC0365I BACKUP VOLUME FT1718 NOW AVAILABLE FOR RECYCLE
ARC0261I TAPE VOLUME FT1718 NEEDS TO BE REINITIALIZED 

We have now run out of tapes. 
(Actualy faketapes on a flex machine, but I don't think that is relevent.)

We don't understand why this has started to happen. Our HSM parms were last 
changed in 2003. Several people have been playing with RMM so we suspect 
it's something in RMM.

If I list the tape in RMM the actions on release are -
Action on release:   
Scratch immediate  = N  Expiry date ignore = N   
Scratch = Y  Replace = N  Return = N  Init = N  Erase = N  Notify = N
Actions pending: 
Scratch = N  Replace = N  Return = N  Init = N  Erase = N  Notify = N

We could switch on INIT but we don't want the tapes reinitialised, we just 
want to re-use them.

What changes, presumably in RMM, can have caused the ARC0261I msgs to start?

Thanks in advance,

Ron MacRae

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe vs. Server (Was Just another example of mainframe costs.)

2007-01-18 Thread Shane
On Thu, 2007-01-18 at 15:26 +0900, Timothy Sipples wrote:

 Most X86-based Linux distributions include closed source device drivers.

Do they just ???.
That makes them tainted, and hence unable to report kernel oops'es to
the kernel developers.

Does this mythical Most X86-based Linux distributions have any
relation to the count of installed systems ???.
I'd be contending not based on my experience.

Shane ...

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe vs. Server (Was Just another example of mainframe costs.)

2007-01-18 Thread Nigel Hadfield
I agree that the term open system has been flagrantly misused, primarily
to promote Unix systems at the expense of proprietary systems like z/os
and Windows. I think the idea that Windows is open was put forward by
Microsoft precisely to counter this pro-Unix marketing ploy. And IBM's
response of course was MVS Open Edition, and later Linux.

One company I know used to define open systems in terms of the
interoperability of programs, data, and people. Most Unix programs can be
ported to other Unix flavours; in Unix a file is a file is a file; and if
you are comfortable using one flavour of Unix you'll usually convert to a
different flavour pretty quickly. But you can't move to someone else's
Windows or z/OS, or rebuild Windows or z/OS for a different platform. So
they're not open.

I suppose we should think of open hardware and open software separately.
Anyone is allowed to build an IBM-compatible PC, but not an IBM-compatible
mainframe. I guess anyone is also free to build an Intel x86-compatible
processor (as AMD have done), or an AMD64-compatible processor (as Intel
have done). But don't dare try to build a z/Archtiecture processor.

Nigel


On 18/1/07 06:26, Timothy Sipples [EMAIL PROTECTED] wrote:

 John Chase writes:
 Indeed.  Windows is about as open as the former Soviet Union.
 
 Amen.
 
 Re: Anyone can build a hardware box to run Windows, well, yes, but you
 must go to Intel or AMD for the chip.  So you have a duopoly -- AMD argues
 a monopoly -- on the component that matters.  But software is far more
 meaningful when talking about openness.  I fail to see how anybody could
 reasonably describe a Windows PC server as open and a System z running
 Linux as not open.  It's just plain deceptive.  Same goes for HP-UX on
 Itanium.
 
 FWIW, I think IBM still includes lots of TPF source code with that
 operating system.  And mainframe Linux is 100% open source.  Most X86-based
 Linux distributions include closed source device drivers.
 
 Words ought to mean something, and I wish the (primarily UNIX) marketers
 hadn't stolen the word open.  I think it's time to take the word back
 from the marketers and return it to the English language.  I use the term
 distributed server since that's the most neutral-but-descriptive term I
 know.  Maybe there's a better term.
 
 - - - - -
 Timothy Sipples
 IBM Consulting Enterprise Software Architect
 Specializing in Software Architectures Related to System z
 Based in Tokyo, Serving IBM Japan and IBM Asia-Pacific
 E-Mail: [EMAIL PROTECTED]
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SYSPLEX for PDS-E Sharing

2007-01-18 Thread Mark Zelden
On Wed, 17 Jan 2007 17:45:43 -0500, Jim Mulder [EMAIL PROTECTED] wrote:


  Basic sysplex came in MVS/ESA SP4.1.  PDSE came in MVS/ESA SP4.3.

Jim Mulder   z/OS System Test   IBM Corp.  Poughkeepsie,  NY


Thanks Jim.  Brain cramp  ...  I don't know why I thought PDSE was
around since ESA V3.  

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America / Farmers Insurance Group - GITO
mailto:[EMAIL PROTECTED]
z/OS and OS390 expert at http://searchDataCenter.com/ateExperts/
Systems Programming expert at http://expertanswercenter.techtarget.com/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe vs. Server (Was Just another example of mainframe costs.)

2007-01-18 Thread Ed Gould

On Jan 18, 2007, at 12:26 AM, Timothy Sipples wrote:


SNIP---

FWIW, I think IBM still includes lots of TPF source code with that
operating system.  And mainframe Linux is 100% open source.  Most  
X86-based

Linux distributions include closed source device drivers.

SNIP--

SIgh... and we won't talk about the current Z/os would you where IBM  
continuously shrinks the source it sends out. JES2 is almost down to  
bare bones, despite IBM promises to the contrary when IBM went  
(mostly) OCO 10 or so years ago.


Ed

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe vs. Server (Was Just another example of mainframe costs.)

2007-01-18 Thread Tom Marchant
On Thu, 18 Jan 2007 15:26:31 +0900, Timothy Sipples 
[EMAIL PROTECTED] wrote:

...  Most X86-based
Linux distributions include closed source device drivers.


Really?  Sounds like FUD to me.  My experience with Linux is
limited, but I've beeen running Fedora Core for about a year and
I know that it's distribution is entirely open source.  I'm pretty
sure Red Hat is also, as well as Debian, Ubuntu, Slackware,
Knoppix, Gentoo and others.  Which distributions do you know that
Include closed source drivers?

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: How to Write SAS Output to MVS external file?

2007-01-18 Thread Carol Srna
Jim Horne,  Tom.  Thanks so very much for your help.
I got the results when I added the PROC PRINT DATA=RMMDTL; after the 
PROC Printo statement. I have to do some tweaking. It's been a while since 
I've used SAS. Gotta brush the cobwebs off.

Again, Thanks so very much.
~~Carol 




Thomas H Puddicombe [EMAIL PROTECTED] 
Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
01/17/2007 04:26 PM
Please respond to
IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU


To
IBM-MAIN@BAMA.UA.EDU
cc

Subject
Re: How to Write SAS Output to MVS external file?






Hi Carol,

The answer is ... it depends.

If you'd like SAS to produce a report (PROC PRINT) in a flat file, you can 

PROC PRINTTO PRINT=MYOUTPUT; followed by a PROC PRINT DATA=RMMDTL;

If you want to produce a flat file with some SAS variables in it, then 

 ods listing close; 
 
 ods csvall file=CSV rs=none; 
 
 proc print data=cicstxn; 
   var smf__sid smf__jbn trntran trnterm trnuserid trnttype 
   trnstart trnstop trntrannum trntranpri trnluname trnpgmname 
   trnabcodec trnresp trnfctotct trntdtotct trntstotct trnspsyncct
   trnchmodect trnusrdispt trnusrdisptn trnusrcput trnusrcputn 
   trnsusptime trnsusptimen trndispwtt trndispwttn trnqrdispt 
   trnqrdisptn trnqrcput trnqrcputn trnmsdispt trnmsdisptn 
   trnmscput trnmscputn trnrodispt trnrodisptn trndspdelay 
   trntcldelay trnmxtdelay trnrmitime trnrmitimen trnrmisusp 
   trnrmisuspn 
 ; 
   run; 
 
 ods csvall close; 
 
 ods listing; 

There's a DD statement in my JCL that looks like:
//CSV  DD DISP=(,CATLG,DELETE),SPACE=(TRK,(15,15),RLSE), 
//UNIT=SYSDA, 
//DSN=SYSUID..RPTCICF0.CSV 

This produces a comma-separated-variable file suitable for input into 
Excel.

There's also a SAS FILE statement lets you create a flat file out of 
about anything.

Tom




 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe vs. Server (Was Just another example of mainframe costs.)

2007-01-18 Thread Bill Richter
I realize that this is not constructive, but the url below is an ad for 
Windows 386.  It does make the point that Micrsoft spoke to the customer's 
need for IT empowerment.  z/OS  zLinux still do not have a compelling 
empowerment message.  You can't sell someone a product if they don't 
percieve a need.

http://video.google.com/videoplay?docid=4915875929930836239;

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SYSPLEX for PDS-E Sharing

2007-01-18 Thread Tom Marchant
On Wed, 17 Jan 2007 17:11:44 -0500, Jack Kelly 
[EMAIL PROTECTED] wrote:

if you have mim, why would you put grs on top of that?


Because MIM doesn't protect PDSE.

Search the archives.  Don't forget IBM-MAIN-ARCHIVES.
This for example:

http://bama.ua.edu/cgi-bin/wa?A2=ind0309L=ibm-mainP=R25353

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CICS interface to CA-7

2007-01-18 Thread Richard Tsujimoto
Issuing any sort of SVC from a CICS task was always something that was 
discouraged (nothing like putting the region into a wait to make you 
popular with your users), but I suspect most (if not all) shops violate 
that rule.  Given that you don't know how long the CA code will take, it 
might be prudent to use an OS subtask.




Chase, John [EMAIL PROTECTED] 
Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
01/17/2007 04:36 PM
Please respond to
IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU


To
IBM-MAIN@BAMA.UA.EDU
cc

Subject
Re: CICS interface to CA-7






 -Original Message-
 From: IBM Mainframe Discussion List On Behalf Of Alan C. Field
 
 We have a CICS program that builds the parameter list and 
 then issues the CA-7 SVC to Demand jobs. 
 
 This worked on CA-7 Rel 3.3,
 
 We have just tried (and had to fall back) to upgrade to CA-7 
 11.0 because this technique No longer works. 
 
 CA's response id that the parameter list format changed and 
 they no longer document it. 
 
 We'll pursue this further with them.
 
 They suggest doing a LINK EP=U7SVC but this isn't allowed under CICS. 

One thing you CAN do in CICS nowadays is ATTACHX a subtask, passing it
the address of an ECB it can post (along with whatever other parms it
will need) when it's done, then EXEC CICS WAIT ECBLIST (but NOT an MVS
WAIT) for it to POST.  Alternatively, you could write a TRUE to link the
U7SVC (a little more complex, but saves the overhead of multiple ATTACHX
/ DETACH sequences).

But wouldn't you still need a correct parmlist to LINK EP=U7SVC anyway?

-jc-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CICS interface to CA-7

2007-01-18 Thread Alan Schwartz
snip
We have a CICS program that builds the parameter list and then issues
the CA-7 SVC to Demand jobs. 

unsnip

We're not at R11 of CA7 yet (but close) and we have a CICS program that 
does something similar.  Is this how your programs coded?

IF (COMMAREA-COMMAND-TYPE = 'DEM') 
MOVE +48 TO CA7-COMMAND-LENG 
MOVE COMMAREA-COMMAND-JOBN TO U7DATA-DMD-JOBN 
MOVE U7DATA-DMD TO CA7-COMMAND 
GO TO 5000-CALL-U7SVC. 
:
:
5000-CALL-U7SVC. 
CALL 'U7SVC' USING CA7-COMMAND-AREA. 
GO TO 9000-GOBACK. 



Alan Schwartz
Assurant Shared Business Services
Lead Systems Programmer
Phone:  651-361-4758
Fax:   651-361-5625
**
This e-mail message and all attachments transmitted with it may contain legally 
privileged and/or confidential information intended solely for the use of the 
addressee(s). If the reader of this message is not the intended recipient, you 
are hereby notified that any reading, dissemination, distribution, copying, 
forwarding or other use of this message or its attachments is strictly 
prohibited. If you have received this message in error, please notify the 
sender immediately and delete this message and all copies and backups thereof.

Thank you.
**

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe vs. Server (Was Just another example of mainfr

2007-01-18 Thread Paul Gilmartin
In a recent note, Tom Marchant said:

 Date: Thu, 18 Jan 2007 07:46:17 -0600
 
 Really?  Sounds like FUD to me.  My experience with Linux is
 limited, but I've beeen running Fedora Core for about a year and
 I know that it's distribution is entirely open source.  I'm pretty
 sure Red Hat is also, as well as Debian, Ubuntu, Slackware,
 Knoppix, Gentoo and others.  Which distributions do you know that
 Include closed source drivers?
 
Linux for z/Series?

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe vs. Server (Was Just another example of mainfr

2007-01-18 Thread Nigel Hadfield
I'm not so sure the distinction between software and microcode is that
artificial, but in any event I'd call Hercules a z/Architecture emulator
rather than processor. Of course, with a closed architecture, having the
hardware alone is not enough, since IBM wouldn't license the software.

Nigel


On 18/1/07 14:54, Paul Gilmartin [EMAIL PROTECTED] wrote:

 In a recent note, Nigel Hadfield said:
 
 Date: Thu, 18 Jan 2007 10:05:25 +
 
 I suppose we should think of open hardware and open software separately.
 Anyone is allowed to build an IBM-compatible PC, but not an IBM-compatible
 mainframe. I guess anyone is also free to build an Intel x86-compatible
 processor (as AMD have done), or an AMD64-compatible processor (as Intel
 have done). But don't dare try to build a z/Archtiecture processor.
 
 Hercules?  (I'll ignore the artificial distinction between software
 and microcode.)
 
 -- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe vs. Server (Was Just another example of mainfr

2007-01-18 Thread Paul Gilmartin
In a recent note, Nigel Hadfield said:

 Date: Thu, 18 Jan 2007 15:05:44 +
 
 I'm not so sure the distinction between software and microcode is that
 artificial, but in any event I'd call Hercules a z/Architecture emulator
 rather than processor. Of course, with a closed architecture, having the
 hardware alone is not enough, since IBM wouldn't license the software.
 
Are you saying there's no z/Architecture software that can be run
(legally) on Hercules?  Can anyone think of a counterexample?

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


DFHSM - Trying To Allocate Ouput Volume

2007-01-18 Thread willie bunter
I am not sure why this is occurring or what DFHSM is attempting to do.  I 
scanned the syslog as well as the DFHSM log to no avail.   I cannot find what 
is associated with the SYS16002.
Below is the message in its entirety:
   
  EF244I DFHSMG DFHSMG - UNABLE TO ALLOCATE 1 UNIT(S) 230
AT LEAST 1 OFFLINE UNIT(S) NEEDED.  
IEF877E DFHSMG NEEDS 1 UNIT(S) 231  
FOR DFHSMG SYS16002 
FOR VOLUME PRIVAT-   1  
OFFLINE 
922E-9230 923B 923D 9F03 9F0B-9F0E B418-B419 B43E-B445 
:   
OFFLINE, NOT ACCESSIBLE 
0FFF
:   
IEF878I END OF IEF877E FOR DFHSMG DFHSMG SYS16002   
3164 IEF238D DFHSMG - REPLY DEVICE NAME OR 'CANCEL'.
   
  In the DFHSM log all I found is :
  IEF506I DFHSMG DFHSMG SYS16002 - NO STORAGE VOLUMES. 'VOLUME=PRIVATE' ASSUMED.

  Can anybody hazard a guess as to how or where I can find more information on 
SYS16002 and why DFHSM is complaining?
   
  Thanks.
   
  
 

 
-
Never Miss an Email
Stay connected with Yahoo! Mail on your mobile. Get started!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe vs. Server (Was Just another example of mainfr

2007-01-18 Thread Nigel Hadfield
Now, now.

But I really can't think of a non-IBM hardware platform on which I could run
z/Linux. (Oh, go on then.)

Nigel


On 18/1/07 15:12, Paul Gilmartin [EMAIL PROTECTED] wrote:

 In a recent note, Nigel Hadfield said:
 
 Date: Thu, 18 Jan 2007 15:05:44 +
 
 I'm not so sure the distinction between software and microcode is that
 artificial, but in any event I'd call Hercules a z/Architecture emulator
 rather than processor. Of course, with a closed architecture, having the
 hardware alone is not enough, since IBM wouldn't license the software.
 
 Are you saying there's no z/Architecture software that can be run
 (legally) on Hercules?  Can anyone think of a counterexample?
 
 -- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe vs. Server (Was Just another example of mainfr

2007-01-18 Thread George J Shedlock
What about z/Linux?

George Shedlock Jr
PDC - 212-855-8675



Paul Gilmartin [EMAIL PROTECTED] 
Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
01/18/2007 09:12 AM



To
IBM-MAIN@BAMA.UA.EDU
cc

Subject
Re: Mainframe vs. Server (Was Just another example of mainfr






In a recent note, Nigel Hadfield said:

 Date: Thu, 18 Jan 2007 15:05:44 +
 
 I'm not so sure the distinction between software and microcode is that
 artificial, but in any event I'd call Hercules a z/Architecture emulator
 rather than processor. Of course, with a closed architecture, having the
 hardware alone is not enough, since IBM wouldn't license the software.
 
Are you saying there's no z/Architecture software that can be run
(legally) on Hercules?  Can anyone think of a counterexample?

-- gil
-- 




-

DTCC DISCLAIMER: This email and any files transmitted with it are
confidential and intended solely for the use of the individual or
entity to whom they are addressed. If you have received this email
in error, please notify us immediately and delete the email and any
attachments from your system. The recipient should check this email
and any attachments for the presence of viruses.  The company
accepts no liability for any damage caused by any virus transmitted
by this email.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe vs. Server (Was Just another example of mainframe costs.)

2007-01-18 Thread Howard Brazee
On 17 Jan 2007 22:26:52 -0800, [EMAIL PROTECTED] (Timothy
Sipples) wrote:

Re: Anyone can build a hardware box to run Windows, well, yes, but you
must go to Intel or AMD for the chip.  So you have a duopoly -- AMD argues
a monopoly -- on the component that matters.  But software is far more
meaningful when talking about openness.  I fail to see how anybody could
reasonably describe a Windows PC server as open and a System z running
Linux as not open.  It's just plain deceptive.  Same goes for HP-UX on
Itanium.

Whereas you can run Mac software with three different chip
architectures - not a good definition.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Removing unused 3286 from IODF

2007-01-18 Thread Johnston, Robert E
Thanks Roy and Kevin for the info. I'll put this on the back burner until I
foresee some downtime coming up. Those old definitions don't bother me so
much after all! :)

Much appreciated,
Robert


Confidentiality Notice: This e-mail message, including any attachments, is for 
the sole use of the intended recipient(s) and may contain confidential and 
privileged information.  Any unauthorized review, use, disclosure or 
distribution is prohibited.  If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What is command reject trying to tell me?

2007-01-18 Thread (IBM Mainframe Discussion List)
 
 
In a message dated 1/16/2007 6:19:54 P.M. Central Standard Time,  
[EMAIL PROTECTED] writes:

Unit Check means that you need to issue a SENSE command to  determine
the type of event.
A more accurate way to say this is that Unit Check means that the sense  data 
needs to be examined.  For maybe 10 years now at least IBM DASD  controllers 
have been sending the full set of sense data into central storage  along with 
the status at the time of the interrupt.  This feature, called  Concurrent 
Sense, allows IOS not to have to incur the overhead and time  delay of doing a 
separate I/O in order to read sense data.  The  sense bytes are stored in the 
extended control word within the IRB.   There is a bit in the SCHIB that 
indicates whether or not the device  presents sense data concurrently with the 
normal 
interrupt data such as  status.  I am not sure which device-related control 
block in storage has  this same info.  These sense bytes are only sent into 
central storage if  the status includes unit check.
 
Bill  Fairchild




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe vs. Server (Was Just another example of mainfr

2007-01-18 Thread Tom Marchant
On Thu, 18 Jan 2007 07:56:11 -0700, Paul Gilmartin 
[EMAIL PROTECTED] wrote:

In a recent note, Tom Marchant said:

 Date: Thu, 18 Jan 2007 07:46:17 -0600

 Really?  Sounds like FUD to me.  My experience with Linux is
 limited, but I've beeen running Fedora Core for about a year and
 I know that it's distribution is entirely open source.  I'm pretty
 sure Red Hat is also, as well as Debian, Ubuntu, Slackware,
 Knoppix, Gentoo and others.  Which distributions do you know that
 Include closed source drivers?

Linux for z/Series?


You snipped too much.  My comment was in response to Tim's statement
about X86-based Linux distributions:

On Thu, 18 Jan 2007 15:26:31 +0900, Timothy Sipples 
[EMAIL PROTECTED] wrote:

...  Most X86-based
Linux distributions include closed source device drivers.


-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


z/OS NFS Clients

2007-01-18 Thread Alan Brown
I searched through the archives and could not find a good answer to this
question.
 
We have a need for z/OS programs (batch jobs) to access flat files that are
on some distributed Unix boxes.  
 
1. Can we use NFS for this (i.e., setup the files on Unix as NFS mount
points)?
 
2. If yes, can someone point me to some documentation examples for using
z/OS as an NFS client (all of the IBM examples I found are for accessing NFS
mounts on the mainframe, not the other way around)?
 

Alan Brown 
Senior z/OS Consultant
Princeton Softech
111 Campus Drive
Princeton, New Jersey  08540

800.457.7060
609.627.5598 [direct]

[EMAIL PROTECTED]
http://www.princetonsoftech.com 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allocation puzzlement.

2007-01-18 Thread Hal Merritt
The failure happens on any TSO allocation. Haven't tried batch as yet.
The driving system is a really uncustomized 1.7.

This is not my first time with Mr. Zeldan's awesome work. I have two
other two pack systems that are working just fine. They were built from
fully customized z/os 1.4 systems. The VAT list is the same on all three
two pack systems:

VATDEF IPLUSE(PRIVATE) SYSUSE(PRIVATE)
RES3A,0,0,3390
RES3B,0,0,3390   

The obvious answer would be a change to the VAT list, but why? 

Thanks!!  

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Matthew Stitt
Sent: Wednesday, January 17, 2007 4:40 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Allocation puzzlement.

I'm going to make a few assumptions.

Are you trying to logon to the new system?  It would appear that your
IKJACCNT logon proc is trying to allocate a temporary file.  There are
no
volumes marked as Storage or Public in your VATLSTxx definitions.

 
NOTICE: This electronic mail message and any files transmitted with it are 
intended exclusively
for the individual or entity to which it is addressed. The message, together 
with any attachment, may contain confidential and/or privileged
information. Any unauthorized review, use, printing, saving, copying, 
disclosure 
or distribution is strictly prohibited. If you have received this message in 
error, please immediately
advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Offline Tape Drives - Candidates for allocation

2007-01-18 Thread Steve O'Connell
Matthew,
I tried to keep the initial post small, believe it or not, and 
left out a lot of detail, so the answer is YES - I think.

My recollection is that when we explicitly vary the drives offline for 
maintenance they are always varied offline to ALL LPARs in the SYSPLEX. In 
Production that is 2 LPARs, and we do not share drives across SYSPLEXes 
(at this particular location), so each SYSPLEX has only it's own devices 
genned. 
Similarly, when there is an 'error', we see the devices being implicitly 
varied offline to all LPARs automatically on the SYSLOG. 

We had a recurrence of the issue today (hence my post) and I see from the 
the SYSLOGs that in this particular case we had an error, the drive was 
varied offline to both LPARs automatically, and somebody then varied the 
drive back online to only one of the LPARs (LPAR2) but not the other 
(LPAR1) where we saw the problem this morning.
However, we have previously had occasions where the error went unnoticed 
and drive has remained offline to both LPARs and the problem manifested 
itself in exactly the same way.

I am interested to know the reason behind your (not stupid at all) 
question. 

Steve O.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Offline Tape Drives - Candidates for allocation

2007-01-18 Thread Steve O'Connell
Tim,
 can you issue CONFIG at the device level - and does this affect how 
ALLOCATION works as opposed to VARY?
I know that you can CONFIG at the CHP level but that would take out all 
drives on that CHP, not just the affected one.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


z/OS 1.4 - End of Support

2007-01-18 Thread Howard Rifkind
I understand that IBM support is being discontinued as
of 2/2007.

Would anyone know if that would be the beginning of
the month or end of the month?

Thanks.



 

Need Mail bonding?
Go to the Yahoo! Mail QA for great tips from Yahoo! Answers users.
http://answers.yahoo.com/dir/?link=listsid=396546091

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z/OS 1.4 - End of Support

2007-01-18 Thread Dean Montevago
3/31/2007

http://www-306.ibm.com/software/info/supportlifecycle/list/z.html

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Howard Rifkind
Sent: Thursday, January 18, 2007 12:28 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: z/OS 1.4 - End of Support


I understand that IBM support is being discontinued as
of 2/2007.

Would anyone know if that would be the beginning of
the month or end of the month?

Thanks.



 


Need Mail bonding?
Go to the Yahoo! Mail QA for great tips from Yahoo! Answers users.
http://answers.yahoo.com/dir/?link=listsid=396546091

--
For IBM-MAIN subscribe / signoff / archive access instructions, send
email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search
the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z/OS 1.4 - End of Support

2007-01-18 Thread Chase, John
 -Original Message-
 From: IBM Mainframe Discussion List On Behalf Of Howard Rifkind
 
 I understand that IBM support is being discontinued as of 2/2007.
 
 Would anyone know if that would be the beginning of the month 
 or end of the month?

Last EOS date I saw published was March 31, 2007.

http://www-03.ibm.com/servers/eserver/zseries/zos/support/zos_eos_dates
.html

-jc-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: A Sort/ICETOOL Challenge

2007-01-18 Thread Frank Yaeger
Tom Longfellow [EMAIL PROTECTED] wrote on 01/17/2007 07:40:52 PM:
 Thanks for the answer.  While I still do not understand SPLICE and IFTHEN
 well enough to build one from scratch, I was able to modify your example
to
 handle my VB records  (RECT1 and RECT2 are not the same length).   I have
 compared the results of the existing REXX solution to the results of the
 ICETOOL solution.   The output records are identical and the runtime
reduced
 from 30 minutes to 5 minutes.   A net savings of 146 hours over a year.

 That is why I love sort and all of the cool features like SPLICE.If
only
 I could get past whatever it is that makes it so hard for me to
understand
 the syntax of these newer features.

 ---
 (hopefully, this will go to the mailing list as you suggested)

Tom,

I'm happy to hear that you were able to get what you wanted with reduced
runtime
based on my example.  I'm also glad you like the cool features of DFSORT
and
DFSORT's ICETOOL.

As for understanding the syntax, I'd suggest reading through
z/OS DFSORT:  Getting Started.  It's an excellent tutorial, with lots of
examples, that will show you how to use DFSORT, DFSORT's ICETOOL and
DFSORT Symbols.  You can access it online, along with all of the other
DFSORT books, from:

www.ibm.com/servers/storage/support/software/sort/mvs/srtmpub.html

Frank Yaeger - DFSORT Team (IBM) - [EMAIL PROTECTED]
Specialties: PARSE, JFY, SQZ, ICETOOL, IFTHEN, OVERLAY, Symbols, Migration

 = DFSORT/MVS is on the Web at http://www.ibm.com/storage/dfsort/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Decoding the encryption puzzle

2007-01-18 Thread Hal Merritt
There I was, looking into the teeth of a serious ice storm, any my
company laptop dies. I have a generator and satellite telecom so that
part was covered. But the laptop was a single point of failure between
me working from home or risking life and limb having to go out in the
storm. The prospect of driving over roads covered with ice and idiots
gives me gas. 

The failure was in the encryption software.  
 
The techs tell me the encryption software has been almost trouble free.
Almost. And failures are rare. But they happen. When there is a failure,
they can almost always recover the data. Almost. 
 
I don't have any numbers, but my sense is that only one of a hundred
laptops have suffered data loss. One percent. 

Now, laptops pose an extraordinary level of risk and some hard nosed
encryption is arguably mandatory. That is not the point of this rant. 

Is it possible that mainframe encryption can guarantee perfection? Or
will we see about the same thing: loss of one percent of the most
mission critical data in the shop? Or one in a hundred critical
datasets?   Is the mitigated risk worth the loss?

Gives this old sysprog pause.  
   


NOTICE: This electronic mail message and any files transmitted with it are 
intended exclusively
for the individual or entity to which it is addressed. The message, together 
with any attachment, may contain confidential and/or privileged
information. Any unauthorized review, use, printing, saving, copying, 
disclosure 
or distribution is strictly prohibited. If you have received this message in 
error, please immediately
advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z/OS NFS Clients

2007-01-18 Thread Paul Gilmartin
In a recent note, Alan Brown said:

 Date: Thu, 18 Jan 2007 11:39:53 -0500
 
 I searched through the archives and could not find a good answer to this
 question.
 
MVS-OE might be a better list.

 We have a need for z/OS programs (batch jobs) to access flat files that are
 on some distributed Unix boxes.
 
 1. Can we use NFS for this (i.e., setup the files on Unix as NFS mount
 points)?
 
Yes.  And the mount map can be configured for ASCII -- EBCDIC
And the files can be allocated with DD statements and processed
by Classic programs.

 2. If yes, can someone point me to some documentation examples for using
 z/OS as an NFS client (all of the IBM examples I found are for accessing NFS
 mounts on the mainframe, not the other way around)?
 
   Linkname: 3.2 z/OS V1R7.0 Network File System Guide and Reference
URL: 
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/CPN1CO31/3.2

   Linkname: 3.2.1 Starting the z/OS NFS client
URL: 
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/CPN1CO31/3.2.1

   Linkname: SHCMDDES.AUTOMOUNT.5 z/OS V1R7.0 UNIX System Services
  Command Reference
URL: 
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/BPXZA560/SHCMDDES.AUTOMOUNT.5

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z/OS NFS Clients

2007-01-18 Thread Alan Brown
Thanks Paul. 


Alan Brown
Princeton Softech
(609) 627-5598

-Original Message-
From: Paul Gilmartin [mailto:[EMAIL PROTECTED] 
Sent: Thursday, January 18, 2007 1:04 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: z/OS NFS Clients

In a recent note, Alan Brown said:

 Date: Thu, 18 Jan 2007 11:39:53 -0500
 
 I searched through the archives and could not find a good answer to this
 question.
 
MVS-OE might be a better list.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Removing unused 3286 from IODF

2007-01-18 Thread R.S.

Dave Kopischke wrote:
[...]

I think you'll still want a POR though. I don't know of any other way to

remove those definitions from HSA without a POR. The room those
definitions 
take up in HSA might not be an issue, but if you're deleting a bunch of 
devices, it might help you later if you find you need to add a bunch of 
devices.

No longer true. Not under z/990 and other XMP machines.
That's good. What's bad it is size of HSA on such machines.

--
Radoslaw Skorupka
Lodz, Poland

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: A Sort/ICETOOL Challenge

2007-01-18 Thread Tim Hare
I could get past whatever it is that makes it so hard for me to
understand the syntax of these newer features.

There's an interesting project for someone:  a lanuage preprocessor for 
SORT which accepts a different syntax, and produces SORT control 
statements; or a wrapper which does the same thing. Maybe a sort 
wizard also, to help someone build the sort they need? 

I don't personally have a problem with the syntax, but I know a lot of 
people seem to. I think, also, that we're seeing more zNextGen types who 
don't usually code control statements for a sort, they (I guess) set up a 
sort via drop-down menus and the like - which makes the learning curve of 
sort syntax (any mainframe sort tool, not just IBM's)  a pretty big hurdle 
to jump.

Unfortunately I don't think non-functional improvement to mainframe sorts 
(i.e. allowing a different syntax without adding new capabilities) is 
going to get a lot of new customers, so I don't know if an economic case 
can be made for building a new language for it.

Tim Hare
Senior Systems Programmer
Florida Department of Transportation
(850) 414-4209

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allocation puzzlement.

2007-01-18 Thread Steve O'Connell
When you say fully customized when referring to the 1.4 systems, do you 
perhaps imply that there is a difference in SMS implementation between the 
1.4 and 1.7 systems?

We have one volume mounted as storage in VATLSTxx but TSO allocations do 
not go there as they are redirected elsewhere by SMS. The only datasets 
that end up there are non-specific allocations that don't have SMS 
rules/filters set up.

Is SMS configured the same on all systems?

Another thought, are all systems using the same RACF (or equivalent) TSO 
segments and is the UNIT valid across all systems?

Steve O.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SYSPLEX for PDS-E Sharing

2007-01-18 Thread Craddock, Chris
 
 We started down the SYSPLEX road, but never could get hardware
 resources, then dropped from 6 to 3 LPAR's after Y2K.
 
 Setting up a ESCON CTC isn't all that difficult and won't cost you
 anything except a pair of ESCON channels. With that, you can set up a
 3-LPAR SYSPLEX with GRS capabilities and go forward from there.  Helps
 immensely if you diagram it out before you start to define the IOCDS
 entries.

Don't forget that (AFAIK) all currently supported processors support
some form of xMIF, meaning that you don't really need actual physical
CTCs for connections within the same
CEC/Box/your_favorite_name_for_a_box so if you're just connecting
LPARS in the same machine you can do it trivially.

soapbox

Here we are in 2007. It is simply staggering to me that people are still
whining about perceived problems and costs associated with sysplex.
Those old chestnuts are bogus. There is NO GOOD REASON to run monoplexes
in preference to at least a basic sysplex. And if you really do need to
run multiple LPARS for your work, then you need to do some soul
searching about parallel sysplex. The benefits are enormous and the
costs really aren't.

/soapbox

PDSE sharing requires all of the sharing members to be in the SAME
sysplex. Period. PDSE (and a number of other components) share control
information over XCF, which by definition restricts their sharing scope
to members within the boundaries of the same sysplex. 

So even though you can share physical DASD resources across sysplex
boundaries with a GRS ring or with MIM, you cannot share those (logical)
datasets, no matter how you think it ought to work.

CC

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Decoding the encryption puzzle

2007-01-18 Thread Thomas Kern
I cannot say that mainframe encryption software is NEVER wrong, but I can
say that I have been using various mainframe encryption processes for 30
years (and a few days) and I have 'lost' data 5 times. I could not remember
the encryption key those 5 times. I still have those files and once in a
while try to decrypt them again when I get some glimmer of what the key
might have been. I had to recreate the data for those 5 files so no data was
irrevocably lost. 

The single point of weakness in my working from home is the
2-Factor-Authentication token I am required to use. If I were to leave that
in the office or lose it in the supermarket (buying bread, milk, toiletpaper
before the blizzard strikes), I would not be able to make the required VPN
connection. Driving on icy roads full of idiots is not one of the sacrifices
I will make for the greater glory of ...
 
/Tom Kern

On Thu, 18 Jan 2007 11:49:07 -0600, Hal Merritt [EMAIL PROTECTED] wrote:
There I was, looking into the teeth of a serious ice storm, any my
company laptop dies. I have a generator and satellite telecom so that
part was covered. But the laptop was a single point of failure between
me working from home or risking life and limb having to go out in the
storm. The prospect of driving over roads covered with ice and idiots
gives me gas. 

The failure was in the encryption software.  
 
The techs tell me the encryption software has been almost trouble free.
Almost. And failures are rare. But they happen. When there is a failure,
they can almost always recover the data. Almost. 
 
I don't have any numbers, but my sense is that only one of a hundred
laptops have suffered data loss. One percent. 

Now, laptops pose an extraordinary level of risk and some hard nosed
encryption is arguably mandatory. That is not the point of this rant. 

Is it possible that mainframe encryption can guarantee perfection? Or
will we see about the same thing: loss of one percent of the most
mission critical data in the shop? Or one in a hundred critical
datasets?   Is the mitigated risk worth the loss?

Gives this old sysprog pause.  
   

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SYSPLEX for PDS-E Sharing

2007-01-18 Thread Rugen, Len
This is about the 4th time I've installed the LAST OS upgrade we will
ever need on the mainframe.  Each one has been the max allowed upgrade
just weeks prior to EOS of the current one. Many of us live under
political rules, not technical ones.  

The alternative is to go over to the dark side..


 soapbox
 
 Here we are in 2007. It is simply staggering to me that people are
still
 whining about perceived problems and costs associated with sysplex.
 Those old chestnuts are bogus. There is NO GOOD REASON to run
monoplexes
 in preference to at least a basic sysplex. And if you really do need
to
 run multiple LPARS for your work, then you need to do some soul
 searching about parallel sysplex. The benefits are enormous and the
 costs really aren't.
 
 /soapbox
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SYSPLEX for PDS-E Sharing

2007-01-18 Thread Tom Marchant
On Thu, 18 Jan 2007 12:48:28 -0600, Rugen, Len wrote:

This is about the 4th time I've installed the LAST OS upgrade we will
ever need on the mainframe.  Each one has been the max allowed upgrade
just weeks prior to EOS of the current one. Many of us live under
political rules, not technical ones.


If you can't get your management to let you implement even a basic
Sysplex, then any attempt to share PDSEs will be at your own peril.



 soapbox

 ... There is NO GOOD REASON to run
 monoplexes
 in preference to at least a basic sysplex.

 /soapbox

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allocation puzzlement.

2007-01-18 Thread Hal Merritt
All of the driver systems have SMS active. SMS is inactive on the two
pack systems. 

The failing two pack system was created using a copy of a RACF database
from the driver system. 

The UNIT seems to be valid. But I may not have looked everywhere I need
to look. The two volumes do not show up on the candidate volume list.
What besides the VAT would do such a thing? 

Mark's recipe job was built for z/os 1.6. Is there some difference in
allocation between 1.6 and 1.7 that could explain this? 

Thanks all!!  


-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Steve O'Connell
Sent: Thursday, January 18, 2007 12:25 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Allocation puzzlement.

When you say fully customized when referring to the 1.4 systems, do
you 
perhaps imply that there is a difference in SMS implementation between
the 
1.4 and 1.7 systems?

We have one volume mounted as storage in VATLSTxx but TSO allocations do

not go there as they are redirected elsewhere by SMS. The only datasets 
that end up there are non-specific allocations that don't have SMS 
rules/filters set up.

Is SMS configured the same on all systems?

Another thought, are all systems using the same RACF (or equivalent) TSO

segments and is the UNIT valid across all systems?

Steve O.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
NOTICE: This electronic mail message and any files transmitted with it are 
intended exclusively
for the individual or entity to which it is addressed. The message, together 
with any attachment, may contain confidential and/or privileged
information. Any unauthorized review, use, printing, saving, copying, 
disclosure 
or distribution is strictly prohibited. If you have received this message in 
error, please immediately
advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Decoding the encryption puzzle

2007-01-18 Thread Jeffrey D. Smith
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
 Behalf Of Hal Merritt
 Sent: Thursday, January 18, 2007 10:49 AM
 To: IBM-MAIN@BAMA.UA.EDU
 Subject: Decoding the encryption puzzle
 
 There I was, looking into the teeth of a serious ice storm, any my
 company laptop dies. I have a generator and satellite telecom so that
 part was covered. But the laptop was a single point of failure between
 me working from home or risking life and limb having to go out in the
 storm. The prospect of driving over roads covered with ice and idiots
 gives me gas.
 
 The failure was in the encryption software.
 
 The techs tell me the encryption software has been almost trouble free.
 Almost. And failures are rare. But they happen. When there is a failure,
 they can almost always recover the data. Almost.
 
 I don't have any numbers, but my sense is that only one of a hundred
 laptops have suffered data loss. One percent.
 
 Now, laptops pose an extraordinary level of risk and some hard nosed
 encryption is arguably mandatory. That is not the point of this rant.
 
 Is it possible that mainframe encryption can guarantee perfection? Or
 will we see about the same thing: loss of one percent of the most
 mission critical data in the shop? Or one in a hundred critical
 datasets?   Is the mitigated risk worth the loss?
 
 Gives this old sysprog pause.
/snip/
Encryption software failing is somewhat vague. Did the software
generate incorrect cipher text? Did the software incorrectly
decipher the data using the correct key? Was the key lost or stolen
or exposed or improperly expired?

Symmetric (secret) key encryption, like DES or AES, is very reliable
with respect to correct encipher/decipher operation. The main issue
is key management: How to generate strong keys, securely store those
keys, and associating the keys with the protected data? It all boils down
to having a clear master key somewhere that unlocks all of the other
keys. Even the IBM hardware encryption with tamper-resistant master key
protection needs to be reset sometimes. That means the master key (or
the pass phase used to generate a master key) must be written down somewhere
(and physically protected) so that the security administrator can re-enter
it into the hardware. Without the central master key, all other keys are
inaccessible (not decipherable) and thus the encrypted data is unavailable.

Asymmetric (public/private) key encryption is only viable for exchanging
encrypted symmetric keys, because the algorithm is computationally
intensive and far too expensive for high volume encryption traffic.

Physical deterioration of encryption silicon may occur over time, just
like deterioration and failure of main memory or logic circuits or hard
drives. That's why encryption devices self-test with known answers and
internally check their results.

I've heard that some hardware encryption devices may perform the
encryption 3 times per block of data and compare the results for a
perfect match. The process is repeated until a perfect match of
the 3 results or until a time-out occurs (machine check interrupt).

A properly designed encryption device will detect bad results and
not expose incorrect results outside of its secure boundary. I don't
worry about the bitwise accuracy of encrypt/decrypt results. I worry
about key management, because it's the central point of failure. If
your keystore is on a harddrive that fails, then all data encrypted
by those lost keys is inaccessible.


Jeffrey D. Smith
Principal Product Architect
Farsight Systems Corporation
700 KEN PRATT BLVD. #204-159
LONGMONT, CO 80501-6452
303-774-9381 direct
303-484-6170 FAX
http://www.farsight-systems.com/
see my résumé at my website

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: What is command reject trying to tell me?

2007-01-18 Thread Patrick O'Keefe
On Wed, 17 Jan 2007 15:45:20 -0600, Patrick O'Keefe 
[EMAIL PROTECTED] wrote:

Chris,
An offline response becuase I doubt many IBM-Mainers care about NetView,
but ...
...

Well, so much for my attempt at an offline response.  :-(

Pat O'Keefe

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: z/OS NFS Clients

2007-01-18 Thread Schramm, Rob
1. Yes.

2. Z/OS as the client was kinda thin on documentation.  There is some in


Network File System Customization and Operation

Redbook Data Sharing: Using the OS/390 Network File System

Network File System User Guide

Network File System Customization and Operation

 
-Rob Schramm

snippage


This e-mail transmission contains information that is confidential and may be 
privileged.   It is intended only for the addressee(s) named above. If you 
receive this e-mail in error, please do not read, copy or disseminate it in any 
manner. If you are not the intended recipient, any disclosure, copying, 
distribution or use of the contents of this information is prohibited. Please 
reply to the message immediately by informing the sender that the message was 
misdirected. After replying, please erase it from your computer system. Your 
assistance in correcting this error is appreciated.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: HSM/RMM tape reuse

2007-01-18 Thread Schwarz, Barry A
The 365I message tells you that the amount of valid data on the tape is
below the threshold you specified (because data has expired and/or
manually marked for deletion).  HSM is recommending you issue the
RECYCLE command for that tape which will copy the (small amount of)
remaining data onto a new volume and free the volume for reuse.

The 261I message tells you that the tape has been successfully recycled
or deleted and ready for reuse after you reinitialize the tape label.

Neither message has anything to do with RMM.

Whether you actually reinitialize the tape is a function of your
procedures for returning tapes to the scratch and how you communicate to
RMM and flex that the volume is free.

-Original Message-
From: Ron MacRae [mailto:snip] 
Sent: Thursday, January 18, 2007 1:36 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: HSM/RMM tape reuse

LadiesGentlemen,
 I'm sure this is an easy question for anyone who
understands HSM  RMM, unfortunatly I'm not one of them.

We've been running HSM/RMM without problems for several years. Recently,
not sure exactly when, HSM started spitting out the following msgs when
it freed up a tape. 

ARC0365I BACKUP VOLUME FT1718 NOW AVAILABLE FOR RECYCLE ARC0261I TAPE
VOLUME FT1718 NEEDS TO BE REINITIALIZED 

We have now run out of tapes. 
(Actualy faketapes on a flex machine, but I don't think that is
relevent.)

We don't understand why this has started to happen. Our HSM parms were
last changed in 2003. Several people have been playing with RMM so we
suspect it's something in RMM.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Decoding the encryption puzzle

2007-01-18 Thread David Andrews
On Thu, 2007-01-18 at 11:49 -0600, Hal Merritt wrote:
 The failure was in the encryption software.

Perhaps the failure was bit rot in that cheap notebook hard drive?

Most desktop systems don't do much in the way of file integrity, so when
decryption fails on a corrupt file it fails spectacularly.

-- 
David Andrews
A. Duda and Sons, Inc.
[EMAIL PROTECTED]

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


CA-1 reblocking gotchas?

2007-01-18 Thread Tim Hare
I am thinking about finally blocking my CA-1 TMC. We're not a huge shop, 
tape-wise, compared to many and so the block size of our TMC isn't really 
killing us but it would be nicer if certain queries or reports ran faster.

I'm thinking that someone on IBM-MAIN must have done this already - 
anything major to look out for? Our CA-1 is at R11.5 .

 
Tim Hare
Senior Systems Programmer
Florida Department of Transportation
(850) 414-4209

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA-1 reblocking gotchas?

2007-01-18 Thread Schwarz, Barry A
I did it on 5.2 and never had a problem.  As usual, make copies before
and after just in case.

-Original Message-
From: Tim Hare [mailto:snip] 
Sent: Thursday, January 18, 2007 12:46 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: CA-1 reblocking gotchas?

I am thinking about finally blocking my CA-1 TMC. We're not a huge shop,
tape-wise, compared to many and so the block size of our TMC isn't
really killing us but it would be nicer if certain queries or reports
ran faster.

I'm thinking that someone on IBM-MAIN must have done this already -
anything major to look out for? Our CA-1 is at R11.5 .

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Command repeat for ISPF 3.4?

2007-01-18 Thread David Long
To execute the same command against all or selected members of a pds, use a 
command like this in the command field:
s mask command

To run command xyz against all members starting with abc:
s abc* xyz

To delete all members of a pds:
s * d

Dave Long

On Wed, 17 Jan 2007 11:34:54 -0500, Larry R. Wright 
[EMAIL PROTECTED] wrote:

Hi All,

I was just paging through a large number of datasets on 3.4 to issue a rexx
command on each file to get a return code.  For this purpose, I issued the
rexx command on the very first dataset and entered an equal sign (=) to
repeat for each of the next hundreds of datasets.

Is there something even better such as a command to repeat the command for
all entries in the 3.4 list?  Enquiring minds would like to know :)

Thanks,

Larry

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe jobs list?

2007-01-18 Thread Rick Fochtman
Hold onto what you've got! I've been out of work for 31 months 
now.. :-(  Finally decided to retire.

--snip---

Jeffrey D. Smith wrote:


Greetings,

What you all recommend for the better jobs lists for mainframe developers?
(Yes, I am looking for employment.)


Jeffrey D. Smith
Principal Product Architect
Farsight Systems Corporation
700 KEN PRATT BLVD. #204-159
LONGMONT, CO 80501-6452
303-774-9381 direct
303-484-6170 FAX
http://www.farsight-systems.com/
see my résumé at my website

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

 



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CA-1 reblocking gotchas?

2007-01-18 Thread Schwarz, Barry A
The blocksize must be a multiple of the LRECL which is 340.

-Original Message-
From: Lizette Koehler [mailto:[EMAIL PROTECTED] 
Sent: Thursday, January 18, 2007 1:59 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: CA-1 reblocking gotchas?

I took our current TMC which as allocated at 900 Cyls using 450Cyls from
unblocked to blocked.  I used the TMSXTEND function  - Very easy to use.

Now my TMC is 189 Cyls (still way to big). The block used was
BLKSIZE=8804 (the recommended size by CA)

The task was very easy if you follow the steps documented.  TMSXTEND is
a different format - but it will allow you to extend the TMC tape range
without a TAPE outage.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DFSort syntax error, What am I missing?

2007-01-18 Thread Arthur T.
On Thu, 18 Jan 2007 15:55:46 -0500, in 
bit.listserv.ibm-main 
(Message-ID:[EMAIL PROTECTED]) 
Neal Eckhardt [EMAIL PROTECTED] wrote:


It must be something stupid, but what is the error here? 
(I'll kick

myself after). The $ appears after the second ')'

Neal

ICE143I 0 BLOCKSET COPY  TECHNIQUE SELECTED
ICE000I 1 - CONTROL STATEMENTS FOR 5740-SM1, DFSOR

 snip

   43,1,CH,EQ,C'9')},FNAMES=OUT2
   $
ICE007A E SYNTAX ERROR


 Note that the symbol above the $ is a right brace [}] 
not a right parenthesis [)].  This can be difficult to see 
depending on your font and the strength of your glasses.


 Note also that only a small subset of the IBMMAIN 
readers will see your post because you posted directly to 
the newsgroup, rather than through the Listserv.  See the 
links at the bottom of this post for info on the Listserv.



--
I cannot receive mail at the address this was sent from.
To reply directly, send to ar23hur at intergate dot com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Decoding the encryption puzzle

2007-01-18 Thread Tom Schmidt
On Thu, 18 Jan 2007 14:53:01 -0600, Hal Merritt wrote:

The encryption software starts before Windows. The software failed with a 
blue screen of death.

My sense is that one or more critical files on the hard drive used by the 
software became corrupt as PC files are known to do. But I don't know.

But my point was the laptop was put out of service for several days. 
Doesn't really matter why. This may be tolerable (or even expected) with a 
PC. But on a mainframe?


You are describing one of the core differences between real mainframes and 
etch-a-sketch computers -- the real McCoy use parity for memory and lots of 
checking in the I/O accesses as well (seen and unseen).  The doorstop 
Wintel computers almost never use memory with parity and offer little or no 
error checking in the I/O path.  To no surprise the doorstop computers 
fail, early  often, while the mainframes lumber on.  

To be slightly more fair, the PCs are rarely kept in controlled 
environments and can be subject to all kinds of radio and other EM 
interference... not _always_ at a high enough signal strength to corrupt a 
bit or two but a few overweight alpha particles can do wonderous things.  
And they strike without warning.  


The complete loss of mission critical data even for a few days could be 
catastrophic to the company. One solution is to have backups that aren't 
encrypted. But, then, what would be the point of encryption in the first 
place? As I said, a puzzlement.  


I don't believe you will see the same kinds of issues with mainframe 
encryption and I really would be astonished if the errors were within 3 
orders of magnitude of the PC (or even blade server) world.  Reliability is 
key to the mainframe.  

-- 
Tom Schmidt 
Madison, WI 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Decoding the encryption puzzle

2007-01-18 Thread Dave Kopischke
On Thu, 18 Jan 2007 14:53:01 -0600, Hal Merritt wrote:

The complete loss of mission critical data even for a few days could be 
catastrophic to the company. One solution is to have backups that aren't 
encrypted. But, then, what would be the point of encryption in the first 
place? As I said, a puzzlement.



I wouldn't encrypt data within a datacenter. The only data that gets 
encrypted around here is data that goes out the door. Internal tapes are 
not encrypted. All tapes that go off site are encrypted and all 
tranmissions are encrypted. Some of our E-Mails are even required to be 
encrypted. But within the confines of the controlled environment, 
encryption is not required.

I would expect a performance penalty if everything within the datacenter 
were encypted. Not a blue screen of death, but more probably management 
death threats.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: DFSORT question on max record length in VB file

2007-01-18 Thread Frank Yaeger
Frank Silven wrote:
 I have a need to determine the actual maximum record length used
by a VB file..so when i have a LRECL=522,RECFM=VB then the
physical max record length=518 bytes...

 But I need a solution which determines the actual maximum record length
used in a VB file, so the question is whether DFSORT or ICETOOL can
determine the MAX RDW value over all records ?

Sure.  Here are two ways to do it:

1) DFSORT Job using OUTFIL:

//S1 EXEC PGM=ICEMAN
//SYSOUT DD SYSOUT=*
//SORTIN DD DSN=...  input file (VB)
//SORTOUT DD SYSOUT=*
//SYSIN DD *
  OPTION COPY
  OUTFIL REMOVECC,NODETAIL,
TRAILER1=(MAX=(1,2,BI,TO=ZD))
/*

SORTOUT will have one record with the maximum record length, e.g.

00084

2) ICETOOL job using STATS:

//S2 EXEC PGM=ICETOOL
//TOOLMSG DD SYSOUT=*
//DFSMSG DD SYSOUT=*
//IN DD DSN=...  input file (VB)
//TOOLIN DD *
STATS FROM(IN) ON(VLEN)
/*

TOOLMSG will show the maximum record length in an ICE608I message, e.g.

  STATS FROM(IN) ON(VLEN)
ICE627I 0 DFSORT CALL 0001 FOR COPY FROM IN   TO E35 EXIT COMPLETED
ICE628I 0 RECORD COUNT:  008
ICE607I 0 STATISTICS FOR (VLEN):
ICE608I 0   MINIMUM:  +031, MAXIMUM:  +084
ICE609I 0   AVERAGE:  +039, TOTAL  :  +317
ICE602I 0 OPERATION RETURN CODE:  00

Frank Yaeger - DFSORT Team (IBM) - [EMAIL PROTECTED]
Specialties: PARSE, JFY, SQZ, ICETOOL, IFTHEN, OVERLAY, Symbols, Migration

 = DFSORT/MVS is on the Web at http://www.ibm.com/storage/dfsort/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Decoding the encryption puzzle

2007-01-18 Thread Kirk Talman
Unless the chip is:

1) on a voyage outside our atmosphere

or

2) on a ceramic substrate foolishly made from clay not tested for the 
presence of radioactive impurities, it is highly unlikely an alpha 
particle, regardless of its diet and lack of exercise, will make it to a 
chip.

Those of terrestrial origin, other than in the substrate, will not make it 
through the case.  Cosmic rays alphas will not make it through the 
atmosphere.

On the other hand, the secondary shower of muons can only be shielded by 
copious quantities of hard rock (musicians need not apply).  Reines et al 
did their neutrino work in deep mines just to filter out anything but 
neutrinos.

nit-picking pup starting Friday early

http://en.wikipedia.org/wiki/Cosmic_rays is a place to start

IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU wrote on 01/18/2007 
05:55:21 PM:

 bit or two but a few overweight alpha particles can do wonderous things. 
 
 And they strike without warning.

-
The information contained in this communication (including any
attachments hereto) is confidential and is intended solely for the
personal and confidential use of the individual or entity to whom
it is addressed. The information may also constitute a legally
privileged confidential communication. If the reader of this
message is not the intended recipient or an agent responsible for
delivering it to the intended recipient, you are hereby notified
that you have received this communication in error and that any
review, dissemination, copying, or unauthorized use of this
information, or the taking of any action in reliance on the
contents of this information is strictly prohibited. If you have
received this communication in error, please notify us immediately
by e-mail, and delete the original message. Thank you

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: HSM/RMM tape reuse

2007-01-18 Thread Mike Wood
Ron, Further to Barrys' reply, The messages you list are not caused by 
something that RMM does.  The ARC0261I is issued because the recycled tape 
is expiration date protected.  Dont worry about it, RMMs processing 
automatically handles this when the tape is reused.

Sounds like the problem may be that tapes are just not getting released? 
You listed the release actions and the actions pending but not the volume 
status. If the volume were released and waiting to be scratched I would 
expect the pending action 'scratch=Y'.  HSM calls EDGTVEXT at recycle time 
as long as the HSM SETSYS options are correct.  Does that cause the volume 
to be released?  What is the MRM TVEXTPURGE parmlib option? What is the 
volume expiration date ?  I am sure that if you look at what RMM tells you 
you should see whay the volume is not released.

Mike Wood  RMM Development
On Thu, 18 Jan 2007 03:35:37 -0600, Ron MacRae [EMAIL PROTECTED] 
wrote:

LadiesGentlemen,
 I'm sure this is an easy question for anyone who
understands HSM  RMM, unfortunatly I'm not one of them.

We've been running HSM/RMM without problems for several years. Recently,
not sure exactly when, HSM started spitting out the following msgs when it
freed up a tape.

ARC0365I BACKUP VOLUME FT1718 NOW AVAILABLE FOR RECYCLE
ARC0261I TAPE VOLUME FT1718 NEEDS TO BE REINITIALIZED

We have now run out of tapes.
(Actualy faketapes on a flex machine, but I don't think that is relevent.)

We don't understand why this has started to happen. Our HSM parms were 
last
changed in 2003. Several people have been playing with RMM so we suspect
it's something in RMM.

If I list the tape in RMM the actions on release are -
Action on release:
Scratch immediate  = N  Expiry date ignore = N
Scratch = Y  Replace = N  Return = N  Init = N  Erase = N  Notify = N
Actions pending:
Scratch = N  Replace = N  Return = N  Init = N  Erase = N  Notify = N

We could switch on INIT but we don't want the tapes reinitialised, we just
want to re-use them.

What changes, presumably in RMM, can have caused the ARC0261I msgs to 
start?

Thanks in advance,

Ron MacRae

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: A Sort/ICETOOL Challenge

2007-01-18 Thread Clark Morris
On 18 Jan 2007 10:20:13 -0800, in bit.listserv.ibm-main you wrote:

I could get past whatever it is that makes it so hard for me to
understand the syntax of these newer features.

There's an interesting project for someone:  a lanuage preprocessor for 
SORT which accepts a different syntax, and produces SORT control 
statements; or a wrapper which does the same thing. Maybe a sort 
wizard also, to help someone build the sort they need? 

I don't personally have a problem with the syntax, but I know a lot of 
people seem to. I think, also, that we're seeing more zNextGen types who 
don't usually code control statements for a sort, they (I guess) set up a 
sort via drop-down menus and the like - which makes the learning curve of 
sort syntax (any mainframe sort tool, not just IBM's)  a pretty big hurdle 
to jump.

Unfortunately I don't think non-functional improvement to mainframe sorts 
(i.e. allowing a different syntax without adding new capabilities) is 
going to get a lot of new customers, so I don't know if an economic case 
can be made for building a new language for it.

Take a look at SYNCSORT for HP-UX (and probably other UNIX
environments).  In terms of syntax and capability it has the mainframe
sorts beat by a mile.  If I read the manual correctly, I could have
used a COBOL copybook as one of the input control streams so that I
could have just sorted on field name without even having to write
separate descriptors.  

Tim Hare
Senior Systems Programmer
Florida Department of Transportation
(850) 414-4209

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Decoding the encryption puzzle

2007-01-18 Thread Thomas Kern
The encryption of data on a backup tape does not need to be done ALL the time.
If one level of backup are in your automated tape library, in a data center
with card-key access in a building with armed guards on all entrances who
inspect packages coming in AND going out, then I don't think you need to
encrypt that data. Just use it for a FAST recovery. 

But if a copy of those backups have to go offsite, even to your company's other
data center, ENCRYPT the data. When the shipping company loses the one tape
that has the CEO's social security number or salary on it, you will be less
worried if you know it was encrypted. Less antacid to chew.

/Tom Kern
 
--- Hal Merritt [EMAIL PROTECTED] wrote:
 The encryption software starts before Windows. The software failed with a
 blue screen of death. 
 
 My sense is that one or more critical files on the hard drive used by the
 software became corrupt as PC files are known to do. But I don't know.
 
 But my point was the laptop was put out of service for several days. Doesn't
 really matter why. This may be tolerable (or even expected) with a PC. But on
 a mainframe?  
 
 The complete loss of mission critical data even for a few days could be
 catastrophic to the company. One solution is to have backups that aren't
 encrypted. But, then, what would be the point of encryption in the first
 place? As I said, a puzzlement.   



 

We won't tell. Get more on shows you hate to love 
(and love to hate): Yahoo! TV's Guilty Pleasures list.
http://tv.yahoo.com/collections/265 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: A Sort/ICETOOL Challenge

2007-01-18 Thread Tom Longfellow
On 18 Jan 2007, you wrote in bit.listserv.ibm-main:

I could get past whatever it is that makes it so hard for me to
understand the syntax of these newer features.
 

 
 I don't personally have a problem with the syntax, but I know a lot of
 people seem to. I think, also, that we're seeing more zNextGen types
 who don't usually code control statements for a sort, they (I guess)
 set up a sort via drop-down menus and the like - which makes the
 learning curve of sort syntax (any mainframe sort tool, not just
 IBM's)  a pretty big hurdle to jump.

I am feeling the need to defend myself.  I am a 25 year veteran of 
mainframe environments.  They would not dare issue me a zNextGen 
membership card.   I can code standard sorts like there is no tomorrow.  
I loathe the current trend in software development that your product is 
just not cool without a graphical drag-drop front end.   But, given the 
fact that the there is a 'tricks' sheet on the website, you have to 
assume that maybe some of these new sort verbs are not intuitively 
obvious.  

Quick now, without a manual, and without being Frank Yaeger.  Tell me 
exactly what this snippet of code is doing.  you have 3 seconds.  (And by 
the way, you are currently supporting  z/OS, DB2, IMS, VTAM, TCPIP, and 
everthing else on, near or connected to, the mainframe... not just sorts)
OVERLAY=(49:SEQNUM,8,ZD,
 41:41,8,ZD,SUB,49,8,ZD,M11,LENGTH=8))

[[[ the above is purely in jest.   If you do not see the humor in it, I 
apologize ]]]

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Decoding the encryption puzzle

2007-01-18 Thread Anne Lynn Wheeler

Hal Merritt wrote:
The encryption software starts before Windows. The software failed with a blue screen of death. 

My sense is that one or more critical files on the hard drive used by the software became corrupt as PC files are known to do. But I don't know.

But my point was the laptop was put out of service for several days. Doesn't really matter why. This may be tolerable (or even expected) with a PC. But on a mainframe?  

The complete loss of mission critical data even for a few days could be catastrophic to the company. One solution is to have backups that aren't encrypted. But, then, what would be the point of encryption in the first place? As I said, a puzzlement.   


for a little drift ... another crypto related thread  (FDE ... full disk 
encryption)
http://www.garlic.com/~lynn/aadsm26.htm#23 It's a Presidential Mandate, Feds 
use it. How come you are not using FDE?

one of the things that was driving key escrow ... was that if the data (at rest) was always 
encrypted ... then the backups would also be encrypted. key escrow  was required to satisfy 
no single point of failure scenario (loosing the key) and disaster recovery.

There is a separate issue if a vulnerable laptop containing the only copy of 
business/mission critical data ... this is again normally dealt with as a disaster 
recovery and no single point of failure scenario (regardless of what kind of 
availability standard any piece of equipment might meet).

For a totally different rant ... there is a big effort to solve some 
vulnerability problems using encryption ... which I claim would be better 
addressed by eliminating risk associated with some forms of data ... and 
eliminating requirement for other kinds of data altogether. recent long-winded 
posts on the subject
http://www.garlic.com/~lynn/2006b.html#60 Securing financial transactions a 
high priority for 2007
http://www.garlic.com/~lynn/2006b.html#61 Securing financial transactions a 
high priority for 2007
http://www.garlic.com/~lynn/2006b.html#62 Securing financial transactions a 
high priority for 2007
http://www.garlic.com/~lynn/2006b.html#64 Securing financial transactions a 
high priority for 2007

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Decoding the encryption puzzle

2007-01-18 Thread Jeffrey Deaver
I wouldn't encrypt data within a datacenter. The only data that gets
encrypted around here is data that goes out the door. Internal tapes are
not encrypted.

If one level of backup are in your automated tape library, in a data
center
with card-key access in a building with armed guards on all entrances who
inspect packages coming in AND going out, then I don't think you need to
encrypt that data.

Its too easy for one of those 'secure' tapes to walk out the door with a
disgruntled employee.  And when the audit turns up a tape missing - its not
going to care how or where it went - only that its missing and not
encrypted.  More than once I've read notices from companies announcing
breaches where they state that they are '99% sure its in a landfill,
but...'.  And while that may be true and the data is more than likely safe,
the damage to the reputation is already done, and the cost to notify is
real.

For my money, if it can be carried out, its going to be encrypted.


Jeffrey Deaver, Engineer
Systems Engineering
[EMAIL PROTECTED]
651-665-4231(v)
651-610-7670(p)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Decoding the encryption puzzle

2007-01-18 Thread Thomas Kern
If one of your tapes walks out the door with a disgruntled employee, then you
have the wrong guards on the door. They are not just supposed to be there for
decoration. No one person or organization can be responsible for the security
of EVERYTHING. So make sure your guards do their job and you handle encrypting
the external tapes. One system's programmer cannot do it all, nor can they
convince management to buy it all to do it all.

/Tom Kern

--- Jeffrey Deaver [EMAIL PROTECTED] wrote:
 Its too easy for one of those 'secure' tapes to walk out the door with a
 disgruntled employee.  And when the audit turns up a tape missing - its not
 going to care how or where it went - only that its missing and not
 encrypted.  More than once I've read notices from companies announcing
 breaches where they state that they are '99% sure its in a landfill,
 but...'.  And while that may be true and the data is more than likely safe,
 the damage to the reputation is already done, and the cost to notify is
 real.
 
 For my money, if it can be carried out, its going to be encrypted.
 



 

Looking for earth-friendly autos? 
Browse Top Cars by Green Rating at Yahoo! Autos' Green Center.
http://autos.yahoo.com/green_center/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: How to schedule Jes2 Cancel a job command

2007-01-18 Thread John S. Giltner, Jr.

ravi wrote:

Hello
 
I have a strange requirement. In my shop we have cancel a job manually 
every Friday at 9pm. Is there way to schedule  jes2 commands like 
$C'jobname'

and schedule it only every Friday 9pm.
 
Or is there any way to write rexx thru batch job and submit 
jes2commands. Please advice me
 
Thanks
 
Sankar Ravi

[EMAIL PROTECTED] mailto:[EMAIL PROTECTED]


Do you have automation package or a scheduling package?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Decoding the encryption puzzle

2007-01-18 Thread Jeffrey Deaver
If one of your tapes walks out the door with a disgruntled employee, then
you
have the wrong guards on the door. They are not just supposed to be there
for
decoration. No one person or organization can be responsible for the
security
of EVERYTHING. So make sure your guards do their job and you handle
encrypting
the external tapes. One system's programmer cannot do it all, nor can they
convince management to buy it all to do it all.

I can not imagine working in an environment where my (and the other 3000
employees') bags are searched as we go in and out of the office.  It would
take hundreds of guards and would have to involve some form of strip
searching.  I'm sure this happens in certain forums  - I just can't imagine
it when there is an alternative to prevent the need in the first place.

Another example to argue for all tapes encrypted
What happens to tapes when they break in your shop?  In a perfect world the
process should perhaps be ...
1) Change logged in change management system to note what is about to
happen.
2) logically remove tape from tape management system
3) Degauss tape with coworker watching
4) Toss tape in locked bin headed for the crusher with coworker watching
5) Record completed event in change management system with names of
employees that confirmed activity.

HOWEVER... what happens if Mr. new operator simply tosses it in the trash.
A few months later the audit turns up a missing tape.  You can't find it,
and there is no trail to tell you where it went.  It is lost and under the
breach notification laws as I understand them, that is a notifiable event -
even though your employee tells you they threw it in the trash.   Thus the
notices that say we're 99% sure its in a landfill.

Right or wrong, given our society, I firmly believe that all data will be
encrypted everywhere all the time at some point in the not too distant
future.
But for now, if the media moves, encrypt it.

Jeffrey Deaver, Engineer
Systems Engineering
[EMAIL PROTECTED]
651-665-4231(v)
651-610-7670(p)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Command repeat for ISPF 3.4?

2007-01-18 Thread Bruce Hewson
Hello David,

Right answer to the wrong question.

For an ISPF 3.4 dataset list, when I have to process the same command 
against a list I prefer to do it in batch.

1.  Use the P primary command to print the required dataset list to an 
ISPF LIST dataset.
2.  Use the LIST primary command to display a choice list, select 3 to 
keep the dataset. Remember/cut the list dataset name.
3.  Edit the list dataset so generated, and turn it into a batch TSO job 
with the usefule ISPF EDIT functions.
4.  Submit your useful HACK job.


On Thu, 18 Jan 2007 15:28:57 -0600, David Long [EMAIL PROTECTED] wrote:

To execute the same command against all or selected members of a pds, use a
command like this in the command field:
s mask command

To run command xyz against all members starting with abc:
s abc* xyz

To delete all members of a pds:
s * d

Dave Long

On Wed, 17 Jan 2007 11:34:54 -0500, Larry R. Wright
[EMAIL PROTECTED] wrote:

Hi All,

snip
Is there something even better such as a command to repeat the command for
all entries in the 3.4 list?  Enquiring minds would like to know :)

Thanks,

Larry



Regards
Bruce Hewson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe vs. Server (Was Just another example of mainframe costs.)

2007-01-18 Thread Timothy Sipples
Timothy Sipples writes:
...  Most X86-based
Linux distributions include closed source device drivers.

Then Tom Marchant writes:
Really?  Sounds like FUD to me.  My experience with Linux is
limited, but I've beeen running Fedora Core for about a year and
I know that it's distribution is entirely open source.  I'm pretty
sure Red Hat is also, as well as Debian, Ubuntu, Slackware,
Knoppix, Gentoo and others.  Which distributions do you know that
Include closed source drivers?

It depends on the distribution of course, but the following popular Linux
drivers are closed source:

NVIDIA (video)
ATI (video)
LSI Logic (storage)
some software-based modems (e.g. Lucent)
some ISDN drivers

There are others as well.  Some distributions (e.g. Debian, Ubuntu) don't
include these drivers at all, and you have to go fetch them on your own if
you want/need them.  Others include them as standard Web deliverables, and
still others (e.g. Linspire) include them in their distributions.  For
NVIDIA and ATI there are open source alternatives, although functionality
may be more limited with the alternatives.

Now, whether this matters to you or not is another question.  Still, I
think it's a small but interesting detail that there are no closed source
Linux drivers for System z, so far as I'm aware.  It's all open source now.

- - - - -
Timothy Sipples
IBM Consulting Enterprise Software Architect
Specializing in Software Architectures Related to System z
Based in Tokyo, Serving IBM Japan and IBM Asia-Pacific
E-Mail: [EMAIL PROTECTED]
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Allocation puzzlement.

2007-01-18 Thread Bruce Hewson
One thought,

Is the volume which you have mounted PUBLIC full?

Regards
Bruce Hewson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: How to schedule Jes2 Cancel a job command

2007-01-18 Thread Robert A. Rosenberg
At 22:47 -0500 on 01/18/2007, John S. Giltner, Jr. wrote about Re: 
How to schedule  Jes2  Cancel a job  command:



ravi wrote:

Hello
 I have a strange requirement. In my shop we have cancel a job 
manually every Friday at 9pm. Is there way to schedule  jes2 
commands like $C'jobname'

and schedule it only every Friday 9pm.
 Or is there any way to write rexx thru batch job and submit 
jes2commands. Please advice me

 Thanks
 Sankar Ravi
[EMAIL PROTECTED] mailto:[EMAIL PROTECTED]


Do you have automation package or a scheduling package?


Do 2 things.

 1) Place a $VS,''S CANF9PM' command into the JES2 start up Parms.

 2) Write a CANF9PM program and make a STC Proc to execute it. Have 
the job issue $TA,F9PM,T=.yy,'$C''Jobname''' and 
$TA,I9PM,I=86400,'$VS,''S CANF9PM''' commands. CANF9PM computes the 
.yy based on the current time and day. The .yy is the number 
of hours and minutes since the prior midnight when Friday at 9PM will 
be. The $YA,I9PM will issue and/or refresh the $TA,F9PM once a day 
(and will be reset if JES2 is restarted [I do not think that $TA 
commands survive a restart]).


The $TA,,T= command runs once at the T= designated time. The 
issuance of a $TA, will reset/overlay a prior copy. Once it runs, 
the $TA,I9PM will recreate it (a I= is useless on the $TA,F9PM since 
the I= is only good to hold 24 Hours worth of seconds).


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: How to schedule Jes2 Cancel a job command

2007-01-18 Thread Bob Shannon
We use Dave Cole's SCHEDRUN freeware. It works well for simple
scheduling tasks. It's available for download at www.colesoft.com.

Bob Shannon
Rocket Software

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Decoding the encryption puzzle

2007-01-18 Thread Gerhard Postpischil

Kirk Talman wrote:
2) on a ceramic substrate foolishly made from clay not tested for the 
presence of radioactive impurities, it is highly unlikely an alpha 
particle, regardless of its diet and lack of exercise, will make it to a 
chip.


I seem to remember an article by IBM staffers in Scientific 
American or Science some decades ago. They concluded that alpha 
particle hits on memory were possible. I don't recall the 
precise figures, but seem to recall it was around one hit per 
megabyte per 10**4 or 10**5 hours. For memory with any means of 
error correction this is negligible.



Gerhard Postpischil
Bradford, VT

new e-mail address: gerhardp (at) charter (dot) net

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html