Re: CPACF Metrics?
Jeffrey Deaver wrote: I've been told that IBM publishes some numbers that show CPACF overhead metrics somewhere? Anyone know where? I'm basically interested in confirming something a vendor told me about an encryption product - so many MBs encrypted for so many CPU seconds. I downloaded the following document: IBM eServer zSeries 990 Performance of Cryptographic Operations (Cryptographic Hardware: CPACF, PCICA, PCIXCC, CEX2C) I can't remeber URL (for sure it was IBM site), however I can sent it to you if you want. -- Radoslaw Skorupka Lodz, Poland -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe vs. Server (Was Just another example of mainframe costs.)
Timothy Sipples wrote: John Chase writes: Indeed. Windows is about as open as the former Soviet Union. Amen. Re: Anyone can build a hardware box to run Windows, well, yes, but you must go to Intel or AMD for the chip. So you have a duopoly -- AMD argues a monopoly -- on the component that matters. Currently almost every piece of hardware has drivers, and the drivers are certified by M$. Now it's optional, although customer get serious warning. Maybe in next version the functionality of unsupported hardware will be reduced, and finally it won't work at all. That's monopoly. You don't have to produce the hardware, it is enough when you govern it. For fee. -- Radoslaw Skorupka Lodz, Poland -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
HSM/RMM tape reuse
LadiesGentlemen, I'm sure this is an easy question for anyone who understands HSM RMM, unfortunatly I'm not one of them. We've been running HSM/RMM without problems for several years. Recently, not sure exactly when, HSM started spitting out the following msgs when it freed up a tape. ARC0365I BACKUP VOLUME FT1718 NOW AVAILABLE FOR RECYCLE ARC0261I TAPE VOLUME FT1718 NEEDS TO BE REINITIALIZED We have now run out of tapes. (Actualy faketapes on a flex machine, but I don't think that is relevent.) We don't understand why this has started to happen. Our HSM parms were last changed in 2003. Several people have been playing with RMM so we suspect it's something in RMM. If I list the tape in RMM the actions on release are - Action on release: Scratch immediate = N Expiry date ignore = N Scratch = Y Replace = N Return = N Init = N Erase = N Notify = N Actions pending: Scratch = N Replace = N Return = N Init = N Erase = N Notify = N We could switch on INIT but we don't want the tapes reinitialised, we just want to re-use them. What changes, presumably in RMM, can have caused the ARC0261I msgs to start? Thanks in advance, Ron MacRae -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe vs. Server (Was Just another example of mainframe costs.)
On Thu, 2007-01-18 at 15:26 +0900, Timothy Sipples wrote: Most X86-based Linux distributions include closed source device drivers. Do they just ???. That makes them tainted, and hence unable to report kernel oops'es to the kernel developers. Does this mythical Most X86-based Linux distributions have any relation to the count of installed systems ???. I'd be contending not based on my experience. Shane ... -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe vs. Server (Was Just another example of mainframe costs.)
I agree that the term open system has been flagrantly misused, primarily to promote Unix systems at the expense of proprietary systems like z/os and Windows. I think the idea that Windows is open was put forward by Microsoft precisely to counter this pro-Unix marketing ploy. And IBM's response of course was MVS Open Edition, and later Linux. One company I know used to define open systems in terms of the interoperability of programs, data, and people. Most Unix programs can be ported to other Unix flavours; in Unix a file is a file is a file; and if you are comfortable using one flavour of Unix you'll usually convert to a different flavour pretty quickly. But you can't move to someone else's Windows or z/OS, or rebuild Windows or z/OS for a different platform. So they're not open. I suppose we should think of open hardware and open software separately. Anyone is allowed to build an IBM-compatible PC, but not an IBM-compatible mainframe. I guess anyone is also free to build an Intel x86-compatible processor (as AMD have done), or an AMD64-compatible processor (as Intel have done). But don't dare try to build a z/Archtiecture processor. Nigel On 18/1/07 06:26, Timothy Sipples [EMAIL PROTECTED] wrote: John Chase writes: Indeed. Windows is about as open as the former Soviet Union. Amen. Re: Anyone can build a hardware box to run Windows, well, yes, but you must go to Intel or AMD for the chip. So you have a duopoly -- AMD argues a monopoly -- on the component that matters. But software is far more meaningful when talking about openness. I fail to see how anybody could reasonably describe a Windows PC server as open and a System z running Linux as not open. It's just plain deceptive. Same goes for HP-UX on Itanium. FWIW, I think IBM still includes lots of TPF source code with that operating system. And mainframe Linux is 100% open source. Most X86-based Linux distributions include closed source device drivers. Words ought to mean something, and I wish the (primarily UNIX) marketers hadn't stolen the word open. I think it's time to take the word back from the marketers and return it to the English language. I use the term distributed server since that's the most neutral-but-descriptive term I know. Maybe there's a better term. - - - - - Timothy Sipples IBM Consulting Enterprise Software Architect Specializing in Software Architectures Related to System z Based in Tokyo, Serving IBM Japan and IBM Asia-Pacific E-Mail: [EMAIL PROTECTED] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SYSPLEX for PDS-E Sharing
On Wed, 17 Jan 2007 17:45:43 -0500, Jim Mulder [EMAIL PROTECTED] wrote: Basic sysplex came in MVS/ESA SP4.1. PDSE came in MVS/ESA SP4.3. Jim Mulder z/OS System Test IBM Corp. Poughkeepsie, NY Thanks Jim. Brain cramp ... I don't know why I thought PDSE was around since ESA V3. Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - GITO mailto:[EMAIL PROTECTED] z/OS and OS390 expert at http://searchDataCenter.com/ateExperts/ Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe vs. Server (Was Just another example of mainframe costs.)
On Jan 18, 2007, at 12:26 AM, Timothy Sipples wrote: SNIP--- FWIW, I think IBM still includes lots of TPF source code with that operating system. And mainframe Linux is 100% open source. Most X86-based Linux distributions include closed source device drivers. SNIP-- SIgh... and we won't talk about the current Z/os would you where IBM continuously shrinks the source it sends out. JES2 is almost down to bare bones, despite IBM promises to the contrary when IBM went (mostly) OCO 10 or so years ago. Ed -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe vs. Server (Was Just another example of mainframe costs.)
On Thu, 18 Jan 2007 15:26:31 +0900, Timothy Sipples [EMAIL PROTECTED] wrote: ... Most X86-based Linux distributions include closed source device drivers. Really? Sounds like FUD to me. My experience with Linux is limited, but I've beeen running Fedora Core for about a year and I know that it's distribution is entirely open source. I'm pretty sure Red Hat is also, as well as Debian, Ubuntu, Slackware, Knoppix, Gentoo and others. Which distributions do you know that Include closed source drivers? -- Tom Marchant -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How to Write SAS Output to MVS external file?
Jim Horne, Tom. Thanks so very much for your help. I got the results when I added the PROC PRINT DATA=RMMDTL; after the PROC Printo statement. I have to do some tweaking. It's been a while since I've used SAS. Gotta brush the cobwebs off. Again, Thanks so very much. ~~Carol Thomas H Puddicombe [EMAIL PROTECTED] Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU 01/17/2007 04:26 PM Please respond to IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU To IBM-MAIN@BAMA.UA.EDU cc Subject Re: How to Write SAS Output to MVS external file? Hi Carol, The answer is ... it depends. If you'd like SAS to produce a report (PROC PRINT) in a flat file, you can PROC PRINTTO PRINT=MYOUTPUT; followed by a PROC PRINT DATA=RMMDTL; If you want to produce a flat file with some SAS variables in it, then ods listing close; ods csvall file=CSV rs=none; proc print data=cicstxn; var smf__sid smf__jbn trntran trnterm trnuserid trnttype trnstart trnstop trntrannum trntranpri trnluname trnpgmname trnabcodec trnresp trnfctotct trntdtotct trntstotct trnspsyncct trnchmodect trnusrdispt trnusrdisptn trnusrcput trnusrcputn trnsusptime trnsusptimen trndispwtt trndispwttn trnqrdispt trnqrdisptn trnqrcput trnqrcputn trnmsdispt trnmsdisptn trnmscput trnmscputn trnrodispt trnrodisptn trndspdelay trntcldelay trnmxtdelay trnrmitime trnrmitimen trnrmisusp trnrmisuspn ; run; ods csvall close; ods listing; There's a DD statement in my JCL that looks like: //CSV DD DISP=(,CATLG,DELETE),SPACE=(TRK,(15,15),RLSE), //UNIT=SYSDA, //DSN=SYSUID..RPTCICF0.CSV This produces a comma-separated-variable file suitable for input into Excel. There's also a SAS FILE statement lets you create a flat file out of about anything. Tom -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe vs. Server (Was Just another example of mainframe costs.)
I realize that this is not constructive, but the url below is an ad for Windows 386. It does make the point that Micrsoft spoke to the customer's need for IT empowerment. z/OS zLinux still do not have a compelling empowerment message. You can't sell someone a product if they don't percieve a need. http://video.google.com/videoplay?docid=4915875929930836239; -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SYSPLEX for PDS-E Sharing
On Wed, 17 Jan 2007 17:11:44 -0500, Jack Kelly [EMAIL PROTECTED] wrote: if you have mim, why would you put grs on top of that? Because MIM doesn't protect PDSE. Search the archives. Don't forget IBM-MAIN-ARCHIVES. This for example: http://bama.ua.edu/cgi-bin/wa?A2=ind0309L=ibm-mainP=R25353 -- Tom Marchant -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CICS interface to CA-7
Issuing any sort of SVC from a CICS task was always something that was discouraged (nothing like putting the region into a wait to make you popular with your users), but I suspect most (if not all) shops violate that rule. Given that you don't know how long the CA code will take, it might be prudent to use an OS subtask. Chase, John [EMAIL PROTECTED] Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU 01/17/2007 04:36 PM Please respond to IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU To IBM-MAIN@BAMA.UA.EDU cc Subject Re: CICS interface to CA-7 -Original Message- From: IBM Mainframe Discussion List On Behalf Of Alan C. Field We have a CICS program that builds the parameter list and then issues the CA-7 SVC to Demand jobs. This worked on CA-7 Rel 3.3, We have just tried (and had to fall back) to upgrade to CA-7 11.0 because this technique No longer works. CA's response id that the parameter list format changed and they no longer document it. We'll pursue this further with them. They suggest doing a LINK EP=U7SVC but this isn't allowed under CICS. One thing you CAN do in CICS nowadays is ATTACHX a subtask, passing it the address of an ECB it can post (along with whatever other parms it will need) when it's done, then EXEC CICS WAIT ECBLIST (but NOT an MVS WAIT) for it to POST. Alternatively, you could write a TRUE to link the U7SVC (a little more complex, but saves the overhead of multiple ATTACHX / DETACH sequences). But wouldn't you still need a correct parmlist to LINK EP=U7SVC anyway? -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CICS interface to CA-7
snip We have a CICS program that builds the parameter list and then issues the CA-7 SVC to Demand jobs. unsnip We're not at R11 of CA7 yet (but close) and we have a CICS program that does something similar. Is this how your programs coded? IF (COMMAREA-COMMAND-TYPE = 'DEM') MOVE +48 TO CA7-COMMAND-LENG MOVE COMMAREA-COMMAND-JOBN TO U7DATA-DMD-JOBN MOVE U7DATA-DMD TO CA7-COMMAND GO TO 5000-CALL-U7SVC. : : 5000-CALL-U7SVC. CALL 'U7SVC' USING CA7-COMMAND-AREA. GO TO 9000-GOBACK. Alan Schwartz Assurant Shared Business Services Lead Systems Programmer Phone: 651-361-4758 Fax: 651-361-5625 ** This e-mail message and all attachments transmitted with it may contain legally privileged and/or confidential information intended solely for the use of the addressee(s). If the reader of this message is not the intended recipient, you are hereby notified that any reading, dissemination, distribution, copying, forwarding or other use of this message or its attachments is strictly prohibited. If you have received this message in error, please notify the sender immediately and delete this message and all copies and backups thereof. Thank you. ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe vs. Server (Was Just another example of mainfr
In a recent note, Tom Marchant said: Date: Thu, 18 Jan 2007 07:46:17 -0600 Really? Sounds like FUD to me. My experience with Linux is limited, but I've beeen running Fedora Core for about a year and I know that it's distribution is entirely open source. I'm pretty sure Red Hat is also, as well as Debian, Ubuntu, Slackware, Knoppix, Gentoo and others. Which distributions do you know that Include closed source drivers? Linux for z/Series? -- gil -- StorageTek INFORMATION made POWERFUL -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe vs. Server (Was Just another example of mainfr
I'm not so sure the distinction between software and microcode is that artificial, but in any event I'd call Hercules a z/Architecture emulator rather than processor. Of course, with a closed architecture, having the hardware alone is not enough, since IBM wouldn't license the software. Nigel On 18/1/07 14:54, Paul Gilmartin [EMAIL PROTECTED] wrote: In a recent note, Nigel Hadfield said: Date: Thu, 18 Jan 2007 10:05:25 + I suppose we should think of open hardware and open software separately. Anyone is allowed to build an IBM-compatible PC, but not an IBM-compatible mainframe. I guess anyone is also free to build an Intel x86-compatible processor (as AMD have done), or an AMD64-compatible processor (as Intel have done). But don't dare try to build a z/Archtiecture processor. Hercules? (I'll ignore the artificial distinction between software and microcode.) -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe vs. Server (Was Just another example of mainfr
In a recent note, Nigel Hadfield said: Date: Thu, 18 Jan 2007 15:05:44 + I'm not so sure the distinction between software and microcode is that artificial, but in any event I'd call Hercules a z/Architecture emulator rather than processor. Of course, with a closed architecture, having the hardware alone is not enough, since IBM wouldn't license the software. Are you saying there's no z/Architecture software that can be run (legally) on Hercules? Can anyone think of a counterexample? -- gil -- StorageTek INFORMATION made POWERFUL -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
DFHSM - Trying To Allocate Ouput Volume
I am not sure why this is occurring or what DFHSM is attempting to do. I scanned the syslog as well as the DFHSM log to no avail. I cannot find what is associated with the SYS16002. Below is the message in its entirety: EF244I DFHSMG DFHSMG - UNABLE TO ALLOCATE 1 UNIT(S) 230 AT LEAST 1 OFFLINE UNIT(S) NEEDED. IEF877E DFHSMG NEEDS 1 UNIT(S) 231 FOR DFHSMG SYS16002 FOR VOLUME PRIVAT- 1 OFFLINE 922E-9230 923B 923D 9F03 9F0B-9F0E B418-B419 B43E-B445 : OFFLINE, NOT ACCESSIBLE 0FFF : IEF878I END OF IEF877E FOR DFHSMG DFHSMG SYS16002 3164 IEF238D DFHSMG - REPLY DEVICE NAME OR 'CANCEL'. In the DFHSM log all I found is : IEF506I DFHSMG DFHSMG SYS16002 - NO STORAGE VOLUMES. 'VOLUME=PRIVATE' ASSUMED. Can anybody hazard a guess as to how or where I can find more information on SYS16002 and why DFHSM is complaining? Thanks. - Never Miss an Email Stay connected with Yahoo! Mail on your mobile. Get started! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe vs. Server (Was Just another example of mainfr
Now, now. But I really can't think of a non-IBM hardware platform on which I could run z/Linux. (Oh, go on then.) Nigel On 18/1/07 15:12, Paul Gilmartin [EMAIL PROTECTED] wrote: In a recent note, Nigel Hadfield said: Date: Thu, 18 Jan 2007 15:05:44 + I'm not so sure the distinction between software and microcode is that artificial, but in any event I'd call Hercules a z/Architecture emulator rather than processor. Of course, with a closed architecture, having the hardware alone is not enough, since IBM wouldn't license the software. Are you saying there's no z/Architecture software that can be run (legally) on Hercules? Can anyone think of a counterexample? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe vs. Server (Was Just another example of mainfr
What about z/Linux? George Shedlock Jr PDC - 212-855-8675 Paul Gilmartin [EMAIL PROTECTED] Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU 01/18/2007 09:12 AM To IBM-MAIN@BAMA.UA.EDU cc Subject Re: Mainframe vs. Server (Was Just another example of mainfr In a recent note, Nigel Hadfield said: Date: Thu, 18 Jan 2007 15:05:44 + I'm not so sure the distinction between software and microcode is that artificial, but in any event I'd call Hercules a z/Architecture emulator rather than processor. Of course, with a closed architecture, having the hardware alone is not enough, since IBM wouldn't license the software. Are you saying there's no z/Architecture software that can be run (legally) on Hercules? Can anyone think of a counterexample? -- gil -- - DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses. The company accepts no liability for any damage caused by any virus transmitted by this email. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe vs. Server (Was Just another example of mainframe costs.)
On 17 Jan 2007 22:26:52 -0800, [EMAIL PROTECTED] (Timothy Sipples) wrote: Re: Anyone can build a hardware box to run Windows, well, yes, but you must go to Intel or AMD for the chip. So you have a duopoly -- AMD argues a monopoly -- on the component that matters. But software is far more meaningful when talking about openness. I fail to see how anybody could reasonably describe a Windows PC server as open and a System z running Linux as not open. It's just plain deceptive. Same goes for HP-UX on Itanium. Whereas you can run Mac software with three different chip architectures - not a good definition. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Removing unused 3286 from IODF
Thanks Roy and Kevin for the info. I'll put this on the back burner until I foresee some downtime coming up. Those old definitions don't bother me so much after all! :) Much appreciated, Robert Confidentiality Notice: This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What is command reject trying to tell me?
In a message dated 1/16/2007 6:19:54 P.M. Central Standard Time, [EMAIL PROTECTED] writes: Unit Check means that you need to issue a SENSE command to determine the type of event. A more accurate way to say this is that Unit Check means that the sense data needs to be examined. For maybe 10 years now at least IBM DASD controllers have been sending the full set of sense data into central storage along with the status at the time of the interrupt. This feature, called Concurrent Sense, allows IOS not to have to incur the overhead and time delay of doing a separate I/O in order to read sense data. The sense bytes are stored in the extended control word within the IRB. There is a bit in the SCHIB that indicates whether or not the device presents sense data concurrently with the normal interrupt data such as status. I am not sure which device-related control block in storage has this same info. These sense bytes are only sent into central storage if the status includes unit check. Bill Fairchild -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe vs. Server (Was Just another example of mainfr
On Thu, 18 Jan 2007 07:56:11 -0700, Paul Gilmartin [EMAIL PROTECTED] wrote: In a recent note, Tom Marchant said: Date: Thu, 18 Jan 2007 07:46:17 -0600 Really? Sounds like FUD to me. My experience with Linux is limited, but I've beeen running Fedora Core for about a year and I know that it's distribution is entirely open source. I'm pretty sure Red Hat is also, as well as Debian, Ubuntu, Slackware, Knoppix, Gentoo and others. Which distributions do you know that Include closed source drivers? Linux for z/Series? You snipped too much. My comment was in response to Tim's statement about X86-based Linux distributions: On Thu, 18 Jan 2007 15:26:31 +0900, Timothy Sipples [EMAIL PROTECTED] wrote: ... Most X86-based Linux distributions include closed source device drivers. -- Tom Marchant -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
z/OS NFS Clients
I searched through the archives and could not find a good answer to this question. We have a need for z/OS programs (batch jobs) to access flat files that are on some distributed Unix boxes. 1. Can we use NFS for this (i.e., setup the files on Unix as NFS mount points)? 2. If yes, can someone point me to some documentation examples for using z/OS as an NFS client (all of the IBM examples I found are for accessing NFS mounts on the mainframe, not the other way around)? Alan Brown Senior z/OS Consultant Princeton Softech 111 Campus Drive Princeton, New Jersey 08540 800.457.7060 609.627.5598 [direct] [EMAIL PROTECTED] http://www.princetonsoftech.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Allocation puzzlement.
The failure happens on any TSO allocation. Haven't tried batch as yet. The driving system is a really uncustomized 1.7. This is not my first time with Mr. Zeldan's awesome work. I have two other two pack systems that are working just fine. They were built from fully customized z/os 1.4 systems. The VAT list is the same on all three two pack systems: VATDEF IPLUSE(PRIVATE) SYSUSE(PRIVATE) RES3A,0,0,3390 RES3B,0,0,3390 The obvious answer would be a change to the VAT list, but why? Thanks!! -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Matthew Stitt Sent: Wednesday, January 17, 2007 4:40 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Allocation puzzlement. I'm going to make a few assumptions. Are you trying to logon to the new system? It would appear that your IKJACCNT logon proc is trying to allocate a temporary file. There are no volumes marked as Storage or Public in your VATLSTxx definitions. NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Offline Tape Drives - Candidates for allocation
Matthew, I tried to keep the initial post small, believe it or not, and left out a lot of detail, so the answer is YES - I think. My recollection is that when we explicitly vary the drives offline for maintenance they are always varied offline to ALL LPARs in the SYSPLEX. In Production that is 2 LPARs, and we do not share drives across SYSPLEXes (at this particular location), so each SYSPLEX has only it's own devices genned. Similarly, when there is an 'error', we see the devices being implicitly varied offline to all LPARs automatically on the SYSLOG. We had a recurrence of the issue today (hence my post) and I see from the the SYSLOGs that in this particular case we had an error, the drive was varied offline to both LPARs automatically, and somebody then varied the drive back online to only one of the LPARs (LPAR2) but not the other (LPAR1) where we saw the problem this morning. However, we have previously had occasions where the error went unnoticed and drive has remained offline to both LPARs and the problem manifested itself in exactly the same way. I am interested to know the reason behind your (not stupid at all) question. Steve O. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Offline Tape Drives - Candidates for allocation
Tim, can you issue CONFIG at the device level - and does this affect how ALLOCATION works as opposed to VARY? I know that you can CONFIG at the CHP level but that would take out all drives on that CHP, not just the affected one. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
z/OS 1.4 - End of Support
I understand that IBM support is being discontinued as of 2/2007. Would anyone know if that would be the beginning of the month or end of the month? Thanks. Need Mail bonding? Go to the Yahoo! Mail QA for great tips from Yahoo! Answers users. http://answers.yahoo.com/dir/?link=listsid=396546091 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: z/OS 1.4 - End of Support
3/31/2007 http://www-306.ibm.com/software/info/supportlifecycle/list/z.html -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Howard Rifkind Sent: Thursday, January 18, 2007 12:28 PM To: IBM-MAIN@BAMA.UA.EDU Subject: z/OS 1.4 - End of Support I understand that IBM support is being discontinued as of 2/2007. Would anyone know if that would be the beginning of the month or end of the month? Thanks. Need Mail bonding? Go to the Yahoo! Mail QA for great tips from Yahoo! Answers users. http://answers.yahoo.com/dir/?link=listsid=396546091 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: z/OS 1.4 - End of Support
-Original Message- From: IBM Mainframe Discussion List On Behalf Of Howard Rifkind I understand that IBM support is being discontinued as of 2/2007. Would anyone know if that would be the beginning of the month or end of the month? Last EOS date I saw published was March 31, 2007. http://www-03.ibm.com/servers/eserver/zseries/zos/support/zos_eos_dates .html -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: A Sort/ICETOOL Challenge
Tom Longfellow [EMAIL PROTECTED] wrote on 01/17/2007 07:40:52 PM: Thanks for the answer. While I still do not understand SPLICE and IFTHEN well enough to build one from scratch, I was able to modify your example to handle my VB records (RECT1 and RECT2 are not the same length). I have compared the results of the existing REXX solution to the results of the ICETOOL solution. The output records are identical and the runtime reduced from 30 minutes to 5 minutes. A net savings of 146 hours over a year. That is why I love sort and all of the cool features like SPLICE.If only I could get past whatever it is that makes it so hard for me to understand the syntax of these newer features. --- (hopefully, this will go to the mailing list as you suggested) Tom, I'm happy to hear that you were able to get what you wanted with reduced runtime based on my example. I'm also glad you like the cool features of DFSORT and DFSORT's ICETOOL. As for understanding the syntax, I'd suggest reading through z/OS DFSORT: Getting Started. It's an excellent tutorial, with lots of examples, that will show you how to use DFSORT, DFSORT's ICETOOL and DFSORT Symbols. You can access it online, along with all of the other DFSORT books, from: www.ibm.com/servers/storage/support/software/sort/mvs/srtmpub.html Frank Yaeger - DFSORT Team (IBM) - [EMAIL PROTECTED] Specialties: PARSE, JFY, SQZ, ICETOOL, IFTHEN, OVERLAY, Symbols, Migration = DFSORT/MVS is on the Web at http://www.ibm.com/storage/dfsort/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Decoding the encryption puzzle
There I was, looking into the teeth of a serious ice storm, any my company laptop dies. I have a generator and satellite telecom so that part was covered. But the laptop was a single point of failure between me working from home or risking life and limb having to go out in the storm. The prospect of driving over roads covered with ice and idiots gives me gas. The failure was in the encryption software. The techs tell me the encryption software has been almost trouble free. Almost. And failures are rare. But they happen. When there is a failure, they can almost always recover the data. Almost. I don't have any numbers, but my sense is that only one of a hundred laptops have suffered data loss. One percent. Now, laptops pose an extraordinary level of risk and some hard nosed encryption is arguably mandatory. That is not the point of this rant. Is it possible that mainframe encryption can guarantee perfection? Or will we see about the same thing: loss of one percent of the most mission critical data in the shop? Or one in a hundred critical datasets? Is the mitigated risk worth the loss? Gives this old sysprog pause. NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: z/OS NFS Clients
In a recent note, Alan Brown said: Date: Thu, 18 Jan 2007 11:39:53 -0500 I searched through the archives and could not find a good answer to this question. MVS-OE might be a better list. We have a need for z/OS programs (batch jobs) to access flat files that are on some distributed Unix boxes. 1. Can we use NFS for this (i.e., setup the files on Unix as NFS mount points)? Yes. And the mount map can be configured for ASCII -- EBCDIC And the files can be allocated with DD statements and processed by Classic programs. 2. If yes, can someone point me to some documentation examples for using z/OS as an NFS client (all of the IBM examples I found are for accessing NFS mounts on the mainframe, not the other way around)? Linkname: 3.2 z/OS V1R7.0 Network File System Guide and Reference URL: http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/CPN1CO31/3.2 Linkname: 3.2.1 Starting the z/OS NFS client URL: http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/CPN1CO31/3.2.1 Linkname: SHCMDDES.AUTOMOUNT.5 z/OS V1R7.0 UNIX System Services Command Reference URL: http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/BPXZA560/SHCMDDES.AUTOMOUNT.5 -- gil -- StorageTek INFORMATION made POWERFUL -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: z/OS NFS Clients
Thanks Paul. Alan Brown Princeton Softech (609) 627-5598 -Original Message- From: Paul Gilmartin [mailto:[EMAIL PROTECTED] Sent: Thursday, January 18, 2007 1:04 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: z/OS NFS Clients In a recent note, Alan Brown said: Date: Thu, 18 Jan 2007 11:39:53 -0500 I searched through the archives and could not find a good answer to this question. MVS-OE might be a better list. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Removing unused 3286 from IODF
Dave Kopischke wrote: [...] I think you'll still want a POR though. I don't know of any other way to remove those definitions from HSA without a POR. The room those definitions take up in HSA might not be an issue, but if you're deleting a bunch of devices, it might help you later if you find you need to add a bunch of devices. No longer true. Not under z/990 and other XMP machines. That's good. What's bad it is size of HSA on such machines. -- Radoslaw Skorupka Lodz, Poland -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: A Sort/ICETOOL Challenge
I could get past whatever it is that makes it so hard for me to understand the syntax of these newer features. There's an interesting project for someone: a lanuage preprocessor for SORT which accepts a different syntax, and produces SORT control statements; or a wrapper which does the same thing. Maybe a sort wizard also, to help someone build the sort they need? I don't personally have a problem with the syntax, but I know a lot of people seem to. I think, also, that we're seeing more zNextGen types who don't usually code control statements for a sort, they (I guess) set up a sort via drop-down menus and the like - which makes the learning curve of sort syntax (any mainframe sort tool, not just IBM's) a pretty big hurdle to jump. Unfortunately I don't think non-functional improvement to mainframe sorts (i.e. allowing a different syntax without adding new capabilities) is going to get a lot of new customers, so I don't know if an economic case can be made for building a new language for it. Tim Hare Senior Systems Programmer Florida Department of Transportation (850) 414-4209 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Allocation puzzlement.
When you say fully customized when referring to the 1.4 systems, do you perhaps imply that there is a difference in SMS implementation between the 1.4 and 1.7 systems? We have one volume mounted as storage in VATLSTxx but TSO allocations do not go there as they are redirected elsewhere by SMS. The only datasets that end up there are non-specific allocations that don't have SMS rules/filters set up. Is SMS configured the same on all systems? Another thought, are all systems using the same RACF (or equivalent) TSO segments and is the UNIT valid across all systems? Steve O. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SYSPLEX for PDS-E Sharing
We started down the SYSPLEX road, but never could get hardware resources, then dropped from 6 to 3 LPAR's after Y2K. Setting up a ESCON CTC isn't all that difficult and won't cost you anything except a pair of ESCON channels. With that, you can set up a 3-LPAR SYSPLEX with GRS capabilities and go forward from there. Helps immensely if you diagram it out before you start to define the IOCDS entries. Don't forget that (AFAIK) all currently supported processors support some form of xMIF, meaning that you don't really need actual physical CTCs for connections within the same CEC/Box/your_favorite_name_for_a_box so if you're just connecting LPARS in the same machine you can do it trivially. soapbox Here we are in 2007. It is simply staggering to me that people are still whining about perceived problems and costs associated with sysplex. Those old chestnuts are bogus. There is NO GOOD REASON to run monoplexes in preference to at least a basic sysplex. And if you really do need to run multiple LPARS for your work, then you need to do some soul searching about parallel sysplex. The benefits are enormous and the costs really aren't. /soapbox PDSE sharing requires all of the sharing members to be in the SAME sysplex. Period. PDSE (and a number of other components) share control information over XCF, which by definition restricts their sharing scope to members within the boundaries of the same sysplex. So even though you can share physical DASD resources across sysplex boundaries with a GRS ring or with MIM, you cannot share those (logical) datasets, no matter how you think it ought to work. CC -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Decoding the encryption puzzle
I cannot say that mainframe encryption software is NEVER wrong, but I can say that I have been using various mainframe encryption processes for 30 years (and a few days) and I have 'lost' data 5 times. I could not remember the encryption key those 5 times. I still have those files and once in a while try to decrypt them again when I get some glimmer of what the key might have been. I had to recreate the data for those 5 files so no data was irrevocably lost. The single point of weakness in my working from home is the 2-Factor-Authentication token I am required to use. If I were to leave that in the office or lose it in the supermarket (buying bread, milk, toiletpaper before the blizzard strikes), I would not be able to make the required VPN connection. Driving on icy roads full of idiots is not one of the sacrifices I will make for the greater glory of ... /Tom Kern On Thu, 18 Jan 2007 11:49:07 -0600, Hal Merritt [EMAIL PROTECTED] wrote: There I was, looking into the teeth of a serious ice storm, any my company laptop dies. I have a generator and satellite telecom so that part was covered. But the laptop was a single point of failure between me working from home or risking life and limb having to go out in the storm. The prospect of driving over roads covered with ice and idiots gives me gas. The failure was in the encryption software. The techs tell me the encryption software has been almost trouble free. Almost. And failures are rare. But they happen. When there is a failure, they can almost always recover the data. Almost. I don't have any numbers, but my sense is that only one of a hundred laptops have suffered data loss. One percent. Now, laptops pose an extraordinary level of risk and some hard nosed encryption is arguably mandatory. That is not the point of this rant. Is it possible that mainframe encryption can guarantee perfection? Or will we see about the same thing: loss of one percent of the most mission critical data in the shop? Or one in a hundred critical datasets? Is the mitigated risk worth the loss? Gives this old sysprog pause. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SYSPLEX for PDS-E Sharing
This is about the 4th time I've installed the LAST OS upgrade we will ever need on the mainframe. Each one has been the max allowed upgrade just weeks prior to EOS of the current one. Many of us live under political rules, not technical ones. The alternative is to go over to the dark side.. soapbox Here we are in 2007. It is simply staggering to me that people are still whining about perceived problems and costs associated with sysplex. Those old chestnuts are bogus. There is NO GOOD REASON to run monoplexes in preference to at least a basic sysplex. And if you really do need to run multiple LPARS for your work, then you need to do some soul searching about parallel sysplex. The benefits are enormous and the costs really aren't. /soapbox -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SYSPLEX for PDS-E Sharing
On Thu, 18 Jan 2007 12:48:28 -0600, Rugen, Len wrote: This is about the 4th time I've installed the LAST OS upgrade we will ever need on the mainframe. Each one has been the max allowed upgrade just weeks prior to EOS of the current one. Many of us live under political rules, not technical ones. If you can't get your management to let you implement even a basic Sysplex, then any attempt to share PDSEs will be at your own peril. soapbox ... There is NO GOOD REASON to run monoplexes in preference to at least a basic sysplex. /soapbox -- Tom Marchant -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Allocation puzzlement.
All of the driver systems have SMS active. SMS is inactive on the two pack systems. The failing two pack system was created using a copy of a RACF database from the driver system. The UNIT seems to be valid. But I may not have looked everywhere I need to look. The two volumes do not show up on the candidate volume list. What besides the VAT would do such a thing? Mark's recipe job was built for z/os 1.6. Is there some difference in allocation between 1.6 and 1.7 that could explain this? Thanks all!! -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Steve O'Connell Sent: Thursday, January 18, 2007 12:25 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Allocation puzzlement. When you say fully customized when referring to the 1.4 systems, do you perhaps imply that there is a difference in SMS implementation between the 1.4 and 1.7 systems? We have one volume mounted as storage in VATLSTxx but TSO allocations do not go there as they are redirected elsewhere by SMS. The only datasets that end up there are non-specific allocations that don't have SMS rules/filters set up. Is SMS configured the same on all systems? Another thought, are all systems using the same RACF (or equivalent) TSO segments and is the UNIT valid across all systems? Steve O. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Decoding the encryption puzzle
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Hal Merritt Sent: Thursday, January 18, 2007 10:49 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Decoding the encryption puzzle There I was, looking into the teeth of a serious ice storm, any my company laptop dies. I have a generator and satellite telecom so that part was covered. But the laptop was a single point of failure between me working from home or risking life and limb having to go out in the storm. The prospect of driving over roads covered with ice and idiots gives me gas. The failure was in the encryption software. The techs tell me the encryption software has been almost trouble free. Almost. And failures are rare. But they happen. When there is a failure, they can almost always recover the data. Almost. I don't have any numbers, but my sense is that only one of a hundred laptops have suffered data loss. One percent. Now, laptops pose an extraordinary level of risk and some hard nosed encryption is arguably mandatory. That is not the point of this rant. Is it possible that mainframe encryption can guarantee perfection? Or will we see about the same thing: loss of one percent of the most mission critical data in the shop? Or one in a hundred critical datasets? Is the mitigated risk worth the loss? Gives this old sysprog pause. /snip/ Encryption software failing is somewhat vague. Did the software generate incorrect cipher text? Did the software incorrectly decipher the data using the correct key? Was the key lost or stolen or exposed or improperly expired? Symmetric (secret) key encryption, like DES or AES, is very reliable with respect to correct encipher/decipher operation. The main issue is key management: How to generate strong keys, securely store those keys, and associating the keys with the protected data? It all boils down to having a clear master key somewhere that unlocks all of the other keys. Even the IBM hardware encryption with tamper-resistant master key protection needs to be reset sometimes. That means the master key (or the pass phase used to generate a master key) must be written down somewhere (and physically protected) so that the security administrator can re-enter it into the hardware. Without the central master key, all other keys are inaccessible (not decipherable) and thus the encrypted data is unavailable. Asymmetric (public/private) key encryption is only viable for exchanging encrypted symmetric keys, because the algorithm is computationally intensive and far too expensive for high volume encryption traffic. Physical deterioration of encryption silicon may occur over time, just like deterioration and failure of main memory or logic circuits or hard drives. That's why encryption devices self-test with known answers and internally check their results. I've heard that some hardware encryption devices may perform the encryption 3 times per block of data and compare the results for a perfect match. The process is repeated until a perfect match of the 3 results or until a time-out occurs (machine check interrupt). A properly designed encryption device will detect bad results and not expose incorrect results outside of its secure boundary. I don't worry about the bitwise accuracy of encrypt/decrypt results. I worry about key management, because it's the central point of failure. If your keystore is on a harddrive that fails, then all data encrypted by those lost keys is inaccessible. Jeffrey D. Smith Principal Product Architect Farsight Systems Corporation 700 KEN PRATT BLVD. #204-159 LONGMONT, CO 80501-6452 303-774-9381 direct 303-484-6170 FAX http://www.farsight-systems.com/ see my résumé at my website -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: What is command reject trying to tell me?
On Wed, 17 Jan 2007 15:45:20 -0600, Patrick O'Keefe [EMAIL PROTECTED] wrote: Chris, An offline response becuase I doubt many IBM-Mainers care about NetView, but ... ... Well, so much for my attempt at an offline response. :-( Pat O'Keefe -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: z/OS NFS Clients
1. Yes. 2. Z/OS as the client was kinda thin on documentation. There is some in Network File System Customization and Operation Redbook Data Sharing: Using the OS/390 Network File System Network File System User Guide Network File System Customization and Operation -Rob Schramm snippage This e-mail transmission contains information that is confidential and may be privileged. It is intended only for the addressee(s) named above. If you receive this e-mail in error, please do not read, copy or disseminate it in any manner. If you are not the intended recipient, any disclosure, copying, distribution or use of the contents of this information is prohibited. Please reply to the message immediately by informing the sender that the message was misdirected. After replying, please erase it from your computer system. Your assistance in correcting this error is appreciated. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: HSM/RMM tape reuse
The 365I message tells you that the amount of valid data on the tape is below the threshold you specified (because data has expired and/or manually marked for deletion). HSM is recommending you issue the RECYCLE command for that tape which will copy the (small amount of) remaining data onto a new volume and free the volume for reuse. The 261I message tells you that the tape has been successfully recycled or deleted and ready for reuse after you reinitialize the tape label. Neither message has anything to do with RMM. Whether you actually reinitialize the tape is a function of your procedures for returning tapes to the scratch and how you communicate to RMM and flex that the volume is free. -Original Message- From: Ron MacRae [mailto:snip] Sent: Thursday, January 18, 2007 1:36 AM To: IBM-MAIN@BAMA.UA.EDU Subject: HSM/RMM tape reuse LadiesGentlemen, I'm sure this is an easy question for anyone who understands HSM RMM, unfortunatly I'm not one of them. We've been running HSM/RMM without problems for several years. Recently, not sure exactly when, HSM started spitting out the following msgs when it freed up a tape. ARC0365I BACKUP VOLUME FT1718 NOW AVAILABLE FOR RECYCLE ARC0261I TAPE VOLUME FT1718 NEEDS TO BE REINITIALIZED We have now run out of tapes. (Actualy faketapes on a flex machine, but I don't think that is relevent.) We don't understand why this has started to happen. Our HSM parms were last changed in 2003. Several people have been playing with RMM so we suspect it's something in RMM. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Decoding the encryption puzzle
On Thu, 2007-01-18 at 11:49 -0600, Hal Merritt wrote: The failure was in the encryption software. Perhaps the failure was bit rot in that cheap notebook hard drive? Most desktop systems don't do much in the way of file integrity, so when decryption fails on a corrupt file it fails spectacularly. -- David Andrews A. Duda and Sons, Inc. [EMAIL PROTECTED] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
CA-1 reblocking gotchas?
I am thinking about finally blocking my CA-1 TMC. We're not a huge shop, tape-wise, compared to many and so the block size of our TMC isn't really killing us but it would be nicer if certain queries or reports ran faster. I'm thinking that someone on IBM-MAIN must have done this already - anything major to look out for? Our CA-1 is at R11.5 . Tim Hare Senior Systems Programmer Florida Department of Transportation (850) 414-4209 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA-1 reblocking gotchas?
I did it on 5.2 and never had a problem. As usual, make copies before and after just in case. -Original Message- From: Tim Hare [mailto:snip] Sent: Thursday, January 18, 2007 12:46 PM To: IBM-MAIN@BAMA.UA.EDU Subject: CA-1 reblocking gotchas? I am thinking about finally blocking my CA-1 TMC. We're not a huge shop, tape-wise, compared to many and so the block size of our TMC isn't really killing us but it would be nicer if certain queries or reports ran faster. I'm thinking that someone on IBM-MAIN must have done this already - anything major to look out for? Our CA-1 is at R11.5 . -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Command repeat for ISPF 3.4?
To execute the same command against all or selected members of a pds, use a command like this in the command field: s mask command To run command xyz against all members starting with abc: s abc* xyz To delete all members of a pds: s * d Dave Long On Wed, 17 Jan 2007 11:34:54 -0500, Larry R. Wright [EMAIL PROTECTED] wrote: Hi All, I was just paging through a large number of datasets on 3.4 to issue a rexx command on each file to get a return code. For this purpose, I issued the rexx command on the very first dataset and entered an equal sign (=) to repeat for each of the next hundreds of datasets. Is there something even better such as a command to repeat the command for all entries in the 3.4 list? Enquiring minds would like to know :) Thanks, Larry -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe jobs list?
Hold onto what you've got! I've been out of work for 31 months now.. :-( Finally decided to retire. --snip--- Jeffrey D. Smith wrote: Greetings, What you all recommend for the better jobs lists for mainframe developers? (Yes, I am looking for employment.) Jeffrey D. Smith Principal Product Architect Farsight Systems Corporation 700 KEN PRATT BLVD. #204-159 LONGMONT, CO 80501-6452 303-774-9381 direct 303-484-6170 FAX http://www.farsight-systems.com/ see my résumé at my website -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CA-1 reblocking gotchas?
The blocksize must be a multiple of the LRECL which is 340. -Original Message- From: Lizette Koehler [mailto:[EMAIL PROTECTED] Sent: Thursday, January 18, 2007 1:59 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: CA-1 reblocking gotchas? I took our current TMC which as allocated at 900 Cyls using 450Cyls from unblocked to blocked. I used the TMSXTEND function - Very easy to use. Now my TMC is 189 Cyls (still way to big). The block used was BLKSIZE=8804 (the recommended size by CA) The task was very easy if you follow the steps documented. TMSXTEND is a different format - but it will allow you to extend the TMC tape range without a TAPE outage. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DFSort syntax error, What am I missing?
On Thu, 18 Jan 2007 15:55:46 -0500, in bit.listserv.ibm-main (Message-ID:[EMAIL PROTECTED]) Neal Eckhardt [EMAIL PROTECTED] wrote: It must be something stupid, but what is the error here? (I'll kick myself after). The $ appears after the second ')' Neal ICE143I 0 BLOCKSET COPY TECHNIQUE SELECTED ICE000I 1 - CONTROL STATEMENTS FOR 5740-SM1, DFSOR snip 43,1,CH,EQ,C'9')},FNAMES=OUT2 $ ICE007A E SYNTAX ERROR Note that the symbol above the $ is a right brace [}] not a right parenthesis [)]. This can be difficult to see depending on your font and the strength of your glasses. Note also that only a small subset of the IBMMAIN readers will see your post because you posted directly to the newsgroup, rather than through the Listserv. See the links at the bottom of this post for info on the Listserv. -- I cannot receive mail at the address this was sent from. To reply directly, send to ar23hur at intergate dot com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Decoding the encryption puzzle
On Thu, 18 Jan 2007 14:53:01 -0600, Hal Merritt wrote: The encryption software starts before Windows. The software failed with a blue screen of death. My sense is that one or more critical files on the hard drive used by the software became corrupt as PC files are known to do. But I don't know. But my point was the laptop was put out of service for several days. Doesn't really matter why. This may be tolerable (or even expected) with a PC. But on a mainframe? You are describing one of the core differences between real mainframes and etch-a-sketch computers -- the real McCoy use parity for memory and lots of checking in the I/O accesses as well (seen and unseen). The doorstop Wintel computers almost never use memory with parity and offer little or no error checking in the I/O path. To no surprise the doorstop computers fail, early often, while the mainframes lumber on. To be slightly more fair, the PCs are rarely kept in controlled environments and can be subject to all kinds of radio and other EM interference... not _always_ at a high enough signal strength to corrupt a bit or two but a few overweight alpha particles can do wonderous things. And they strike without warning. The complete loss of mission critical data even for a few days could be catastrophic to the company. One solution is to have backups that aren't encrypted. But, then, what would be the point of encryption in the first place? As I said, a puzzlement. I don't believe you will see the same kinds of issues with mainframe encryption and I really would be astonished if the errors were within 3 orders of magnitude of the PC (or even blade server) world. Reliability is key to the mainframe. -- Tom Schmidt Madison, WI -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Decoding the encryption puzzle
On Thu, 18 Jan 2007 14:53:01 -0600, Hal Merritt wrote: The complete loss of mission critical data even for a few days could be catastrophic to the company. One solution is to have backups that aren't encrypted. But, then, what would be the point of encryption in the first place? As I said, a puzzlement. I wouldn't encrypt data within a datacenter. The only data that gets encrypted around here is data that goes out the door. Internal tapes are not encrypted. All tapes that go off site are encrypted and all tranmissions are encrypted. Some of our E-Mails are even required to be encrypted. But within the confines of the controlled environment, encryption is not required. I would expect a performance penalty if everything within the datacenter were encypted. Not a blue screen of death, but more probably management death threats. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DFSORT question on max record length in VB file
Frank Silven wrote: I have a need to determine the actual maximum record length used by a VB file..so when i have a LRECL=522,RECFM=VB then the physical max record length=518 bytes... But I need a solution which determines the actual maximum record length used in a VB file, so the question is whether DFSORT or ICETOOL can determine the MAX RDW value over all records ? Sure. Here are two ways to do it: 1) DFSORT Job using OUTFIL: //S1 EXEC PGM=ICEMAN //SYSOUT DD SYSOUT=* //SORTIN DD DSN=... input file (VB) //SORTOUT DD SYSOUT=* //SYSIN DD * OPTION COPY OUTFIL REMOVECC,NODETAIL, TRAILER1=(MAX=(1,2,BI,TO=ZD)) /* SORTOUT will have one record with the maximum record length, e.g. 00084 2) ICETOOL job using STATS: //S2 EXEC PGM=ICETOOL //TOOLMSG DD SYSOUT=* //DFSMSG DD SYSOUT=* //IN DD DSN=... input file (VB) //TOOLIN DD * STATS FROM(IN) ON(VLEN) /* TOOLMSG will show the maximum record length in an ICE608I message, e.g. STATS FROM(IN) ON(VLEN) ICE627I 0 DFSORT CALL 0001 FOR COPY FROM IN TO E35 EXIT COMPLETED ICE628I 0 RECORD COUNT: 008 ICE607I 0 STATISTICS FOR (VLEN): ICE608I 0 MINIMUM: +031, MAXIMUM: +084 ICE609I 0 AVERAGE: +039, TOTAL : +317 ICE602I 0 OPERATION RETURN CODE: 00 Frank Yaeger - DFSORT Team (IBM) - [EMAIL PROTECTED] Specialties: PARSE, JFY, SQZ, ICETOOL, IFTHEN, OVERLAY, Symbols, Migration = DFSORT/MVS is on the Web at http://www.ibm.com/storage/dfsort/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Decoding the encryption puzzle
Unless the chip is: 1) on a voyage outside our atmosphere or 2) on a ceramic substrate foolishly made from clay not tested for the presence of radioactive impurities, it is highly unlikely an alpha particle, regardless of its diet and lack of exercise, will make it to a chip. Those of terrestrial origin, other than in the substrate, will not make it through the case. Cosmic rays alphas will not make it through the atmosphere. On the other hand, the secondary shower of muons can only be shielded by copious quantities of hard rock (musicians need not apply). Reines et al did their neutrino work in deep mines just to filter out anything but neutrinos. nit-picking pup starting Friday early http://en.wikipedia.org/wiki/Cosmic_rays is a place to start IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU wrote on 01/18/2007 05:55:21 PM: bit or two but a few overweight alpha particles can do wonderous things. And they strike without warning. - The information contained in this communication (including any attachments hereto) is confidential and is intended solely for the personal and confidential use of the individual or entity to whom it is addressed. The information may also constitute a legally privileged confidential communication. If the reader of this message is not the intended recipient or an agent responsible for delivering it to the intended recipient, you are hereby notified that you have received this communication in error and that any review, dissemination, copying, or unauthorized use of this information, or the taking of any action in reliance on the contents of this information is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail, and delete the original message. Thank you -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: HSM/RMM tape reuse
Ron, Further to Barrys' reply, The messages you list are not caused by something that RMM does. The ARC0261I is issued because the recycled tape is expiration date protected. Dont worry about it, RMMs processing automatically handles this when the tape is reused. Sounds like the problem may be that tapes are just not getting released? You listed the release actions and the actions pending but not the volume status. If the volume were released and waiting to be scratched I would expect the pending action 'scratch=Y'. HSM calls EDGTVEXT at recycle time as long as the HSM SETSYS options are correct. Does that cause the volume to be released? What is the MRM TVEXTPURGE parmlib option? What is the volume expiration date ? I am sure that if you look at what RMM tells you you should see whay the volume is not released. Mike Wood RMM Development On Thu, 18 Jan 2007 03:35:37 -0600, Ron MacRae [EMAIL PROTECTED] wrote: LadiesGentlemen, I'm sure this is an easy question for anyone who understands HSM RMM, unfortunatly I'm not one of them. We've been running HSM/RMM without problems for several years. Recently, not sure exactly when, HSM started spitting out the following msgs when it freed up a tape. ARC0365I BACKUP VOLUME FT1718 NOW AVAILABLE FOR RECYCLE ARC0261I TAPE VOLUME FT1718 NEEDS TO BE REINITIALIZED We have now run out of tapes. (Actualy faketapes on a flex machine, but I don't think that is relevent.) We don't understand why this has started to happen. Our HSM parms were last changed in 2003. Several people have been playing with RMM so we suspect it's something in RMM. If I list the tape in RMM the actions on release are - Action on release: Scratch immediate = N Expiry date ignore = N Scratch = Y Replace = N Return = N Init = N Erase = N Notify = N Actions pending: Scratch = N Replace = N Return = N Init = N Erase = N Notify = N We could switch on INIT but we don't want the tapes reinitialised, we just want to re-use them. What changes, presumably in RMM, can have caused the ARC0261I msgs to start? Thanks in advance, Ron MacRae -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: A Sort/ICETOOL Challenge
On 18 Jan 2007 10:20:13 -0800, in bit.listserv.ibm-main you wrote: I could get past whatever it is that makes it so hard for me to understand the syntax of these newer features. There's an interesting project for someone: a lanuage preprocessor for SORT which accepts a different syntax, and produces SORT control statements; or a wrapper which does the same thing. Maybe a sort wizard also, to help someone build the sort they need? I don't personally have a problem with the syntax, but I know a lot of people seem to. I think, also, that we're seeing more zNextGen types who don't usually code control statements for a sort, they (I guess) set up a sort via drop-down menus and the like - which makes the learning curve of sort syntax (any mainframe sort tool, not just IBM's) a pretty big hurdle to jump. Unfortunately I don't think non-functional improvement to mainframe sorts (i.e. allowing a different syntax without adding new capabilities) is going to get a lot of new customers, so I don't know if an economic case can be made for building a new language for it. Take a look at SYNCSORT for HP-UX (and probably other UNIX environments). In terms of syntax and capability it has the mainframe sorts beat by a mile. If I read the manual correctly, I could have used a COBOL copybook as one of the input control streams so that I could have just sorted on field name without even having to write separate descriptors. Tim Hare Senior Systems Programmer Florida Department of Transportation (850) 414-4209 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Decoding the encryption puzzle
The encryption of data on a backup tape does not need to be done ALL the time. If one level of backup are in your automated tape library, in a data center with card-key access in a building with armed guards on all entrances who inspect packages coming in AND going out, then I don't think you need to encrypt that data. Just use it for a FAST recovery. But if a copy of those backups have to go offsite, even to your company's other data center, ENCRYPT the data. When the shipping company loses the one tape that has the CEO's social security number or salary on it, you will be less worried if you know it was encrypted. Less antacid to chew. /Tom Kern --- Hal Merritt [EMAIL PROTECTED] wrote: The encryption software starts before Windows. The software failed with a blue screen of death. My sense is that one or more critical files on the hard drive used by the software became corrupt as PC files are known to do. But I don't know. But my point was the laptop was put out of service for several days. Doesn't really matter why. This may be tolerable (or even expected) with a PC. But on a mainframe? The complete loss of mission critical data even for a few days could be catastrophic to the company. One solution is to have backups that aren't encrypted. But, then, what would be the point of encryption in the first place? As I said, a puzzlement. We won't tell. Get more on shows you hate to love (and love to hate): Yahoo! TV's Guilty Pleasures list. http://tv.yahoo.com/collections/265 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: A Sort/ICETOOL Challenge
On 18 Jan 2007, you wrote in bit.listserv.ibm-main: I could get past whatever it is that makes it so hard for me to understand the syntax of these newer features. I don't personally have a problem with the syntax, but I know a lot of people seem to. I think, also, that we're seeing more zNextGen types who don't usually code control statements for a sort, they (I guess) set up a sort via drop-down menus and the like - which makes the learning curve of sort syntax (any mainframe sort tool, not just IBM's) a pretty big hurdle to jump. I am feeling the need to defend myself. I am a 25 year veteran of mainframe environments. They would not dare issue me a zNextGen membership card. I can code standard sorts like there is no tomorrow. I loathe the current trend in software development that your product is just not cool without a graphical drag-drop front end. But, given the fact that the there is a 'tricks' sheet on the website, you have to assume that maybe some of these new sort verbs are not intuitively obvious. Quick now, without a manual, and without being Frank Yaeger. Tell me exactly what this snippet of code is doing. you have 3 seconds. (And by the way, you are currently supporting z/OS, DB2, IMS, VTAM, TCPIP, and everthing else on, near or connected to, the mainframe... not just sorts) OVERLAY=(49:SEQNUM,8,ZD, 41:41,8,ZD,SUB,49,8,ZD,M11,LENGTH=8)) [[[ the above is purely in jest. If you do not see the humor in it, I apologize ]]] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Decoding the encryption puzzle
Hal Merritt wrote: The encryption software starts before Windows. The software failed with a blue screen of death. My sense is that one or more critical files on the hard drive used by the software became corrupt as PC files are known to do. But I don't know. But my point was the laptop was put out of service for several days. Doesn't really matter why. This may be tolerable (or even expected) with a PC. But on a mainframe? The complete loss of mission critical data even for a few days could be catastrophic to the company. One solution is to have backups that aren't encrypted. But, then, what would be the point of encryption in the first place? As I said, a puzzlement. for a little drift ... another crypto related thread (FDE ... full disk encryption) http://www.garlic.com/~lynn/aadsm26.htm#23 It's a Presidential Mandate, Feds use it. How come you are not using FDE? one of the things that was driving key escrow ... was that if the data (at rest) was always encrypted ... then the backups would also be encrypted. key escrow was required to satisfy no single point of failure scenario (loosing the key) and disaster recovery. There is a separate issue if a vulnerable laptop containing the only copy of business/mission critical data ... this is again normally dealt with as a disaster recovery and no single point of failure scenario (regardless of what kind of availability standard any piece of equipment might meet). For a totally different rant ... there is a big effort to solve some vulnerability problems using encryption ... which I claim would be better addressed by eliminating risk associated with some forms of data ... and eliminating requirement for other kinds of data altogether. recent long-winded posts on the subject http://www.garlic.com/~lynn/2006b.html#60 Securing financial transactions a high priority for 2007 http://www.garlic.com/~lynn/2006b.html#61 Securing financial transactions a high priority for 2007 http://www.garlic.com/~lynn/2006b.html#62 Securing financial transactions a high priority for 2007 http://www.garlic.com/~lynn/2006b.html#64 Securing financial transactions a high priority for 2007 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Decoding the encryption puzzle
I wouldn't encrypt data within a datacenter. The only data that gets encrypted around here is data that goes out the door. Internal tapes are not encrypted. If one level of backup are in your automated tape library, in a data center with card-key access in a building with armed guards on all entrances who inspect packages coming in AND going out, then I don't think you need to encrypt that data. Its too easy for one of those 'secure' tapes to walk out the door with a disgruntled employee. And when the audit turns up a tape missing - its not going to care how or where it went - only that its missing and not encrypted. More than once I've read notices from companies announcing breaches where they state that they are '99% sure its in a landfill, but...'. And while that may be true and the data is more than likely safe, the damage to the reputation is already done, and the cost to notify is real. For my money, if it can be carried out, its going to be encrypted. Jeffrey Deaver, Engineer Systems Engineering [EMAIL PROTECTED] 651-665-4231(v) 651-610-7670(p) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Decoding the encryption puzzle
If one of your tapes walks out the door with a disgruntled employee, then you have the wrong guards on the door. They are not just supposed to be there for decoration. No one person or organization can be responsible for the security of EVERYTHING. So make sure your guards do their job and you handle encrypting the external tapes. One system's programmer cannot do it all, nor can they convince management to buy it all to do it all. /Tom Kern --- Jeffrey Deaver [EMAIL PROTECTED] wrote: Its too easy for one of those 'secure' tapes to walk out the door with a disgruntled employee. And when the audit turns up a tape missing - its not going to care how or where it went - only that its missing and not encrypted. More than once I've read notices from companies announcing breaches where they state that they are '99% sure its in a landfill, but...'. And while that may be true and the data is more than likely safe, the damage to the reputation is already done, and the cost to notify is real. For my money, if it can be carried out, its going to be encrypted. Looking for earth-friendly autos? Browse Top Cars by Green Rating at Yahoo! Autos' Green Center. http://autos.yahoo.com/green_center/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How to schedule Jes2 Cancel a job command
ravi wrote: Hello I have a strange requirement. In my shop we have cancel a job manually every Friday at 9pm. Is there way to schedule jes2 commands like $C'jobname' and schedule it only every Friday 9pm. Or is there any way to write rexx thru batch job and submit jes2commands. Please advice me Thanks Sankar Ravi [EMAIL PROTECTED] mailto:[EMAIL PROTECTED] Do you have automation package or a scheduling package? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Decoding the encryption puzzle
If one of your tapes walks out the door with a disgruntled employee, then you have the wrong guards on the door. They are not just supposed to be there for decoration. No one person or organization can be responsible for the security of EVERYTHING. So make sure your guards do their job and you handle encrypting the external tapes. One system's programmer cannot do it all, nor can they convince management to buy it all to do it all. I can not imagine working in an environment where my (and the other 3000 employees') bags are searched as we go in and out of the office. It would take hundreds of guards and would have to involve some form of strip searching. I'm sure this happens in certain forums - I just can't imagine it when there is an alternative to prevent the need in the first place. Another example to argue for all tapes encrypted What happens to tapes when they break in your shop? In a perfect world the process should perhaps be ... 1) Change logged in change management system to note what is about to happen. 2) logically remove tape from tape management system 3) Degauss tape with coworker watching 4) Toss tape in locked bin headed for the crusher with coworker watching 5) Record completed event in change management system with names of employees that confirmed activity. HOWEVER... what happens if Mr. new operator simply tosses it in the trash. A few months later the audit turns up a missing tape. You can't find it, and there is no trail to tell you where it went. It is lost and under the breach notification laws as I understand them, that is a notifiable event - even though your employee tells you they threw it in the trash. Thus the notices that say we're 99% sure its in a landfill. Right or wrong, given our society, I firmly believe that all data will be encrypted everywhere all the time at some point in the not too distant future. But for now, if the media moves, encrypt it. Jeffrey Deaver, Engineer Systems Engineering [EMAIL PROTECTED] 651-665-4231(v) 651-610-7670(p) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Command repeat for ISPF 3.4?
Hello David, Right answer to the wrong question. For an ISPF 3.4 dataset list, when I have to process the same command against a list I prefer to do it in batch. 1. Use the P primary command to print the required dataset list to an ISPF LIST dataset. 2. Use the LIST primary command to display a choice list, select 3 to keep the dataset. Remember/cut the list dataset name. 3. Edit the list dataset so generated, and turn it into a batch TSO job with the usefule ISPF EDIT functions. 4. Submit your useful HACK job. On Thu, 18 Jan 2007 15:28:57 -0600, David Long [EMAIL PROTECTED] wrote: To execute the same command against all or selected members of a pds, use a command like this in the command field: s mask command To run command xyz against all members starting with abc: s abc* xyz To delete all members of a pds: s * d Dave Long On Wed, 17 Jan 2007 11:34:54 -0500, Larry R. Wright [EMAIL PROTECTED] wrote: Hi All, snip Is there something even better such as a command to repeat the command for all entries in the 3.4 list? Enquiring minds would like to know :) Thanks, Larry Regards Bruce Hewson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Mainframe vs. Server (Was Just another example of mainframe costs.)
Timothy Sipples writes: ... Most X86-based Linux distributions include closed source device drivers. Then Tom Marchant writes: Really? Sounds like FUD to me. My experience with Linux is limited, but I've beeen running Fedora Core for about a year and I know that it's distribution is entirely open source. I'm pretty sure Red Hat is also, as well as Debian, Ubuntu, Slackware, Knoppix, Gentoo and others. Which distributions do you know that Include closed source drivers? It depends on the distribution of course, but the following popular Linux drivers are closed source: NVIDIA (video) ATI (video) LSI Logic (storage) some software-based modems (e.g. Lucent) some ISDN drivers There are others as well. Some distributions (e.g. Debian, Ubuntu) don't include these drivers at all, and you have to go fetch them on your own if you want/need them. Others include them as standard Web deliverables, and still others (e.g. Linspire) include them in their distributions. For NVIDIA and ATI there are open source alternatives, although functionality may be more limited with the alternatives. Now, whether this matters to you or not is another question. Still, I think it's a small but interesting detail that there are no closed source Linux drivers for System z, so far as I'm aware. It's all open source now. - - - - - Timothy Sipples IBM Consulting Enterprise Software Architect Specializing in Software Architectures Related to System z Based in Tokyo, Serving IBM Japan and IBM Asia-Pacific E-Mail: [EMAIL PROTECTED] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Allocation puzzlement.
One thought, Is the volume which you have mounted PUBLIC full? Regards Bruce Hewson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How to schedule Jes2 Cancel a job command
At 22:47 -0500 on 01/18/2007, John S. Giltner, Jr. wrote about Re: How to schedule Jes2 Cancel a job command: ravi wrote: Hello I have a strange requirement. In my shop we have cancel a job manually every Friday at 9pm. Is there way to schedule jes2 commands like $C'jobname' and schedule it only every Friday 9pm. Or is there any way to write rexx thru batch job and submit jes2commands. Please advice me Thanks Sankar Ravi [EMAIL PROTECTED] mailto:[EMAIL PROTECTED] Do you have automation package or a scheduling package? Do 2 things. 1) Place a $VS,''S CANF9PM' command into the JES2 start up Parms. 2) Write a CANF9PM program and make a STC Proc to execute it. Have the job issue $TA,F9PM,T=.yy,'$C''Jobname''' and $TA,I9PM,I=86400,'$VS,''S CANF9PM''' commands. CANF9PM computes the .yy based on the current time and day. The .yy is the number of hours and minutes since the prior midnight when Friday at 9PM will be. The $YA,I9PM will issue and/or refresh the $TA,F9PM once a day (and will be reset if JES2 is restarted [I do not think that $TA commands survive a restart]). The $TA,,T= command runs once at the T= designated time. The issuance of a $TA, will reset/overlay a prior copy. Once it runs, the $TA,I9PM will recreate it (a I= is useless on the $TA,F9PM since the I= is only good to hold 24 Hours worth of seconds). -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: How to schedule Jes2 Cancel a job command
We use Dave Cole's SCHEDRUN freeware. It works well for simple scheduling tasks. It's available for download at www.colesoft.com. Bob Shannon Rocket Software -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Decoding the encryption puzzle
Kirk Talman wrote: 2) on a ceramic substrate foolishly made from clay not tested for the presence of radioactive impurities, it is highly unlikely an alpha particle, regardless of its diet and lack of exercise, will make it to a chip. I seem to remember an article by IBM staffers in Scientific American or Science some decades ago. They concluded that alpha particle hits on memory were possible. I don't recall the precise figures, but seem to recall it was around one hit per megabyte per 10**4 or 10**5 hours. For memory with any means of error correction this is negligible. Gerhard Postpischil Bradford, VT new e-mail address: gerhardp (at) charter (dot) net -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html