Re: Time Gap in System Trace

2010-07-27 Thread Barbara Nitz
These messages denote a gap in the time stamps. They say nothing about
what the processor was actually doing during that interval: waiting,
stopped, etc. This is exactly how parked processors look on a trace.

Thanks, Ed. When I learned debugging, I was told that time gaps in systrace 
are a bad thing and to be very wary. Doing a systrace only for the active 
address space still spits out all these messages, which was confusing to me. 
Best regards, Barbara

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: COBOL HLPI JCL sample needed

2010-07-27 Thread Elardus Engelbrecht
Donald Johnson wrote:

Can someone help me by providing a sample batch JCL member to compile 
COBOL programs using HLPI for DL/I? 

Perhaps, if you could tell us what is HLPI and DL/I.

(I got a few vague hits in my bookmanager for DL/I, but nothing for HLPI.)

Groete / Greetings
Elardus Engelbrecht

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread Etienne Thijsse
On Mon, 26 Jul 2010 12:23:10 -0500, Paul Gilmartin paulgboul...@aim.com 
wrote:

On Mon, 26 Jul 2010 11:02:24 -0500, Etienne Thijsse wrote:

If I use the C function remove() to remove a member from a PDSE, then from
that moment on, the PDSE is locked, ISPF says in use, I can't create a new
member in it using fopen() in the same program. The PDSE only gets 
unlocked
after the program has ended.

The C RTL is a moron.  It ought to use ISPF-style serialization
rather than doing a blanket RESERVE.  (I know; Shmuel will say
that wouldn't be safe.  Tell that to the ISPF designers.)

And it ought to know the rules are different for PDSEs.

If remove() fails to close the data set when it finishes, this
ought to be cause for a PMR.  But is there another stream that
might be holding the data set open?

-- gil

Thanks for responding, Gil. There is no other stream. When I run under the 
debugger, the PDSE remains accessible with ISPF right up to the remove() 
statement; when I step over it, it is locked.

I think I will try some other methods to remove it, maybe a dynalloc() with 
__DISP_DELETE followed by dynfree() will remove it without locking up the 
PDSE. Or maybe if I first allocate the PDSE with dynalloc and then remove() 
the member using the DDNAME, and then dynfree() the DDNAME; maybe that 
will work.

Thanks,

Etienne

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: C-I-C-S vs KICKS and screws

2010-07-27 Thread Maarten Slegtenhorst
We also say SNAH and KICKS in The Netherlands and during a course in Atlanta it 
took me a while to understand what was meant with C-I-C-S.

On the matter of screws:
I own a 91 Jeep Wrangler with a lot of torx screws and in time the torx-hole 
becomes a round hole.
Allan-screws are a bit better but still have the same problem.

I personally prefer hex-bolts.
Just too bad that Chrysler used both metric and inch sizes on my Jeep.



-- 
Maarten

-Oorspronkelijk bericht-
Van: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] Namens Mark 
Pace
Verzonden: maandag 26 juli 2010 19:44
Aan: IBM-MAIN@BAMA.UA.EDU
Onderwerp: Re: C-I-C-S vs KICKS

I had an SE many years ago that did say S-N-A as SNAH. Confused me every time. 
I've never heard anyone try to say R-J-E as a word.  What you you use, reggie?

-
ATTENTION:
The information in this electronic mail message is private and
confidential, and only intended for the addressee. Should you
receive this message by mistake, you are hereby notified that
any disclosure, reproduction, distribution or use of this
message is strictly prohibited. Please inform the sender by
reply transmission and delete the message without copying or
opening it.

Messages and attachments are scanned for all viruses known.
If this message contains password-protected attachments, the
files have NOT been scanned for viruses by the ING mail domain.
Always scan attachments before opening them.
-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


United Statesians (was C-I-C-S vs KICKS)

2010-07-27 Thread Bruce Hewson
Including of course south of the border!

I wonder how many know that Mexico is

The United States of Mexico   =   Estados Unidos Mexicanos

refer wiki   http://en.wikipedia.org/wiki/Mexico

which does not correctly identify the United States of America in the second 
sentence.


On Mon, 26 Jul 2010 06:52:38 -0600, Howard Brazee 
howard.bra...@cusys.edu wrote:

On 23 Jul 2010 18:24:26 -0700, zedgarhoo...@gmail.com (zMan) wrote:

That's OK, John, Ted was just repeating what I'd said many posts earlier. So
you can agree with me, and sleep at night.

P.S. I like United Statesians --  makes perfect sense!

It still isn't sufficient, there are other American countries with
names that start off with The United States of.



Regards
Bruce Hewson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread Steve Comstock

Barbara Nitz wrote:

No, it's 64K tracks.  It is the same per volume limit as many other
data set types (non-extended).  But PDSes and PDSEs are also limited
to a single volume.


I am surprised. I did not know about *those* limitations. And most certainly, 
since they are documented, there will be no way to change things.


But: I seem to remember that PDSEs were touted as the only ones making 
sense on an EAV, because of the 'extented' part of the name, and that they 
could get bigger (but maybe I misunderstood). Not that I would encourage use 
of such a large volume, as it is much too slow, and I still haven't opened an 
ETR to address 90s (or more) until ISPF 3.4 gives you the directory view. 
(Might end up on an ISPF queue, which would require me to open a complaint 
due to incompetence.)


PDSEs have only one advantage: They don't need to get compressed. The 
rest us a huge amount of disadvantages.


Regards, Barbara


Well, they do have at least one other advantage: they can store
program objects, which allows entry points with long, case-sensitive
names, which is sometimes handy.

--

Kind regards,

-Steve Comstock
The Trainer's Friend, Inc.

303-393-8716
http://www.trainersfriend.com

* To get a good Return on your Investment, first make an investment!
  + Training your people is an excellent investment

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: COBOL HLPI JCL sample needed

2010-07-27 Thread Peter Nuttall
DL/I means basically IMS  ... However I've not heard of HLPI :-( ... 
So can't help sorry ... 
 
 



Elardus Engelbrecht elardus.engelbre...@sita.co.za 
Sent by: IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu
27/07/2010 08:41 AM
Please respond to
IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu


To
IBM-MAIN@bama.ua.edu
cc

Subject
Re: COBOL HLPI JCL sample needed








Donald Johnson wrote:

Can someone help me by providing a sample batch JCL member to compile 
COBOL programs using HLPI for DL/I? 

Perhaps, if you could tell us what is HLPI and DL/I.

(I got a few vague hits in my bookmanager for DL/I, but nothing for HLPI.)

Groete / Greetings
Elardus Engelbrecht

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



This e-mail message, including any attachments transmitted with it, is 
CONFIDENTIAL and may contain legally privileged information. This message is 
intended solely for the use of the individual or entity to whom it is 
addressed. If you have received this message in error, please notify us 
immediately and delete it from your system. Please visit our website to read 
the full disclaimer: http://www.euroclear.com/site/public/disclaimer

Re: Another reason to hate PDSE's

2010-07-27 Thread R.S.

Steve Comstock pisze:

Barbara Nitz wrote:

[...]
PDSEs have only one advantage: They don't need to get compressed. The 
rest us a huge amount of disadvantages.


Regards, Barbara


Well, they do have at least one other advantage: they can store
program objects, which allows entry points with long, case-sensitive
names, which is sometimes handy.


While I could provide more PDSE advantages than Barbara, I would not 
mention long names.


Reason: I HAVE NEVER SEEN AN APPLICATION WHICH USES THEM. Long names are 
not handy for me. Of course I know, there are some... but not in 
operating system components.




--
Radoslaw Skorupka
Lodz, Poland


--
BRE Bank SA
ul. Senatorska 18
00-950 Warszawa
www.brebank.pl

Sd Rejonowy dla m. st. Warszawy 
XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, 
nr rejestru przedsibiorców KRS 025237

NIP: 526-021-50-88
Wedug stanu na dzie 01.01.2009 r. kapita zakadowy BRE Banku SA (w caoci 
wpacony) wynosi 118.763.528 zotych. W zwizku z realizacj warunkowego 
podwyszenia kapitau zakadowego, na podstawie uchway XXI WZ z dnia 16 marca 
2008r., oraz uchway XVI NWZ z dnia 27 padziernika 2008r., moe ulec 
podwyszeniu do kwoty 123.763.528 z. Akcje w podwyszonym kapitale zakadowym 
BRE Banku SA bd w caoci opacone.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: COBOL HLPI JCL sample needed

2010-07-27 Thread Terry Sambrooks
HI,

In response to the earlier posts:

Can someone help me by providing a sample batch JCL member to compile 
COBOL programs using HLPI for DL/I? 

Perhaps, if you could tell us what is HLPI and DL/I.

Historically DL/I was, and probably still is, the VSE equivalent of IMS DB
on z/OS. I suspect that HLPI is the acronym for High Level Programming
Interface.

Logically there is a stub in much the same way that there is for CICS and
DB2.

The IMS (DL/I) sample libraries should contain the skeleton of the JCL
required to perform the requisite compile and link.

Kind Regards - Terry
 
Director
KMS-IT Limited
228 Abbeydale Road South
Dore
Sheffield
S17 3LA
UK
 
Reg : 3767263
 
Outgoing e-mails have been scanned, but it is the recipients responsibility
to ensure their anti-virus software is up to date.
 
 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Please remove my name from the mailing list

2010-07-27 Thread Peter Nuttall
Mathew,

You obviously didn't read John M's previous note  The clue is to read 
the bottom of every post on this list and it tells you what to do ... 

As John said  'Youth of today eh ?'

Enjoy ... 
 



- Tibish Mathew tibish.mat...@wipro.com 
Sent by: IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu
26/07/2010 06:37 PM
Please respond to
IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu


To
IBM-MAIN@bama.ua.edu
cc

Subject
Please remove my name from the mailing list








 

 

Please do not print this email unless it is absolutely necessary. 

The information contained in this electronic message and any attachments 
to this message are intended for the exclusive use of the addressee(s) and 
may contain proprietary, confidential or privileged information. If you 
are not the intended recipient, you should not disseminate, distribute or 
copy this e-mail. Please notify the sender immediately and destroy all 
copies of this message and any attachments. 

WARNING: Computer viruses can be transmitted via email. The recipient 
should check this email and any attachments for the presence of viruses. 
The company accepts no liability for any damage caused by any virus 
transmitted by this email. 

www.wipro.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



This e-mail message, including any attachments transmitted with it, is 
CONFIDENTIAL and may contain legally privileged information. This message is 
intended solely for the use of the individual or entity to whom it is 
addressed. If you have received this message in error, please notify us 
immediately and delete it from your system. Please visit our website to read 
the full disclaimer: http://www.euroclear.com/site/public/disclaimer

Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread David Crayford

Etienne Thijsse wrote:
On Mon, 26 Jul 2010 12:23:10 -0500, Paul Gilmartin paulgboul...@aim.com 
wrote:


  

On Mon, 26 Jul 2010 11:02:24 -0500, Etienne Thijsse wrote:


If I use the C function remove() to remove a member from a PDSE, then from
that moment on, the PDSE is locked, ISPF says in use, I can't create a new
member in it using fopen() in the same program. The PDSE only gets 
  

unlocked
  

after the program has ended.

  

The C RTL is a moron.  It ought to use ISPF-style serialization
rather than doing a blanket RESERVE.  (I know; Shmuel will say
that wouldn't be safe.  Tell that to the ISPF designers.)

And it ought to know the rules are different for PDSEs.

If remove() fails to close the data set when it finishes, this
ought to be cause for a PMR.  But is there another stream that
might be holding the data set open?

-- gil



Thanks for responding, Gil. There is no other stream. When I run under the 
debugger, the PDSE remains accessible with ISPF right up to the remove() 
statement; when I step over it, it is locked.


I think I will try some other methods to remove it, maybe a dynalloc() with 
__DISP_DELETE followed by dynfree() will remove it without locking up the 
PDSE. Or maybe if I first allocate the PDSE with dynalloc and then remove() 
the member using the DDNAME, and then dynfree() the DDNAME; maybe that 
will work.


  


What is a real shame is that ISPF LMM services were not built on top of 
a services layer. In the 21st century the last
thing a programmer wants to do is hack about with assembler macros. 
SAS/C has a nice BSAM low-level layer
which has an osstow() function which is just what we need on z/OS. 
Unfortunately, it's time to RYO.




Thanks,

Etienne

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

  


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: COBOL HLPI JCL sample needed

2010-07-27 Thread Donald Johnson
Thanks Terry, in my stupor, I had forgotten to look in the IMS Sample libs.
I will check there and hopefully have that JCL. Your analysis was spot on,
by the way.

* dj *

On Tue, Jul 27, 2010 at 6:29 AM, Terry Sambrooks 
terry.sambro...@btclick.com wrote:

 HI,

 In response to the earlier posts:

 Can someone help me by providing a sample batch JCL member to compile
 COBOL programs using HLPI for DL/I?

 Perhaps, if you could tell us what is HLPI and DL/I.

 Historically DL/I was, and probably still is, the VSE equivalent of IMS DB
 on z/OS. I suspect that HLPI is the acronym for High Level Programming
 Interface.

 Logically there is a stub in much the same way that there is for CICS and
 DB2.

 The IMS (DL/I) sample libraries should contain the skeleton of the JCL
 required to perform the requisite compile and link.

 Kind Regards - Terry

 Director
 KMS-IT Limited
 228 Abbeydale Road South
 Dore
 Sheffield
 S17 3LA
 UK

 Reg : 3767263

 Outgoing e-mails have been scanned, but it is the recipients responsibility
 to ensure their anti-virus software is up to date.




 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread Etienne Thijsse
On Tue, 27 Jul 2010 19:02:19 +0800, David Crayford dcrayf...@gmail.com 
wrote:

Etienne Thijsse wrote:
 On Mon, 26 Jul 2010 12:23:10 -0500, Paul Gilmartin 
paulgboul...@aim.com
 wrote:


 On Mon, 26 Jul 2010 11:02:24 -0500, Etienne Thijsse wrote:

 If I use the C function remove() to remove a member from a PDSE, then 
from
 that moment on, the PDSE is locked, ISPF says in use, I can't create a 
new
 member in it using fopen() in the same program. The PDSE only gets

 unlocked

 after the program has ended.


 The C RTL is a moron.  It ought to use ISPF-style serialization
 rather than doing a blanket RESERVE.  (I know; Shmuel will say
 that wouldn't be safe.  Tell that to the ISPF designers.)

 And it ought to know the rules are different for PDSEs.

 If remove() fails to close the data set when it finishes, this
 ought to be cause for a PMR.  But is there another stream that
 might be holding the data set open?

 -- gil


 Thanks for responding, Gil. There is no other stream. When I run under the
 debugger, the PDSE remains accessible with ISPF right up to the remove()
 statement; when I step over it, it is locked.

 I think I will try some other methods to remove it, maybe a dynalloc() with
 __DISP_DELETE followed by dynfree() will remove it without locking up the
 PDSE. Or maybe if I first allocate the PDSE with dynalloc and then remove()
 the member using the DDNAME, and then dynfree() the DDNAME; maybe 
that
 will work.



What is a real shame is that ISPF LMM services were not built on top of
a services layer. In the 21st century the last
thing a programmer wants to do is hack about with assembler macros.
SAS/C has a nice BSAM low-level layer
which has an osstow() function which is just what we need on z/OS.
Unfortunately, it's time to RYO.



The previous version of our product was in fact written in SAS/C, and it did 
not have these problems; its PDS(E) support was a lot better. It had its own 
limitations, however, which forced us to go to the IBM compiler. Now I see 
myself faced with the task of implementing 'missing functionality', things that 
SAS/C could and IBM C can't.

Anyway, I tried the dynalloc way with __DISP_DELETE, but it throws away the 
whole PDSE, not just the member; I must be doing something wrong... still 
investigating. The other option, allocating the PDSE, then removing DDNAME:
(member) and dynfree the PDSE again works only partly: ISPF no longer 
reports the PDSE is in use, but fopen() to create a new member still fails.
If anyone has an idea about how this can be fixed, that would be great. Or 
maybe you know of another method...?

Thanks,

Etienne

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: C-I-C-S vs KICKS

2010-07-27 Thread Kelman, Tom
One type of screw head that I haven't seen mentioned here is the torx,
or hexalobular, head.  While the Philips screw was designed to cam out
of the screw to prevent overtightening, the torx screw, like the
Robertson screw, was designed to not cam out.  It came about as better
torque-limiting automatic screwdrivers were developed for use in
factories and is becoming more popular for use on items like
automobiles, bicycle brake systems, disk drive systems, computers, and
other consumer electronics.

Tom Kelman
Capacity Planning
Commerce Bank, Kansas City

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Dave Salt
Sent: Monday, July 26, 2010 5:23 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: C-I-C-S vs KICKS

 So what's the advantage in having both Allen and Robertson screws?
 They seem to do the same thing.

Allen keys are usually used at a 90 degree angle to the screw, which
means they work more like a wrench than a screwdriver. Having said that,
ratcheting screwdrivers can also be used in a wrench like fashion. I've
used both Allen and Robertson screws straight on as well as at 90 degree
angles, and in both cases I found Robertson much easier to work with. 

This brings up another advantage of Robertson screws, which is that they
can easily be screwed in at just about any angle. In comparison,
Phillips screws are difficult enough to screw in even when using them
straight on, and if the job requires trying to screw them in at any sort
of angle it becomes anything from highly frustrating to impossible. 

Robertson screws are not a new invention as they've been around for more
than 100 years. Henry Ford recognized their value and wanted to make
them in the U.S. but Robertson insisted he import them from Canada. So
Ford more or less said screw you (pun intended) and continued using
Phillips, even though Phillips are far inferior. Unfortunately it's been
stuck that way ever since, but it's not Robertson that's getting screwed
it's U.S. citizens.
 
Dave Salt

SimpList(tm) - try it; you'll get it! 

http://www.mackinney.com/products/program-development/simplist.html  

 


  
_
Learn more ways to connect with your buddies now
http://go.microsoft.com/?linkid=9734388
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


*
If you wish to communicate securely with Commerce Bank and its
affiliates, you must log into your account under Online Services at 
http://www.commercebank.com or use the Commerce Bank Secure
Email Message Center at https://securemail.commercebank.com

NOTICE: This electronic mail message and any attached files are
confidential. The information is exclusively for the use of the
individual or entity intended as the recipient. If you are not
the intended recipient, any use, copying, printing, reviewing,
retention, disclosure, distribution or forwarding of the message
or any attached file is not authorized and is strictly prohibited.
If you have received this electronic mail message in error, please
advise the sender by reply electronic mail immediately and
permanently delete the original transmission, any attachments
and any copies of this message from your computer system.
*

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: EMC Timefinder Snap and Dealloc

2010-07-27 Thread Igor Pavlyutenkov
Hi Lizette,

I think EMC gives us a choice with this parameter:

AUTOMATIC_DEALLOC|AUTO_DEAlloc(YES|NO)

The AUTOMATIC_DEALLOC parameter allows or disallows
automatic issuance of an S DEALLOC command to z/OS when a
device VARY ONLINE or VARY OFFLINE appears to be hung. z/OS
sometimes requires a job to go through allocation to handle these
situations.

Possible values are:

YES Allow TimeFinder to automatically issue an S DEALLOC.

NO Prevent TimeFinder from automatically issuing an S DEALLOC.

Comments
- The AUTOMATIC_DEALLOC parameter has a matching site
option, AUTODEAL. Table 13 on page 331 lists the site options.

- The AUTOMATIC_DEALLOC parameter only applies to locally
addressable volumes. AUTOMATIC_DEALLOC is ignored if you
specify it on actions with the SYMDV#, LOCAL or REMOTE
parameters.

Default value
YES

Example
AUTO_DEAL(NO)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Neon tries again to make a slap at IBM

2010-07-27 Thread Kelman, Tom
Well, this article is certainly a slam at Neon with this statement.

Neon Software is being a smart-alek by offering an IMS-only version of zPrime 
for $1, and it is a shameless means of growing what is still a pretty small 
installed base for the zPrime product.

And I love what they say at the end of the article.

Wouldn't it be funny if someone sold a tool that tweaked zPrime so it would 
then do the full gamut of mainframe offloading, as the full zPrime 2.1 does? 
There would be a certain kind of symmetry to that.

Neon isn't probably going very far with the zPrime product until they resolve 
the lawsuits with IBM.  Of course, the resolution would have to be in Neon's 
favor. I know that my company, for one, isn't going to get a product that has 
the possibility of being cut down in the courts.  It's just too big a business 
risk.

Tom Kelman


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Ed Gould
Sent: Monday, July 26, 2010 11:53 PM
To: IBM-MAIN@bama.ua.edu
Subject: Neon tries again to make a slap at IBM

http://www.channelregister.co.uk/2010/07/15/neon_zprime_ims/
Neon Software sells cut-down zPrime for IMSAlertPrint Post 
comment Retweet FacebookAccelerate flatfile mainframe databases for a buck
Outside of someone not understanding that IMS is not a flat file access,its not 
that far off.
http://www.channelregister.co.uk/2010/07/15/neon_zprime_ims/


  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


*
If you wish to communicate securely with Commerce Bank and its
affiliates, you must log into your account under Online Services at 
http://www.commercebank.com or use the Commerce Bank Secure
Email Message Center at https://securemail.commercebank.com

NOTICE: This electronic mail message and any attached files are
confidential. The information is exclusively for the use of the
individual or entity intended as the recipient. If you are not
the intended recipient, any use, copying, printing, reviewing,
retention, disclosure, distribution or forwarding of the message
or any attached file is not authorized and is strictly prohibited.
If you have received this electronic mail message in error, please
advise the sender by reply electronic mail immediately and
permanently delete the original transmission, any attachments
and any copies of this message from your computer system.
*

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: United Statesians (was C-I-C-S vs KICKS)

2010-07-27 Thread Kelman, Tom
So, what do we in the United States of America call ourselves.  We've
been called Americans, Americanos, or some other variation probably
every since we became a country.  However, I was in Bolivia one year and
when I said to one of the Bolivians that I was an American he said You
know that we're Americans also, and I thought You know, he's right.
There is a song Columbia, the Gem of the Ocean and another Hail,
Columbia which were unofficial national anthems until The Star
Spangled Banner became official.  Hail Columbia is still the official
song to announce the entry of the Vice President.  Maybe we should
change the name of the country to Columbia.  Oh, wait, that name is
already taken.

Tom Kelman


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Bruce Hewson
Sent: Tuesday, July 27, 2010 2:45 AM
To: IBM-MAIN@bama.ua.edu
Subject: United Statesians (was C-I-C-S vs KICKS)

Including of course south of the border!

I wonder how many know that Mexico is

The United States of Mexico   =   Estados Unidos Mexicanos

refer wiki   http://en.wikipedia.org/wiki/Mexico

which does not correctly identify the United States of America in the
second 
sentence.


On Mon, 26 Jul 2010 06:52:38 -0600, Howard Brazee 
howard.bra...@cusys.edu wrote:

On 23 Jul 2010 18:24:26 -0700, zedgarhoo...@gmail.com (zMan) wrote:

That's OK, John, Ted was just repeating what I'd said many posts
earlier. So
you can agree with me, and sleep at night.

P.S. I like United Statesians --  makes perfect sense!

It still isn't sufficient, there are other American countries with
names that start off with The United States of.



Regards
Bruce Hewson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


*
If you wish to communicate securely with Commerce Bank and its
affiliates, you must log into your account under Online Services at 
http://www.commercebank.com or use the Commerce Bank Secure
Email Message Center at https://securemail.commercebank.com

NOTICE: This electronic mail message and any attached files are
confidential. The information is exclusively for the use of the
individual or entity intended as the recipient. If you are not
the intended recipient, any use, copying, printing, reviewing,
retention, disclosure, distribution or forwarding of the message
or any attached file is not authorized and is strictly prohibited.
If you have received this electronic mail message in error, please
advise the sender by reply electronic mail immediately and
permanently delete the original transmission, any attachments
and any copies of this message from your computer system.
*

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


CFRM Structure Names

2010-07-27 Thread Richards, Robert B.
Does anyone have a comprehensive list of structure names and who uses them?

I am attempting to improve documentation and didn't want to reinvent the wheel 
if someone has already produced a list of most of them and their definitions.

Thanks in advance,

Bob

-
Robert B. Richards(Bob)
US Office of Personnel Management
1900 E Street NW Room: BH04L
Washington, D.C.  20415
Phone: (202) 606-1195
Email: robert.richa...@opm.govmailto:robert.richa...@opm.gov
-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: United Statesians (was C-I-C-S vs KICKS)

2010-07-27 Thread zMan
On Tue, Jul 27, 2010 at 3:44 AM, Bruce Hewson bruce_hew...@hotmail.comwrote:

 snip
 refer wiki   http://en.wikipedia.org/wiki/Mexico

 which does not correctly identify the United States of America in the
 second
 sentence.


So fix it...

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CFRM Structure Names

2010-07-27 Thread Vernooij, CP - SPLXM
Richards, Robert B. robert.richa...@opm.gov wrote in message
news:2d14e7856646224aacdda13ab1d355570a7020b...@wdcv7exvs2.opm.gov...
 Does anyone have a comprehensive list of structure names and who uses
them?
 
 I am attempting to improve documentation and didn't want to reinvent
the wheel if someone has already produced a list of most of them and
their definitions.
 
 Thanks in advance,
 
 Bob
 

Bob,
This may be a starting point for a great deal of them:
SA22-7625-17 MVS Setting Up a Sysplex (THE manual for all your sysplex
questions).
Ch. 4.7 Coupling Facility Structures for IBM Products
You have the IBM products using structures and pointers to the
individual documentation.

Kees.

For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
employees shall not be liable for the incorrect or incomplete transmission of 
this e-mail or any attachments, nor responsible for any delay in receipt. 
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: United Statesians (was C-I-C-S vs KICKS)

2010-07-27 Thread Maarten Slegtenhorst
Columbia should be just fine according to wikipedia! 
Col'o'mbia is already taken ;)

-
Columbia
From Wikipedia, the free encyclopedia
Not to be confused with Colombia, the country in South America.

Columbia (name) is a poetic name for America (in the sense of European 
colonies in the New World), and the feminine personification of the United 
States of America.
-


-- 
Maarten

-Oorspronkelijk bericht-
Van: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] Namens Kelman, 
Tom
Verzonden: dinsdag 27 juli 2010 14:50
Aan: IBM-MAIN@BAMA.UA.EDU
Onderwerp: Re: United Statesians (was C-I-C-S vs KICKS)

So, what do we in the United States of America call ourselves.  We've been 
called Americans, Americanos, or some other variation probably every since 
we became a country.  However, I was in Bolivia one year and when I said to one 
of the Bolivians that I was an American he said You know that we're Americans 
also, and I thought You know, he's right.
There is a song Columbia, the Gem of the Ocean and another Hail, Columbia 
which were unofficial national anthems until The Star Spangled Banner became 
official.  Hail Columbia is still the official song to announce the entry of 
the Vice President.  Maybe we should change the name of the country to 
Columbia.  Oh, wait, that name is already taken.

Tom Kelman

-
ATTENTION:
The information in this electronic mail message is private and
confidential, and only intended for the addressee. Should you
receive this message by mistake, you are hereby notified that
any disclosure, reproduction, distribution or use of this
message is strictly prohibited. Please inform the sender by
reply transmission and delete the message without copying or
opening it.

Messages and attachments are scanned for all viruses known.
If this message contains password-protected attachments, the
files have NOT been scanned for viruses by the ING mail domain.
Always scan attachments before opening them.
-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CFRM Structure Names

2010-07-27 Thread Mark Zelden
On Tue, 27 Jul 2010 08:53:38 -0400, Richards, Robert B.
robert.richa...@opm.gov wrote:

Does anyone have a comprehensive list of structure names and who uses them?

I am attempting to improve documentation and didn't want to reinvent the
wheel if someone has already produced a list of most of them and their
definitions.


The names are user defined and are pointed to by the exploiter via
parms.   XCF signaling structures must start with IXC, but I can't think
of other structures that have a similar requirement off the top of my
head.

Logstreams are another story, many of them have required names 
(OPERLOG, LOGREC, RRS for example), but I don't have a list for
those either.  Others like Health Checker are user defined and you
tell the exploiter what name to use.

For IBM exploiters perhaps the CFSIZER  web site can at least tell you 
who uses them.

http://www-947.ibm.com/systems/support/z/cfsizer/


Mark
--
Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS   
mailto:mzel...@flash.net  
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html 
Systems Programming expert at http://expertanswercenter.techtarget.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: I'm amazed

2010-07-27 Thread Arye Shemer
Hello,

I read the announcement and it is my understanding that at first only AIX
will be supported,
*But*, later availability announced for Linux on Intel based blades.

Am I correct ?

Arye.

On 27 July 2010 02:03, Gainsford, Allen allen.gainsf...@hp.com wrote:
 Which is more interesting ?-)

 No question.  Especially when the CICS one is really about
 screwdrivers. :)

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread Paul Gilmartin
On Tue, 27 Jul 2010 12:26:50 +0200, R.S. wrote:

Steve Comstock pisze:
 Barbara Nitz wrote:
[...]
 PDSEs have only one advantage: They don't need to get compressed. The
 rest us a huge amount of disadvantages.

 Regards, Barbara

And, I believe, multiple members can be written concurrently (I
believe; am I right?)  How would one do this?  Must one OPEN two or
more DCBs, one for each member being written?  And one might yet
wish to be able to append or update in place existing members.

 Well, they do have at least one other advantage: they can store
 program objects, which allows entry points with long, case-sensitive
 names, which is sometimes handy.

Steve, why would you call that an advantage?  I thought you despise
case-sensitivity.  Anyway, old fashioned PDSes allow case-sensitive
(but not long) member names; it's merely higher level interfaces that
try to conceal the case-sensitivity.  Would you advocate supporting
case-insensitivity at the DFSMS layer, similar to Windows?  Mac OS X
gives the programmer a choice with a granularity of volume.

While I could provide more PDSE advantages than Barbara, I would not
mention long names.

Reason: I HAVE NEVER SEEN AN APPLICATION WHICH USES THEM. Long names are
not handy for me. Of course I know, there are some... but not in
operating system components.

Isn't this a solution seeking a problem?  What interfaces support them?
Surely, one can't code // EXEC PGM=Case-sensitive-Long-name?  What about
ATTACH EP=Case-sensitive-Long-name?

What's the format of the word returned by NOTE for a PDSE.  It's
been discussed here that the low 24 bits contain the relative
record number within a member (biased by 0x10).  Do the top 8
bits then identify the member?  What happens, then, if a programmer
performs BLDL for 257 different members?  can the NOTE words
identify connections to all?  If one performs 2 BLDLs for the
same member, are the two returned pointers identical?

How do Unix directories compare?

o They don't need to be compressed.

o Multiple members can be written concurrently.

o Members can be appended or updated in place (with a granularity
  of byte.).

o They support long case-sensitive names.

o They allow a mixture of program objects and other member types.

Deficiencies:

o Alias entry points are not supported (AFAIK).

o The BPAM support is read-only (so far).

Questions:

o How do performance and reliablity compare with PDS[E]?  I suppose
  there might be four answers, separate for PDS vs. PDSE and for
  HFS vs. zFS.

o What is the limit on member size?

o What is the limit on number of members?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread Paul Gilmartin
On Tue, 27 Jul 2010 19:02:19 +0800, David Crayford wrote:

Etienne Thijsse wrote:

 Thanks for responding, Gil. There is no other stream. When I run under the
 debugger, the PDSE remains accessible with ISPF right up to the remove()
 statement; when I step over it, it is locked.

It's yet possible that there's an outstanding ENQ SHR due ta another
stream, or even an allocation in another job step.  remove() upgrades
this to EXC (bad design of C RTL; as you say, SAS (RIP) does better).
Then there's no way to downgrade it to SHR (bad design of GRS).

(BTW, what happens if you attempt the remove() while a different job
holds ENQ SHR on the DSN?)

What is a real shame is that ISPF LMM services were not built on top of
a services layer. In the 21st century the last
thing a programmer wants to do is hack about with assembler macros.
SAS/C has a nice BSAM low-level layer
which has an osstow() function which is just what we need on z/OS.
Unfortunately, it's time to RYO.

I thougnt ISPF services were available from Rexx address ISPEXEC
and various other languages via CALL.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread Etienne Thijsse
On Tue, 27 Jul 2010 08:47:30 -0500, Paul Gilmartin paulgboul...@aim.com 
wrote:

On Tue, 27 Jul 2010 19:02:19 +0800, David Crayford wrote:

Etienne Thijsse wrote:

 Thanks for responding, Gil. There is no other stream. When I run under the
 debugger, the PDSE remains accessible with ISPF right up to the remove()
 statement; when I step over it, it is locked.

It's yet possible that there's an outstanding ENQ SHR due ta another
stream, or even an allocation in another job step.  remove() upgrades
this to EXC (bad design of C RTL; as you say, SAS (RIP) does better).
Then there's no way to downgrade it to SHR (bad design of GRS).

(BTW, what happens if you attempt the remove() while a different job
holds ENQ SHR on the DSN?)

What is a real shame is that ISPF LMM services were not built on top of
a services layer. In the 21st century the last
thing a programmer wants to do is hack about with assembler macros.
SAS/C has a nice BSAM low-level layer
which has an osstow() function which is just what we need on z/OS.
Unfortunately, it's time to RYO.

I thougnt ISPF services were available from Rexx address ISPEXEC
and various other languages via CALL.


That may well be true. At this moment however, I know nothing about ISPF 
services or how to call them from C. I'll keep this in mind as a lost resort, 
if all 
else fails.
At the moment I am contemplating creating a separate executable, DELMBR, 
that will use remove() to delete it, thereby locking the PDSE, but when it 
finishes, the PDSE is unlocked. If I use system() to call this program then 
maybe the PDSE won't be locked when DELMBR finishes and fopen() 
succeeds... hopefully.

Thanks,

Etienne

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CFRM Structure Names

2010-07-27 Thread Richards, Robert B.
Kees,

I had that open when I asked the question! smile I was not very impressed. 
no smile

I attempted Google searches on some of them and was, again, a little 
disappointed.

Bob

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Vernooij, CP - SPLXM
Sent: Tuesday, July 27, 2010 9:17 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: CFRM Structure Names

Richards, Robert B. robert.richa...@opm.gov wrote in message
news:2d14e7856646224aacdda13ab1d355570a7020b...@wdcv7exvs2.opm.gov...
 Does anyone have a comprehensive list of structure names and who uses
them?

 I am attempting to improve documentation and didn't want to reinvent
the wheel if someone has already produced a list of most of them and
their definitions.

 Thanks in advance,

 Bob


Bob,
This may be a starting point for a great deal of them:
SA22-7625-17 MVS Setting Up a Sysplex (THE manual for all your sysplex
questions).
Ch. 4.7 Coupling Facility Structures for IBM Products
You have the IBM products using structures and pointers to the
individual documentation.

Kees.

For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message.

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
employees shall not be liable for the incorrect or incomplete transmission of 
this e-mail or any attachments, nor responsible for any delay in receipt.
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: C-I-C-S vs KICKS and screws

2010-07-27 Thread Howard Brazee
On 27 Jul 2010 00:03:45 -0700, maarten.slegtenho...@mail.ing.nl
(Maarten Slegtenhorst) wrote:

On the matter of screws:
I own a 91 Jeep Wrangler with a lot of torx screws and in time the torx-hole 
becomes a round hole.
Allan-screws are a bit better but still have the same problem.

I personally prefer hex-bolts.
Just too bad that Chrysler used both metric and inch sizes on my Jeep.

Hex bolts only work when we want to end up with a head sticking out.
Torx, Allen,  Robertson (and Phillips  flathead) can be flush.

But when they are appropriate, they work the best.I'm quite happy
with Allen for most everything else though.   The round-hole bit can
become a problem if people are sloppy.One nice thing is that a set
of Allen wrenches can be all in one tool, so we have all the sizes
without going back to the tool box - or without using the wrong size,
creating that round-hole problem.

Using an electric drill people can prefer Phillips - but a stripped
Phillips is worthless.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: I'm amazed

2010-07-27 Thread Howard Brazee
On 26 Jul 2010 14:27:44 -0700, ken.porow...@cit.com (Ken Porowski)
wrote:

IBM makes what is claimed to be the biggest Mainframe announcement in
decades and most of the traffic on this list is on the etymology of CICS
and PoPs

I love it.

It's not like I'm going out today to buy a new mainframe.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: I'm amazed

2010-07-27 Thread Ken Porowski
It may be that they don't have the management piece for Linux yet

Power7/AIX supported from November

xBlades/Linux support is only a statement of direction for 1st half 2011
Maybe when that comes out we'll see Power7/Linux 

-Original Message-
Kirk Wolf

On Mon, Jul 26, 2010 at 4:33 PM, Starr, Alan alan_st...@calpers.ca.gov
wrote:
 It would indeed be interesting to see discussion of this biggest
Mainframe announcement in decades.


 3) Is it sufficient to support AIX but not the other flavors of Unix
(if I read the announcement correctly)?

I also found this curious.  From what I understand, the Power7
BladeCenter runs both AIX and Linux:

http://www-03.ibm.com/systems/bladecenter/hardware/servers/ps700series/i
ndex.html

Why would Linux on Power be excluded?  (but not Linux on X64?)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: United Statesians (was C-I-C-S vs KICKS)

2010-07-27 Thread Howard Brazee
On 27 Jul 2010 05:51:04 -0700, thomas.kel...@commercebank.com (Kelman,
Tom) wrote:

So, what do we in the United States of America call ourselves. 

Our name is like the United Nations or the United Kingdom - a
description about what was wanted instead of a real name.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: C-I-C-S vs KICKS and screws

2010-07-27 Thread Scott Rowe
OH COME ON!
 
Can we PLEASE kill this thread, NOW?

 Howard Brazee howard.bra...@cusys.edu 7/27/2010 10:13 AM 
On 27 Jul 2010 00:03:45 -0700, maarten.slegtenho...@mail.ing.nl 
(Maarten Slegtenhorst) wrote:

On the matter of screws:
I own a 91 Jeep Wrangler with a lot of torx screws and in time the torx-hole 
becomes a round hole.
Allan-screws are a bit better but still have the same problem.

I personally prefer hex-bolts.
Just too bad that Chrysler used both metric and inch sizes on my Jeep.

Hex bolts only work when we want to end up with a head sticking out.
Torx, Allen,  Robertson (and Phillips  flathead) can be flush.

But when they are appropriate, they work the best.I'm quite happy
with Allen for most everything else though.   The round-hole bit can
become a problem if people are sloppy.One nice thing is that a set
of Allen wrenches can be all in one tool, so we have all the sizes
without going back to the tool box - or without using the wrong size,
creating that round-hole problem.

Using an electric drill people can prefer Phillips - but a stripped
Phillips is worthless.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html 



CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains 
confidential and privileged information intended only for the addressee.  If 
you are not the intended recipient, please be advised that you have received 
this material in error and that any forwarding, copying, printing, 
distribution, use or disclosure of the material is strictly prohibited.  If you 
have received this material in error, please (i) do not read it, (ii) reply to 
the sender that you received the message in error, and (iii) erase or destroy 
the material. Emails are not secure and can be intercepted, amended, lost or 
destroyed, or contain viruses. You are deemed to have accepted these risks if 
you communicate with us by email. Thank you.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CFRM Structure Names

2010-07-27 Thread Richards, Robert B.
Mark,

Thanks for the pointers. So far, my best source is the reason I am documenting 
them now: the paper called System-Managed CF Structure Duplexing. I am in the 
process of identifying what should/should not be duplexed and thought I would 
produce a document of those decisions. Most structures are obvious but, again, 
I was looking to save myself some work if others have already produced it. 

As an alternative, anyone care to send me their policy defs so I can compare 
what I think should be duplexed and what you already KNOW should and have it 
working?

Virtual beer to the first respondent. :-)

Bob


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Mark Zelden
Sent: Tuesday, July 27, 2010 9:31 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: CFRM Structure Names

On Tue, 27 Jul 2010 08:53:38 -0400, Richards, Robert B.
robert.richa...@opm.gov wrote:

Does anyone have a comprehensive list of structure names and who uses them?

I am attempting to improve documentation and didn't want to reinvent the
wheel if someone has already produced a list of most of them and their
definitions.


The names are user defined and are pointed to by the exploiter via
parms.   XCF signaling structures must start with IXC, but I can't think
of other structures that have a similar requirement off the top of my
head.

Logstreams are another story, many of them have required names 
(OPERLOG, LOGREC, RRS for example), but I don't have a list for
those either.  Others like Health Checker are user defined and you
tell the exploiter what name to use.

For IBM exploiters perhaps the CFSIZER  web site can at least tell you 
who uses them.

http://www-947.ibm.com/systems/support/z/cfsizer/


Mark
--
Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS   
mailto:mzel...@flash.net  
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html 
Systems Programming expert at http://expertanswercenter.techtarget.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CFRM Structure Names

2010-07-27 Thread Vernooij, CP - SPLXM
Did I get the VB?

We don't have any structures system managed duplexed because of the
distance between de CF's in both our data centers.

Kees.


Richards, Robert B. robert.richa...@opm.gov wrote in message
news:2d14e7856646224aacdda13ab1d355570a7020b...@wdcv7exvs2.opm.gov...
 Mark,
 
 Thanks for the pointers. So far, my best source is the reason I am
documenting them now: the paper called System-Managed CF Structure
Duplexing. I am in the process of identifying what should/should not be
duplexed and thought I would produce a document of those decisions. Most
structures are obvious but, again, I was looking to save myself some
work if others have already produced it. 
 
 As an alternative, anyone care to send me their policy defs so I can
compare what I think should be duplexed and what you already KNOW should
and have it working?
 
 Virtual beer to the first respondent. :-)
 
 Bob
 
 
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Mark Zelden
 Sent: Tuesday, July 27, 2010 9:31 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: CFRM Structure Names
 
 On Tue, 27 Jul 2010 08:53:38 -0400, Richards, Robert B.
 robert.richa...@opm.gov wrote:
 
 Does anyone have a comprehensive list of structure names and who uses
them?
 
 I am attempting to improve documentation and didn't want to reinvent
the
 wheel if someone has already produced a list of most of them and their
 definitions.
 
 
 The names are user defined and are pointed to by the exploiter via
 parms.   XCF signaling structures must start with IXC, but I can't
think
 of other structures that have a similar requirement off the top of my
 head.
 
 Logstreams are another story, many of them have required names 
 (OPERLOG, LOGREC, RRS for example), but I don't have a list for
 those either.  Others like Health Checker are user defined and you
 tell the exploiter what name to use.
 
 For IBM exploiters perhaps the CFSIZER  web site can at least tell you

 who uses them.
 
 http://www-947.ibm.com/systems/support/z/cfsizer/
 
 
 Mark
 --
 Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS   
 mailto:mzel...@flash.net  
 Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html 
 Systems Programming expert at
http://expertanswercenter.techtarget.com/
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
employees shall not be liable for the incorrect or incomplete transmission of 
this e-mail or any attachments, nor responsible for any delay in receipt. 
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread Paul Gilmartin
On Tue, 27 Jul 2010 09:01:46 -0500, Etienne Thijsse wrote:

That may well be true. At this moment however, I know nothing about ISPF
services or how to call them from C. I'll keep this in mind as a lost resort, 
if all
else fails.

The best I can say is that it's in the book.

At the moment I am contemplating creating a separate executable, DELMBR,
that will use remove() to delete it, thereby locking the PDSE, but when it
finishes, the PDSE is unlocked. If I use system() to call this program then
maybe the PDSE won't be locked when DELMBR finishes and fopen()
succeeds... hopefully.

Is your C program holding an ENQ SHR on the DSN?  You can probe this
prior to the remove() by submitting a batch job that attempts to
allocate the PDSE with DISP=OLD.  If you hold the ENQ SHR, then:

o If system(DELMBR) runs in the same address space, it will upgrade
  the ENQ to EXC and leave the PDSE locked.

o If system(DELMBR) runs in a separate address space, it will attempt
  to obtain an ENQ EXC and fail.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CFRM Structure Names

2010-07-27 Thread Richards, Robert B.
Yes, you were the first respondent. I should have made it an offline request 
*and* the actual define policy JCL!  :-)

Bob


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Vernooij, CP - SPLXM
Sent: Tuesday, July 27, 2010 10:41 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: CFRM Structure Names

Did I get the VB?

We don't have any structures system managed duplexed because of the
distance between de CF's in both our data centers.

Kees.


Richards, Robert B. robert.richa...@opm.gov wrote in message
news:2d14e7856646224aacdda13ab1d355570a7020b...@wdcv7exvs2.opm.gov...
 Mark,
 
 Thanks for the pointers. So far, my best source is the reason I am
documenting them now: the paper called System-Managed CF Structure
Duplexing. I am in the process of identifying what should/should not be
duplexed and thought I would produce a document of those decisions. Most
structures are obvious but, again, I was looking to save myself some
work if others have already produced it. 
 
 As an alternative, anyone care to send me their policy defs so I can
compare what I think should be duplexed and what you already KNOW should
and have it working?
 
 Virtual beer to the first respondent. :-)
 
 Bob
 
 
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Mark Zelden
 Sent: Tuesday, July 27, 2010 9:31 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: CFRM Structure Names
 
 On Tue, 27 Jul 2010 08:53:38 -0400, Richards, Robert B.
 robert.richa...@opm.gov wrote:
 
 Does anyone have a comprehensive list of structure names and who uses
them?
 
 I am attempting to improve documentation and didn't want to reinvent
the
 wheel if someone has already produced a list of most of them and their
 definitions.
 
 
 The names are user defined and are pointed to by the exploiter via
 parms.   XCF signaling structures must start with IXC, but I can't
think
 of other structures that have a similar requirement off the top of my
 head.
 
 Logstreams are another story, many of them have required names 
 (OPERLOG, LOGREC, RRS for example), but I don't have a list for
 those either.  Others like Health Checker are user defined and you
 tell the exploiter what name to use.
 
 For IBM exploiters perhaps the CFSIZER  web site can at least tell you

 who uses them.
 
 http://www-947.ibm.com/systems/support/z/cfsizer/
 
 
 Mark
 --
 Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS   
 mailto:mzel...@flash.net  
 Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html 
 Systems Programming expert at
http://expertanswercenter.techtarget.com/
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
employees shall not be liable for the incorrect or incomplete transmission of 
this e-mail or any attachments, nor responsible for any delay in receipt. 
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Synchronizing the IOCDS and the DS6800

2010-07-27 Thread Schwarz, Barry A
We are installing a new z10 with a minimal DS6800 in a very small data center 
(to replace our venerable MP2003).  Using the SMC, we have configured the 
DS6800 with RAID 5 to give us 250GB of usable storage set up as eleven 3390-3s 
and the rest as 3390-9s.  (We wanted to use RAID 10 but the system insisted on 
keeping two of the DDMs in reserve so we ended up with only 125GB which is not 
sufficient.)

I am using the Stand Alone IOCP on the z10 HMC to build the IOCDS.  I have 
looked at every DS6800, HMC, IOCP, and HCD manual I could find but I cannot 
find any description of how the ADDRESS operand on the IODEVICE statement 
relates to the logical volumes on the DS6800.  I have the same problem relating 
the CUNUMBER and CUADD operands on the CTLUNIT statement to the physical and 
logical control units on the DS6800.

The Customs Offering Driver manual (GI11-2843-04) shows 3390 devices at 
addresses D40-D5F.  Obviously I'm missing something but I see no method of 
assigning those addresses on the DS6800.  A pointer to the relevant section of 
a manual would be greatly appreciated.  Suggestions on how to use RAID 10 would 
also be welcome.

Thank you

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread Chris Craddock


 PDSEs have only one advantage: snip


 Well, they do have at least one other advantage: they can store
 program objects, which allows entry points with long, case-sensitive
 names, which is sometimes handy.
 http://bama.ua.edu/archives/ibm-main.html



No not really. Longer names may be contained within the program object, e.g.
CALL someverylongname and the binder will make sense of it. External
entrypoints (those that could be used by ATTACH, LINK etc.) are still only 8
bytes long.



-- 
This email might be from the
artist formerly known as CC
(or not) You be the judge.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Any ROT for DASD Response time

2010-07-27 Thread Hal Merritt
See imbedded.

Hal 
 

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Ron Hawkins
Sent: Thursday, July 22, 2010 10:54 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Any ROT for DASD Response time

Hal,

I should have been clear. The statement I disagreed with is:

 It does not really matter what the response times are, 
the issue is that they are too slow

I'm not sure where I can agree with you, and I still fail to see how near 
perfect response time can be too slow. 

 If the DASD is delivering near perfect response times, then it can't go 
 faster. If that's still not fast enough, then one -must- address I/O 
 reduction. War story: most loved online was hitting a ceiling and just 
 wouldn't scale past a specific transaction load. The cause was traced to a 
 single checkpoint dataset. The fastest hardware available was brought in 
 but it was not fast enough. The very reluctant, politically powerful 
 support team was forced to address the I/O to that dataset. A relatively 
 minor change solved the problem. The point is that making application 
 changes may meet with a -lot- of resistance, but ya gotta do whatcha gotta 
 do. To be fair, -any- change to that application was a medium to high risk. 
  
  

Any volume averaging 0.3ms response time is pretty close to zero delay, where a 
delay is something queued or waiting. I'm not sure why you don't believe this. 

 The OP reported measurable delays. Therefore, it was unlikely the DASD was 
 delivering optimal response times.


..snip

I believe Response time does matter because it is a guide to the action 
required. It just should not be considered as the only metric that decides if 
IO is delaying an application. 

 That's the key point putting us into substantial agreement.  
  
 

..snip

Ron




 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of
 Hal Merritt
 Sent: Thursday, July 22, 2010 7:49 AM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: [IBM-MAIN] Any ROT for DASD Response time
 
 Short answer: yes. And you go on to agree. Let's take a look at the OP's
 issue: Not meeting SLA's. A logical first place to look is DASD, and we find
 'delays'. What kind of delay and how long of a delay we don't know.
 
 The question is how long of a delay is normal and to be expected. A ROT for an
 acceptable range. I find it a little hard to believe that a DASD subsystem can
 deliver 0.3ms response times with measurable delays. Therefore, IMHO, any
 measurable delay should be investigated and, if feasible, reduced. To zero.
 
 Of course, I/O avoidance is almost always something we want to consider. But
 that does not address the OP's question.
 
 
 
NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread Etienne Thijsse
On Tue, 27 Jul 2010 09:47:15 -0500, Paul Gilmartin paulgboul...@aim.com 
wrote:

On Tue, 27 Jul 2010 09:01:46 -0500, Etienne Thijsse wrote:

That may well be true. At this moment however, I know nothing about ISPF
services or how to call them from C. I'll keep this in mind as a lost resort, 
if 
all
else fails.

The best I can say is that it's in the book.

At the moment I am contemplating creating a separate executable, DELMBR,
that will use remove() to delete it, thereby locking the PDSE, but when it
finishes, the PDSE is unlocked. If I use system() to call this program then
maybe the PDSE won't be locked when DELMBR finishes and fopen()
succeeds... hopefully.

Is your C program holding an ENQ SHR on the DSN?  You can probe this
prior to the remove() by submitting a batch job that attempts to
allocate the PDSE with DISP=OLD.  If you hold the ENQ SHR, then:

o If system(DELMBR) runs in the same address space, it will upgrade
  the ENQ to EXC and leave the PDSE locked.

o If system(DELMBR) runs in a separate address space, it will attempt
  to obtain an ENQ EXC and fail.


Any idea how to get rid of this ENQ SHR ?

Thanks,

Etienne

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Synchronizing the IOCDS and the DS6800

2010-07-27 Thread Hal Merritt
IIRC, the relationship is implicit. The first ADDRESS refers to the first 
logical volume, the second ADDRESS is the second logical volume, and so on. 

This can get tricky if you delete a logical volume.  

HTH and good luck

 


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Schwarz, Barry A
Sent: Tuesday, July 27, 2010 10:05 AM
To: IBM-MAIN@bama.ua.edu
Subject: Synchronizing the IOCDS and the DS6800

We are installing a new z10 with a minimal DS6800 in a very small data center 
(to replace our venerable MP2003).  Using the SMC, we have configured the 
DS6800 with RAID 5 to give us 250GB of usable storage set up as eleven 3390-3s 
and the rest as 3390-9s.  (We wanted to use RAID 10 but the system insisted on 
keeping two of the DDMs in reserve so we ended up with only 125GB which is not 
sufficient.)

I am using the Stand Alone IOCP on the z10 HMC to build the IOCDS.  I have 
looked at every DS6800, HMC, IOCP, and HCD manual I could find but I cannot 
find any description of how the ADDRESS operand on the IODEVICE statement 
relates to the logical volumes on the DS6800.  I have the same problem relating 
the CUNUMBER and CUADD operands on the CTLUNIT statement to the physical and 
logical control units on the DS6800.

The Customs Offering Driver manual (GI11-2843-04) shows 3390 devices at 
addresses D40-D5F.  Obviously I'm missing something but I see no method of 
assigning those addresses on the DS6800.  A pointer to the relevant section of 
a manual would be greatly appreciated.  Suggestions on how to use RAID 10 would 
also be welcome.

Thank you

 
NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: CFRM Structure Names

2010-07-27 Thread Scott Rowe
Who would want a VIRTUAL beer anyway, they are not anywhere near as good as the 
real thing!

 Richards, Robert B. robert.richa...@opm.gov 7/27/2010 10:59 AM 
Yes, you were the first respondent. I should have made it an offline request 
*and* the actual define policy JCL!  :-)

Bob


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Vernooij, CP - SPLXM
Sent: Tuesday, July 27, 2010 10:41 AM
To: IBM-MAIN@bama.ua.edu 
Subject: Re: CFRM Structure Names

Did I get the VB?

We don't have any structures system managed duplexed because of the
distance between de CF's in both our data centers.

Kees.


Richards, Robert B. robert.richa...@opm.gov wrote in message
news:2d14e7856646224aacdda13ab1d355570a7020b...@wdcv7exvs2.opm.gov...
 Mark,
 
 Thanks for the pointers. So far, my best source is the reason I am
documenting them now: the paper called System-Managed CF Structure
Duplexing. I am in the process of identifying what should/should not be
duplexed and thought I would produce a document of those decisions. Most
structures are obvious but, again, I was looking to save myself some
work if others have already produced it. 
 
 As an alternative, anyone care to send me their policy defs so I can
compare what I think should be duplexed and what you already KNOW should
and have it working?
 
 Virtual beer to the first respondent. :-)
 
 Bob
 
 
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Mark Zelden
 Sent: Tuesday, July 27, 2010 9:31 AM
 To: IBM-MAIN@bama.ua.edu 
 Subject: Re: CFRM Structure Names
 
 On Tue, 27 Jul 2010 08:53:38 -0400, Richards, Robert B.
 robert.richa...@opm.gov wrote:
 
 Does anyone have a comprehensive list of structure names and who uses
them?
 
 I am attempting to improve documentation and didn't want to reinvent
the
 wheel if someone has already produced a list of most of them and their
 definitions.
 
 
 The names are user defined and are pointed to by the exploiter via
 parms.   XCF signaling structures must start with IXC, but I can't
think
 of other structures that have a similar requirement off the top of my
 head.
 
 Logstreams are another story, many of them have required names 
 (OPERLOG, LOGREC, RRS for example), but I don't have a list for
 those either.  Others like Health Checker are user defined and you
 tell the exploiter what name to use.
 
 For IBM exploiters perhaps the CFSIZER  web site can at least tell you

 who uses them.
 
 http://www-947.ibm.com/systems/support/z/cfsizer/ 
 
 
 Mark
 --
 Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS   
 mailto:mzel...@flash.net  
 Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html 
 Systems Programming expert at
http://expertanswercenter.techtarget.com/ 
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html 
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html 

For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
employees shall not be liable for the incorrect or incomplete transmission of 
this e-mail or any attachments, nor responsible for any delay in receipt. 
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The Netherlands, with registered number 
33014286


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives 

IBMLink REMINDER: SRD Order Delivery Servers firewalls may need to be updated

2010-07-27 Thread Knutson, Sam
Hi,

One of our teams recently had difficulty downloading PTFs and again we
traced it back to servers that were in use by IBMLink that were not in
our firewall. 

We complained that we had not been notified of changes.  This was
acknowledged and an IBMLink news item was posted (PMR# 50090,487)

REMINDER: SRD Order Delivery Servers 
This is just a reminder to ServiceLink users that the FTP servers which
host orders for SRD that are delivered via INET were changed earlier
this year. Please make sure that your corporate and/or personal firewall
settings are adjusted accordingly. The current delivery servers and
their IP addresses are as follows: 
delivery01-bld.dhe.ibm.com: 170.225.15.101  129.35.224.101
delivery01-mul.dhe.ibm.com: 129.35.224.102  170.225.15.102
download1.boulder.ibm.com : 170.225.15.106
download1.mul.ie.ibm.com : 129.35.224.106


An IBMLINK news item is posted now to provide the formal notification of
the new sites, however, this appears to have happened several months ago

and I can find no formal warning, like the October 2009 notifications.


In regulated institution it is normal for firewall committees to keep a
tight rein on the IP access list changes.  We need fair notification to
allow time to make these changes.  

Did anyone else miss this?  I still cannot find a previous notification.


Best Regards, 

Sam Knutson, GEICO 
System z Team Leader 
mailto:sknut...@geico.com 
(office)  301.986.3574 
(cell) 301.996.1318

  
See how much YOU could save with GEICO!  Use Referral Code: 61033 
*Start Quote Now: http://www.geico.com/friends 






This email/fax message is for the sole use of the intended
recipient(s) and may contain confidential and privileged information.
Any unauthorized review, use, disclosure or distribution of this
email/fax is prohibited. If you are not the intended recipient, please
destroy all paper and electronic copies of the original message.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread Paul Gilmartin
On Tue, 27 Jul 2010 10:15:11 -0500, Etienne Thijsse wrote:

Any idea how to get rid of this ENQ SHR ?

Have you verified that there's an outstanding ENQ?

Use the TSO command FREE DSN(whatever.dsn) or equivalent call to
DYNALLOC or BPXWDYN.

Use TSO LISTALC STATUS SYSNAMES and find the DDNAME and FREE that.

You probably don't want to do any of those.  It's not nice to
deceive the C RTL.  FREE will fail if there's a DCB open on
the DDNAME.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Synchronizing the IOCDS and the DS6800

2010-07-27 Thread Michael Saraco
Hope this helps if you need I can send IOCDS input file as a guide. This 
is a DS6800 setup

 CNTLUNIT CUNUMBR=3000,PATH=((CSS(0),D2,D3,D4,D5)),*
   UNITADD=((00,256)),CUADD=0,UNIT=1750
 IODEVICE ADDRESS=(3000,256),CUNUMBR=(3000),STADET=Y,UNIT=3390
 CNTLUNIT CUNUMBR=3100,PATH=((CSS(0),D2,D3,D4,D5)),*
   UNITADD=((00,256)),CUADD=1,UNIT=1750
 IODEVICE ADDRESS=(3100,256),CUNUMBR=(3100),STADET=Y,UNIT=3390
 CNTLUNIT CUNUMBR=3200,PATH=((CSS(0),D2,D3,D4,D5)),*
   UNITADD=((00,256)),CUADD=2,UNIT=1750
 IODEVICE ADDRESS=(3200,256),CUNUMBR=(3200),STADET=Y,UNIT=3390
 CNTLUNIT CUNUMBR=3300,PATH=((CSS(0),D2,D3,D4,D5)),*
   UNITADD=((00,256)),CUADD=3,UNIT=1750
 IODEVICE ADDRESS=(3300,256),CUNUMBR=(3300),STADET=Y,UNIT=3390


Michael Saraco
Systems Consultant
303-838-3374  x115
Cell 507-525-0530



From:   Hal Merritt hmerr...@jackhenry.com
To: IBM-MAIN@bama.ua.edu
Date:   07/27/2010 10:26 AM
Subject:Re: Synchronizing the IOCDS and the DS6800
Sent by:IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu



IIRC, the relationship is implicit. The first ADDRESS refers to the first 
logical volume, the second ADDRESS is the second logical volume, and so 
on. 

This can get tricky if you delete a logical volume. 

HTH and good luck

 


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On 
Behalf Of Schwarz, Barry A
Sent: Tuesday, July 27, 2010 10:05 AM
To: IBM-MAIN@bama.ua.edu
Subject: Synchronizing the IOCDS and the DS6800

We are installing a new z10 with a minimal DS6800 in a very small data 
center (to replace our venerable MP2003).  Using the SMC, we have 
configured the DS6800 with RAID 5 to give us 250GB of usable storage set 
up as eleven 3390-3s and the rest as 3390-9s.  (We wanted to use RAID 10 
but the system insisted on keeping two of the DDMs in reserve so we ended 
up with only 125GB which is not sufficient.)

I am using the Stand Alone IOCP on the z10 HMC to build the IOCDS.  I have 
looked at every DS6800, HMC, IOCP, and HCD manual I could find but I 
cannot find any description of how the ADDRESS operand on the IODEVICE 
statement relates to the logical volumes on the DS6800.  I have the same 
problem relating the CUNUMBER and CUADD operands on the CTLUNIT statement 
to the physical and logical control units on the DS6800.

The Customs Offering Driver manual (GI11-2843-04) shows 3390 devices at 
addresses D40-D5F.  Obviously I'm missing something but I see no method of 
assigning those addresses on the DS6800.  A pointer to the relevant 
section of a manual would be greatly appreciated.  Suggestions on how to 
use RAID 10 would also be welcome.

Thank you

 
NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The 
message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 

immediately advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html





--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: getting NJE node name

2010-07-27 Thread Andy Robertson
yes, very much thanks


  Andy Robertson   telephone mobile 0777 214 9545 home 01308 420797

From: Charles Mills charl...@mcn.org
Does the following fragment help?

*
*  INFORMATION RETRIEVED FROM JES VIA IEFSSREQ
 LAR1,ASSOB
 MVC   RVDERMAC,=CL8'IEFSSREQ'
 IEFSSREQ ,
snip

**
This email is confidential and may contain copyright material of the John Lewis 
Partnership. 
If you are not the intended recipient, please notify us immediately and delete 
all copies of this message. 
(Please note that it is your responsibility to scan this message for viruses). 
Email to and from the
John Lewis Partnership is automatically monitored for operational and lawful 
business reasons.
**

John Lewis plc
Registered in England 233462
Registered office 171 Victoria Street London SW1E 5NN
 
Websites: http://www.johnlewis.com 
http://www.waitrose.com 
http://www.greenbee.com
http://www.johnlewispartnership.co.uk
 
**

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread Etienne Thijsse
On Tue, 27 Jul 2010 10:47:07 -0500, Paul Gilmartin paulgboul...@aim.com 
wrote:

On Tue, 27 Jul 2010 10:15:11 -0500, Etienne Thijsse wrote:

Any idea how to get rid of this ENQ SHR ?

Have you verified that there's an outstanding ENQ?

Use the TSO command FREE DSN(whatever.dsn) or equivalent call to
DYNALLOC or BPXWDYN.

Use TSO LISTALC STATUS SYSNAMES and find the DDNAME and FREE that.

You probably don't want to do any of those.  It's not nice to
deceive the C RTL.  FREE will fail if there's a DCB open on
the DDNAME.

-- gil


There is a SYS00035 DDNAME associated with the PDSE, but freeing it with 
dynfree gave me error 4 reason 1056, which means the dataset hasn't been 
closed. :-(

So that didn't work...

Thanks,

Etienne

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread Paul Gilmartin
On Tue, 27 Jul 2010 11:35:24 -0500, Etienne Thijsse wrote:

There is a SYS00035 DDNAME associated with the PDSE, but freeing it with
dynfree gave me error 4 reason 1056, which means the dataset hasn't been
closed. :-(

So that didn't work...

Was it SHR?  Why does C RTL have it OPEN?  (It's probably only
trying to help you.)

Thinking of it, ISPF is probably bad advice.  You'd need to be
running under ISPF, which means you'd need to be running under
TSO, which means you'd need to be running APF authorized.  PITA.

I hate MVS!

I tried an experiment.  It appears that FTP can delete a member
while a PDS (I didn't try PDSE) is allocated SHR.  Can you FTP
LOCALHOST from your C program?

Have you considered z/OS Unix files as an alternative to PDSE?
Even though it is MVS, it's remarkably free of the allocation
mickeymouse.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread Paul Gilmartin
On Mon, 26 Jul 2010 17:57:07 +, Ted MacNEIL wrote:

I don't even like ordinary PDS.   Other operating systems don't need them.

That doesn't make them wrong.
There are some implementation flaws, but they exist, so use them, and know 
flaws and repairs.

If you don't understand what's wrong with PDS, re-read Etienne Thijsse's
thread on attempting to delete a PDSE member.  Or imagine my astonished
dismay the first time I allocated a member with DISP=(OLD,DELETE) and
watched the entire PDS vanish.  Enough counterintuitive behaviors and flaws
with recondite repairs add up to wrong.

PS: Can you spell DLL?

Nobody's perfect; that's no excuse.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread Etienne Thijsse
On Tue, 27 Jul 2010 11:50:35 -0500, Paul Gilmartin paulgboul...@aim.com 
wrote:

On Tue, 27 Jul 2010 11:35:24 -0500, Etienne Thijsse wrote:

There is a SYS00035 DDNAME associated with the PDSE, but freeing it with
dynfree gave me error 4 reason 1056, which means the dataset hasn't been
closed. :-(

So that didn't work...

Was it SHR?  Why does C RTL have it OPEN?  (It's probably only
trying to help you.)

Thinking of it, ISPF is probably bad advice.  You'd need to be
running under ISPF, which means you'd need to be running under
TSO, which means you'd need to be running APF authorized.  PITA.

I hate MVS!

I tried an experiment.  It appears that FTP can delete a member
while a PDS (I didn't try PDSE) is allocated SHR.  Can you FTP
LOCALHOST from your C program?

Have you considered z/OS Unix files as an alternative to PDSE?
Even though it is MVS, it's remarkably free of the allocation
mickeymouse.


Its not SHR. I think because remove() has to update its directory. Why it is 
left open... beats me. Maybe because a subsequent remove() or rename() will 
go faster... (rename() has the same problem, by the way).

APF authorized is bad. The program must be able to run without. So no ISPF... 
FTP is a nice twist :-) that may work (although performance will suck.., but 
beter something than nothing).

Unix files work fine, I know. But I need to enable everything that worked in 
the previous version, the SAS/C one, which version worked fine with PDS's 
and PDSE's, but did not support Unix files. People that upgrade to the new 
version I am working on won't like it if I was to tell them PDS's are not 
supported anymore...

Thanks,

Etienne

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Etienne Thijsse
Sent: Tuesday, July 27, 2010 12:09 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: remove() of PDSE member leaves PDS locked

On Tue, 27 Jul 2010 11:50:35 -0500, Paul Gilmartin
paulgboul...@aim.com 
wrote:

SNIPPAGE
Thinking of it, ISPF is probably bad advice.  You'd need to be
running under ISPF, which means you'd need to be running under
TSO, which means you'd need to be running APF authorized.  PITA.
SNIPPAGE

APF authorized is bad. The program must be able to run without. So no
ISPF... 
FTP is a nice twist :-) that may work (although performance will suck..,
but 
beter something than nothing).

SNIPPAGE

If you run under ISPF, you do not have to be APF authorized. You don't
even have to run from an APF library. 

When you invoke PDF services (now integral to ISPF, right?), the service
communicates with ISPF as needed and so the cross-over between the TCB
you are running under (applications run as a daughter task to ISPF as I
recall) and ISPF will deal with authorization issues.

SO, you can use ISPF services in a TSO Batch environment (or online for
that matter). And probably get done what you need to do.

Regards,
Steve Thompson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread Etienne Thijsse
On Tue, 27 Jul 2010 13:49:30 -0400, Thompson, Steve 
steve_thomp...@stercomm.com wrote:

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Etienne Thijsse
Sent: Tuesday, July 27, 2010 12:09 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: remove() of PDSE member leaves PDS locked

On Tue, 27 Jul 2010 11:50:35 -0500, Paul Gilmartin
paulgboul...@aim.com
wrote:

SNIPPAGE
Thinking of it, ISPF is probably bad advice.  You'd need to be
running under ISPF, which means you'd need to be running under
TSO, which means you'd need to be running APF authorized.  PITA.
SNIPPAGE

APF authorized is bad. The program must be able to run without. So no
ISPF...
FTP is a nice twist :-) that may work (although performance will suck..,
but
beter something than nothing).

SNIPPAGE

If you run under ISPF, you do not have to be APF authorized. You don't
even have to run from an APF library.

When you invoke PDF services (now integral to ISPF, right?), the service
communicates with ISPF as needed and so the cross-over between the TCB
you are running under (applications run as a daughter task to ISPF as I
recall) and ISPF will deal with authorization issues.

SO, you can use ISPF services in a TSO Batch environment (or online for
that matter). And probably get done what you need to do.

Regards,
Steve Thompson


That is interesting, but requiring the program to run under ISPF just so I can 
delete a PDSE member without locking it seems overkill a cannon to kill a 
fly. There must be a simpler way...

Thanks anyway,

Etienne

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Synchronizing the IOCDS and the DS6800

2010-07-27 Thread Pommier, Rex R.
Barry,

I don't know if this will help or not.  The DS6800 installation,
troubleshooting and recovery guide goes through building out the storage
on the array.  Unfortunately it leaves a bit to be desired on how to
tie this to z-boxes.  GC26-7678 (I have -08 generation) is the manual
and chapter 7 is where I found the info 4 years ago when I put ours in.

When you define the LCUs on the 6800 you need to give them LCU IDs as
well as SSIDs.  I BELIEVE the LCU ID corresponds to the CUADD field in
the IOCDS CU definitions.  

As far as defining the actual addresses on the 6800 to addresses in your
IOCDS, when you define the volumes on the 6800, you tell it which LCU
you want the volumes put into, then when you either give it the base
address and range (or allow it to default to the lowest number
available) you are in essence giving it the address the Z will see.


For example, on my 6800, I have LCUs 0-3. I have disk defined on each of
the LCUs that have range 00-1E on LCU 0, 00-0D each on LCUs 1-3. 

On my Z, I have the 6800 defined as 4 CUs 1000, 1100, 1200, 1300.  These
correspond to CUADD 0-3.  The Z has all 256 device addresses defined on
each of the 4 CUs.  I actually only have available on the Z, addresses
1000-101E, 1100-110D, 1200-120D, 1300-130D.  Device 130D is 6800 address
0D on LCU 3.


To use the addresses the customs driver offering gives, you would need
to (in the IOCDS) define CU D00 on the CHPIDs plugged into the 6800 and
make sure you have device addresses 40-5F defined on this CU; then, on
the 6800, define addresses 40-5F on the correct LCU.

HTH.

Rex



-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Schwarz, Barry A
Sent: Tuesday, July 27, 2010 10:05 AM
To: IBM-MAIN@bama.ua.edu
Subject: Synchronizing the IOCDS and the DS6800

We are installing a new z10 with a minimal DS6800 in a very small data
center (to replace our venerable MP2003).  Using the SMC, we have
configured the DS6800 with RAID 5 to give us 250GB of usable storage set
up as eleven 3390-3s and the rest as 3390-9s.  (We wanted to use RAID 10
but the system insisted on keeping two of the DDMs in reserve so we
ended up with only 125GB which is not sufficient.)

I am using the Stand Alone IOCP on the z10 HMC to build the IOCDS.  I
have looked at every DS6800, HMC, IOCP, and HCD manual I could find but
I cannot find any description of how the ADDRESS operand on the IODEVICE
statement relates to the logical volumes on the DS6800.  I have the same
problem relating the CUNUMBER and CUADD operands on the CTLUNIT
statement to the physical and logical control units on the DS6800.

The Customs Offering Driver manual (GI11-2843-04) shows 3390 devices at
addresses D40-D5F.  Obviously I'm missing something but I see no method
of assigning those addresses on the DS6800.  A pointer to the relevant
section of a manual would be greatly appreciated.  Suggestions on how to
use RAID 10 would also be welcome.

Thank you

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread Ted MacNEIL
If you don't understand what's wrong with PDS, re-read Etienne Thijsse's
thread on attempting to delete a PDSE member.


I didn't say I didn't understand, I said that you had to do so.
Understand their limitations, and how to fix them when they break.
They're not going away.


Or imagine my astonished
dismay the first time I allocated a member with DISP=(OLD,DELETE) and watched 
the entire PDS vanish.

That is documented in so many places.
The JCL Manual/User's Guide (or whatever IBM's calling it/them now), for 
example, and
nowhere does it say DISP works at the member level.

The explanation of DISP is at the dataset level, everywhere I've looked.

Enough counterintuitive behaviors

You can't blame PDS(E) for 45+ years of documented behaviour.

and flaws with recondite repairs add up to wrong.

Possibly, but there are many cases in z/OS where you are stuck with them.

I'm not a fan of PDSE, anymore, since IBM broke them circa 2003.

-
I'm a SuperHero with neither powers, nor motivation!
Kimota!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread Kirk Wolf
A little OT, but just wondering:   does ISPF do the same ENQs for
PDSEs as with PDS when updating members?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread McKown, John
 -Original Message-
 From: IBM Mainframe Discussion List 
 [mailto:ibm-m...@bama.ua.edu] On Behalf Of Kirk Wolf
 Sent: Tuesday, July 27, 2010 1:52 PM
 To: IBM-MAIN@bama.ua.edu
 Subject: Re: Another reason to hate PDSE's
 
 A little OT, but just wondering:   does ISPF do the same ENQs for
 PDSEs as with PDS when updating members?

Yes.

--
John McKown 
Systems Engineer IV
IT

Administrative Services Group

HealthMarkets(r)

9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone * (817)-961-6183 cell
john.mck...@healthmarkets.com * www.HealthMarkets.com

Confidentiality Notice: This e-mail message may contain confidential or 
proprietary information. If you are not the intended recipient, please contact 
the sender by reply e-mail and destroy all copies of the original message. 
HealthMarkets(r) is the brand name for products underwritten and issued by the 
insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance 
Company(r), Mid-West National Life Insurance Company of TennesseeSM and The 
MEGA Life and Health Insurance Company.SM

 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Hashing algorythm for text strings without embedded blanks

2010-07-27 Thread Binyamin Dissen
Is there a preferred hashing algorithm for such strings? The strings will be
fixed length with trailing blanks.

I was thinking of simply doing a MOD64 (or higher) of the sum of the non-blank
part of the string by words, but as this is text with a limited character set,
would this lead to excessive alias chains? Has research been done in this
area? There will mostly be search activity but also add activity.

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


zEnterprise at SHARE in Boston

2010-07-27 Thread Edward Jaffe
The SHARE MVS Core Technologies Project is sponsoring the following 
technical presentations surrounding zEnterprise next week at SHARE in 
Boston. Be there or be square.


Session 7585: Evaluating Best Fit Architecture for Customer Workloads on 
zEnterprise Systems

Session 7538: IBM zEnterprise 196 (z196) Hardware Overview
Session 7540: zEnterprise Unified Resource Manager
Session 7545: System z Platform Performance Management Overview
Session 8141: Energy Management for zEnterprise
Session 7532: z/OS Software Positioning for the IBM zEnterprise System

You can read about these sessions by following these links:
http://share.confex.com/share/115/webprogram/Session7585.html
http://share.confex.com/share/115/webprogram/Session7538.html
http://share.confex.com/share/115/webprogram/Session7540.html
http://share.confex.com/share/115/webprogram/Session7545.html
http://share.confex.com/share/115/webprogram/Session8141.html
http://share.confex.com/share/115/webprogram/Session7532.html

--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
310-338-0400 x318
edja...@phoenixsoftware.com
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashing algorythm for text strings without embedded blanks

2010-07-27 Thread zMan
What's the goal of the hashing -- obfuscation? Shortening the data?

On Tue, Jul 27, 2010 at 3:18 PM, Binyamin Dissen bdis...@dissensoftware.com
 wrote:

 Is there a preferred hashing algorithm for such strings? The strings will
 be
 fixed length with trailing blanks.

 I was thinking of simply doing a MOD64 (or higher) of the sum of the
 non-blank
 part of the string by words, but as this is text with a limited character
 set,
 would this lead to excessive alias chains? Has research been done in this
 area? There will mostly be search activity but also add activity.

 --
 Binyamin Dissen bdis...@dissensoftware.com
 http://www.dissensoftware.com

 Director, Dissen Software, Bar  Grill - Israel


 Should you use the mailblocks package and expect a response from me,
 you should preauthorize the dissensoftware.com domain.

 I very rarely bother responding to challenge/response systems,
 especially those from irresponsible companies.

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html




-- 
zMan -- I've got a mainframe and I'm not afraid to use it

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashing algorythm for text strings without embedded blanks

2010-07-27 Thread Binyamin Dissen
On Tue, 27 Jul 2010 15:32:24 -0400 zMan zedgarhoo...@gmail.com wrote:

:What's the goal of the hashing -- obfuscation? Shortening the data?

Lookup. 

Does the entry exist, and if so what are its attributes. If does not exist,
add.

:On Tue, Jul 27, 2010 at 3:18 PM, Binyamin Dissen bdis...@dissensoftware.com
: wrote:

: Is there a preferred hashing algorithm for such strings? The strings will
: be
: fixed length with trailing blanks.

: I was thinking of simply doing a MOD64 (or higher) of the sum of the
: non-blank
: part of the string by words, but as this is text with a limited character
: set,
: would this lead to excessive alias chains? Has research been done in this
: area? There will mostly be search activity but also add activity.

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread Kirk Talman
 Or imagine my astonished dismay the first time I allocated a member with 
DISP=(OLD,DELETE) and watched the entire PDS vanish.

In the early 1970s, at a bank using MVT on 370/155, soon after DOS-OS 
conversion, all procs were stored in SYS1.PROCLIB.  Excessively neat 
programmer deleted a member using that technique.  System was unbootable.

When the system came back after the sysgen (no backup res pack!), an 
APPL.PROCLIB was created and all SYS1 datasets were password protected. 
Ops was not given the password.

So in 40 yrs, the same design flaw has bit how many people/shops?

On the other hand, most programs I wrote in the 1960s would run today, if 
there were still card readers.

-
The information contained in this communication (including any
attachments hereto) is confidential and is intended solely for the
personal and confidential use of the individual or entity to whom
it is addressed. If the reader of this message is not the intended
recipient or an agent responsible for delivering it to the intended
recipient, you are hereby notified that you have received this
communication in error and that any review, dissemination, copying,
or unauthorized use of this information, or the taking of any
action in reliance on the contents of this information is strictly
prohibited. If you have received this communication in error,
please notify us immediately by e-mail, and delete the original
message. Thank you 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashing algorythm for text strings without embedded blanks

2010-07-27 Thread zMan
OK, I have a splitting headache and may be dense anyway: how is it easier to
look it up once it's hashed? What am I missing?

On Tue, Jul 27, 2010 at 3:36 PM, Binyamin Dissen bdis...@dissensoftware.com
 wrote:

 On Tue, 27 Jul 2010 15:32:24 -0400 zMan zedgarhoo...@gmail.com wrote:

 :What's the goal of the hashing -- obfuscation? Shortening the data?

 Lookup.

 Does the entry exist, and if so what are its attributes. If does not exist,
 add.

 :On Tue, Jul 27, 2010 at 3:18 PM, Binyamin Dissen 
 bdis...@dissensoftware.com
 : wrote:

 : Is there a preferred hashing algorithm for such strings? The strings
 will
 : be
 : fixed length with trailing blanks.

 : I was thinking of simply doing a MOD64 (or higher) of the sum of the
 : non-blank
 : part of the string by words, but as this is text with a limited
 character
 : set,
 : would this lead to excessive alias chains? Has research been done in
 this
 : area? There will mostly be search activity but also add activity.

 --
 Binyamin Dissen bdis...@dissensoftware.com
 http://www.dissensoftware.com

 Director, Dissen Software, Bar  Grill - Israel


 Should you use the mailblocks package and expect a response from me,
 you should preauthorize the dissensoftware.com domain.

 I very rarely bother responding to challenge/response systems,
 especially those from irresponsible companies.

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html




-- 
zMan -- I've got a mainframe and I'm not afraid to use it

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashing algorythm for text strings without embedded blanks

2010-07-27 Thread Kirk Talman
I have used the technique of adding byte values for a hash count in two 
shops over two decades to cut the length of a threaded list.  Both times I 
used mod256 to good effect.

The first time the string was an eight character variable name, the second 
time a set of strings over 64 bytes long.  Both could contain spaces.

In the first case the set was in the low thousands and short/long ratio 
was less than 3/1.

In the second case, worst case set was above 1 million and the short long 
ratio was less than 1.5/1.  In this case, the performance hit is low 
enough (and probably the systems fast enough) that it does not pay to go 
mod512.  A million pages is still a technology limit for the kind of 
reports being indexed.

One thing that helped in both cases was allocating control blocks pointed 
to by the hash tables in sets of pages to improve locality of reference.

IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu wrote on 07/27/2010 
03:18:49 PM:

 From: Binyamin Dissen bdis...@dissensoftware.com
 Subject: Hashing algorythm for text strings without embedded blanks
 
 Is there a preferred hashing algorithm for such strings? The strings 
will be
 fixed length with trailing blanks.
 
 I was thinking of simply doing a MOD64 (or higher) of the sum of 
thenon-blank
 part of the string by words, but as this is text with a limited 
character set,
 would this lead to excessive alias chains? Has research been done in 
this
 area? There will mostly be search activity but also add activity.


-
The information contained in this communication (including any
attachments hereto) is confidential and is intended solely for the
personal and confidential use of the individual or entity to whom
it is addressed. If the reader of this message is not the intended
recipient or an agent responsible for delivering it to the intended
recipient, you are hereby notified that you have received this
communication in error and that any review, dissemination, copying,
or unauthorized use of this information, or the taking of any
action in reliance on the contents of this information is strictly
prohibited. If you have received this communication in error,
please notify us immediately by e-mail, and delete the original
message. Thank you 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: I'm amazed

2010-07-27 Thread Rick Fochtman

snip
IBM makes what is claimed to be the biggest Mainframe announcement in 
decades and most of the traffic on this list is on the etymology of CICS 
and PoPs


I love it.
---unsnip--
That's because the HYPE FILTERS are in full operation. We'll check it 
out for ourselves, in conjunction with our business needs and projected 
growth paths.  :-)


Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread Robert A. Rosenberg
At 8:47 AM -0500 on 7/27/10, Paul Gilmartin wrote about Re: remove() 
of PDSE member leaves PDS locked:


remove() upgrades this to EXC (bad design of C RTL; as you say, SAS 
(RIP) does better). Then there's no way to downgrade it to SHR (bad 
design of GRS).


I agree with you about the bad design that does not allow an EXC to 
be downgraded to a SHR. I fail to see why it is not allowed. The EXC 
is the first entry in the queue and may be followed by another EXC 
request or SHR requests in a wait state. Right now if I do the DEQ of 
the EXC it is removed and the waiting ENQs are taken out of wait 
status in queued order until an EXC request is found or the queue is 
exhausted. What is so hard (or dangerous) about just altering the 
status of the EXC to SHR and then running the same code as the DEQ 
(after first checking if the second entry is a SHR request [if it is 
an EXC do not run the code])?


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashin g algorith m for text strings w ithout emb edded blan ks‏

2010-07-27 Thread john gilmore
corrected text:

 

Worth trying first is von Neumann's classical scheme.  Divide the value 
obtained using the z/Architecture machine instruction CKSUM.  Then use its 
remainder mod(s), where s is any convenient small prime.  The result will often 
be an approximately rectangular distribution of the hash values
 
0, 1, 2, . . . , s - 1.
 
The use of a composite hashing modulus c is NOT a good idea.  Clustering at its 
prime factors is all but certain.  Using, say, c = 60 = 2^2 x 3 x 5 would yield 
clusters at 2, 3, and 5  

John Gilmore Ashland, MA 01721-1817 USA



  
_
Hotmail has tools for the New Busy. Search, chat and e-mail from your inbox.
http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_1

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: I.B.M. Is Target of Antitrust Inquiry

2010-07-27 Thread Rick Fochtman

-snip
Yeah, I was astounded to see this bubble up high enough that a gas 
station blabber-at-you-while-you-pump screen had the story!

unsnip---
Seems like a waste of time. If I build a left-nostril inhaler that has 
your state motto on it and glows in the dark and you chose not to 
duplicate that, why should you be allowed to sue me?


Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashing algorythm for text strings without embedded blanks

2010-07-27 Thread Thomas Kern
This is what I have used in past mainframe applications:

http://www.vm.ibm.com/download/packages/descript.cgi?HASHWF

/Tom Kern

Binyamin Dissen wrote:
 Is there a preferred hashing algorithm for such strings? The strings will be
 fixed length with trailing blanks.
 
 I was thinking of simply doing a MOD64 (or higher) of the sum of the non-blank
 part of the string by words, but as this is text with a limited character set,
 would this lead to excessive alias chains? Has research been done in this
 area? There will mostly be search activity but also add activity.
 
 --
 Binyamin Dissen bdis...@dissensoftware.com
 http://www.dissensoftware.com
 
 Director, Dissen Software, Bar  Grill - Israel
 
 
 Should you use the mailblocks package and expect a response from me,
 you should preauthorize the dissensoftware.com domain.
 
 I very rarely bother responding to challenge/response systems,
 especially those from irresponsible companies.
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html
 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashing algorythm for text strings without embedded blanks

2010-07-27 Thread Binyamin Dissen
On Tue, 27 Jul 2010 15:43:47 -0400 zMan zedgarhoo...@gmail.com wrote:

:OK, I have a splitting headache and may be dense anyway: how is it easier to
:look it up once it's hashed? What am I missing?

Not easier, faster.

Assume 10 strings. A serial search will take on average 5 compares. A
mod64 hash should reduce it on average to under 800 compares, hash to slot and
run the alias chain.

A b-tree would be better but then there is the issue of balancing it while
others are busy transversing it.

:On Tue, Jul 27, 2010 at 3:36 PM, Binyamin Dissen bdis...@dissensoftware.com
: wrote:

: On Tue, 27 Jul 2010 15:32:24 -0400 zMan zedgarhoo...@gmail.com wrote:

: :What's the goal of the hashing -- obfuscation? Shortening the data?

: Lookup.

: Does the entry exist, and if so what are its attributes. If does not exist,
: add.

: :On Tue, Jul 27, 2010 at 3:18 PM, Binyamin Dissen 
: bdis...@dissensoftware.com
: : wrote:

: : Is there a preferred hashing algorithm for such strings? The strings
: will
: : be
: : fixed length with trailing blanks.

: : I was thinking of simply doing a MOD64 (or higher) of the sum of the
: : non-blank
: : part of the string by words, but as this is text with a limited
: character
: : set,
: : would this lead to excessive alias chains? Has research been done in
: this
: : area? There will mostly be search activity but also add activity.

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: C-I-C-S vs KICKS and screws

2010-07-27 Thread Rick Fochtman

-snip--


We also say SNAH and KICKS in The Netherlands and during a course in Atlanta it 
took me a while to understand what was meant with C-I-C-S.

On the matter of screws:
I own a 91 Jeep Wrangler with a lot of torx screws and in time the torx-hole 
becomes a round hole.
Allan-screws are a bit better but still have the same problem.

I personally prefer hex-bolts.
Just too bad that Chrysler used both metric and inch sizes on my Jeep.
 


unsnip-
GM has exhibited the same incompetence; I have both flavors of nuts 
and bolts on my 2001 Suburban.  :-(


I think I've heard almost every variation of SNA and CICS and I 
cease to be surprised at the endless variations.


Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: remove() of PDSE member leaves PDS locked

2010-07-27 Thread Edward Jaffe

Robert A. Rosenberg wrote:
What is so hard (or dangerous) about just altering the status of the 
EXC to SHR and then running the same code as the DEQ (after first 
checking if the second entry is a SHR request [if it is an EXC do not 
run the code])?


Agreed. This is a long-standing complaint. It's doable, but not yet done 
for some reason. Perhaps there is no formal requirement?


--
Edward E Jaffe
Chief Technology Officer
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
310-338-0400 x318
edja...@phoenixsoftware.com
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread Rick Fochtman

-snip


Barbara Nitz wrote:


No, it's 64K tracks.  It is the same per volume limit as many other
data set types (non-extended).  But PDSes and PDSEs are also limited
to a single volume.



I am surprised. I did not know about *those* limitations. And most 
certainly, since they are documented, there will be no way to change 
things.


But: I seem to remember that PDSEs were touted as the only ones 
making sense on an EAV, because of the 'extented' part of the name, 
and that they could get bigger (but maybe I misunderstood). Not that 
I would encourage use of such a large volume, as it is much too slow, 
and I still haven't opened an ETR to address 90s (or more) until ISPF 
3.4 gives you the directory view. (Might end up on an ISPF queue, 
which would require me to open a complaint due to incompetence.)


PDSEs have only one advantage: They don't need to get compressed. The 
rest us a huge amount of disadvantages.


Regards, Barbara



Well, they do have at least one other advantage: they can store
program objects, which allows entry points with long, case-sensitive
names, which is sometimes handy.


unsnip---
Steve, I'm incredibly happy you said SOMETIMES, because I've lived 
with 8-character PDS member names for 40+ years and never could think of 
a really severe need for the variations you suggest.  :-)


Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread Ted MacNEIL
A little OT, but just wondering:   does ISPF do the same ENQs for PDSEs as 
with PDS when updating members?


I don't think it's OT, but the answer is YES.

PDSEs, while different under the covers, still look like PDS's to the 
uninitiated (programmes, not people).

-
I'm a SuperHero with neither powers, nor motivation!
Kimota!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashin g algorith m for text strings w ithout emb edded blan ks?

2010-07-27 Thread Binyamin Dissen
On Tue, 27 Jul 2010 19:59:01 + john gilmore john_w_gilm...@msn.com
wrote:

:Worth trying first is von Neumann's classical scheme.  Divide the value 
obtained using the z/Architecture machine instruction CKSUM.  Then use its 
remainder mod(s), where s is any convenient small prime.  The result will often 
be an approximately rectangular distribution of the hash values

Yes, CKSM is a better idea than doing the adding myself.
 
:0, 1, 2, . . . , s - 1.
 
:The use of a composite hashing modulus c is NOT a good idea.  Clustering at 
its prime factors is all but certain.  Using, say, c = 60 = 2^2 x 3 x 5 would 
yield clusters at 2, 3, and 5  

So using 61 would lead to a better distribution than using 64?

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: C-I-C-S vs KICKS

2010-07-27 Thread Rick Fochtman

snip---
One type of screw head that I haven't seen mentioned here is the torx,
or hexalobular, head. While the Philips screw was designed to cam out
of the screw to prevent overtightening, the torx screw, like the
Robertson screw, was designed to not cam out. It came about as better
torque-limiting automatic screwdrivers were developed for use in
factories and is becoming more popular for use on items like
automobiles, bicycle brake systems, disk drive systems, computers, and
other consumer electronics.
---unsnip--
There's no good reason that a torque-limiting automatic screwdriver 
can't use a Robertson screw.


All you need to do is change the bit.  :-)  I submit that your argument 
is self-defeating.


Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Panvalet Question

2010-07-27 Thread Dell'Anno, Aurora
Lizette,

Apologies for replying so late, I am not a Panvalet expert but I asked
someone who is and their reply is:

PANMODI is the Panvalet I/O processor.  It is used by ROSCOE to access
Panvalet PANLIBs (IMPORT/EXPORT members between Panvalet and ROSCOE).
PANMODI gets linked with the RSSCPAN0 interface in ROSCOE.  PANMODI is
part of the Library Access Method for Panvalet (PAM).

The version of PANMODI which is distributed with CA Panvalet is not the
same as the PANMODI shipped with CA Easytrieve Plus.

Also, PANMODC, PSCCLPVI, and PVPVLAMS are aliases of PANMODI.

More detail on PANMODI can be found in the CA Panvalet System Management
Guide.

If you no longer use Panvalet (and no longer need to access data
residing on PANLIBs), you do not need PANMODI.

 

Please let me know if you have additional questions regarding PANMODI.
 



Thanks.
 

Aurora


 

Aurora Emanuela Dell'Anno
CA Technologies - MSC
Sr. Engineering Services Architect
Tel:  +44 (0)1753 577 733
Mobile:  +44 (0)7768 235 339
aurora.della...@ca.com

CA Limited
Ditton Park, Riding Court Road, Datchet, SL3 9LL, UK

CA Limited is a company registered in England and Wales under company
registration number 1282495 with its registered office at the address
set out above. VAT number 697904179.


http://www.ca.com/

 

P please don't print this e-mail unless you really need to!

 

 



-Original Message-
From: Lizette Koehler [mailto:stars...@mindspring.com] 
Sent: 21 July 2010 20:33
Subject: Panvalet Question

I am trying to clean up all the no longer used panvalet modules.  And
of course there are lots of pieces everywhere.

I ran across a module that seems to be access via ROSCOE but do not know
what it is used.

PANMODI is the Panvalet Options Module.  What function does it perform
if we no longer use Panvalet?

I have not been able to find anything specific on CA's website other
than some very skimpy information in CA Easytrieve 6.3 manuals.

Lizette

--
For IBM-MAIN subscribe / signoff / archive access instructions, send
email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search
the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: I.B.M. Is Target of Antitrust Inquiry

2010-07-27 Thread zMan
Um, what???

On Tue, Jul 27, 2010 at 4:09 PM, Rick Fochtman rfocht...@ync.net wrote:


 -snip

 Yeah, I was astounded to see this bubble up high enough that a gas station
 blabber-at-you-while-you-pump screen had the story!

 unsnip---
 Seems like a waste of time. If I build a left-nostril inhaler that has your
 state motto on it and glows in the dark and you chose not to duplicate that,
 why should you be allowed to sue me?

 Rick


 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html




-- 
zMan -- I've got a mainframe and I'm not afraid to use it

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread Rick Fochtman

snip--
If you don't understand what's wrong with PDS, re-read Etienne Thijsse's
thread on attempting to delete a PDSE member. Or imagine my astonished
dismay the first time I allocated a member with DISP=(OLD,DELETE) and
watched the entire PDS vanish. Enough counterintuitive behaviors and flaws
with recondite repairs add up to wrong.
--unsnip--
I submit that this issue was caused by a faulty understanding of how 
PDS's and JCL
work together. You can view it as a flaw if you like, and I do, but 
there are provided
mechanisms to circumvent this flaw. Not always nice and certainly not 
intuitive,

but still available.

Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashing algorythm for text strings without embedded blanks

2010-07-27 Thread Hal Merritt
Am I missing something? Why not use a binary chop search? That is, each compare 
cuts the universe in half.  For a million entries, you would need 20 or less 
compares. 

http://en.wikipedia.org/wiki/Binary_search_algorithm


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Binyamin Dissen
Sent: Tuesday, July 27, 2010 3:14 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Hashing algorythm for text strings without embedded blanks

On Tue, 27 Jul 2010 15:43:47 -0400 zMan zedgarhoo...@gmail.com wrote:

:OK, I have a splitting headache and may be dense anyway: how is it easier to
:look it up once it's hashed? What am I missing?

Not easier, faster.

Assume 10 strings. A serial search will take on average 5 compares. A
mod64 hash should reduce it on average to under 800 compares, hash to slot and
run the alias chain.

A b-tree would be better but then there is the issue of balancing it while
others are busy transversing it.

:On Tue, Jul 27, 2010 at 3:36 PM, Binyamin Dissen bdis...@dissensoftware.com
: wrote:

: On Tue, 27 Jul 2010 15:32:24 -0400 zMan zedgarhoo...@gmail.com wrote:

: :What's the goal of the hashing -- obfuscation? Shortening the data?

: Lookup.

: Does the entry exist, and if so what are its attributes. If does not exist,
: add.

: :On Tue, Jul 27, 2010 at 3:18 PM, Binyamin Dissen 
: bdis...@dissensoftware.com
: : wrote:

: : Is there a preferred hashing algorithm for such strings? The strings
: will
: : be
: : fixed length with trailing blanks.

: : I was thinking of simply doing a MOD64 (or higher) of the sum of the
: : non-blank
: : part of the string by words, but as this is text with a limited
: character
: : set,
: : would this lead to excessive alias chains? Has research been done in
: this
: : area? There will mostly be search activity but also add activity.

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


John Gilmore's Munging of Subject lines (was Re: Hashin g algorith m)

2010-07-27 Thread Mark Zelden
John,

What's up with the subject lines getting destroyed when you post?  It 
makes threading difficult.

Mark
--
Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS   
mailto:mzel...@flash.net  
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html 
Systems Programming expert at http://expertanswercenter.techtarget.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashing algorythm for text strings without embedded blanks

2010-07-27 Thread Paul Gilmartin
On Tue, 27 Jul 2010 15:43:08 -0500, Hal Merritt wrote:

Am I missing something? Why not use a binary chop search? That is, each 
compare cuts the universe in half.  For a million entries, you would need 20 
or less compares.

http://en.wikipedia.org/wiki/Binary_search_algorithm

Insertion?

For John G.'s suggestion of CKSUM followed by modulo small
prime: Does primality matter?  Shouldn't  if the range of
CKSUM is spectrally neutral.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread Paul Gilmartin
On Tue, 27 Jul 2010 15:42:57 -0400, Kirk Talman wrote:

 Or imagine my astonished dismay the first time I allocated a member with
DISP=(OLD,DELETE) and watched the entire PDS vanish.

In the early 1970s, at a bank using MVT on 370/155, soon after DOS-OS
conversion, all procs were stored in SYS1.PROCLIB.  Excessively neat
programmer deleted a member using that technique.  System was unbootable.

When the system came back after the sysgen (no backup res pack!), an
APPL.PROCLIB was created and all SYS1 datasets were password protected.
Ops was not given the password.

So in 40 yrs, the same design flaw has bit how many people/shops?

But none of those should perceive a problem, since the behavior
is documented.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Synchronizing the IOCDS and the DS6800

2010-07-27 Thread Dick de Groot
It depends on the number of DDM's and the size of the DDM's and if you make
1 or two array sites how your IOCDS will look like. Cuadd= has a relation
with the lcuid

2010/7/27 Schwarz, Barry A barry.a.schw...@boeing.com

 We are installing a new z10 with a minimal DS6800 in a very small data
 center (to replace our venerable MP2003).  Using the SMC, we have configured
 the DS6800 with RAID 5 to give us 250GB of usable storage set up as eleven
 3390-3s and the rest as 3390-9s.  (We wanted to use RAID 10 but the system
 insisted on keeping two of the DDMs in reserve so we ended up with only
 125GB which is not sufficient.)

 I am using the Stand Alone IOCP on the z10 HMC to build the IOCDS.  I have
 looked at every DS6800, HMC, IOCP, and HCD manual I could find but I cannot
 find any description of how the ADDRESS operand on the IODEVICE statement
 relates to the logical volumes on the DS6800.  I have the same problem
 relating the CUNUMBER and CUADD operands on the CTLUNIT statement to the
 physical and logical control units on the DS6800.

 The Customs Offering Driver manual (GI11-2843-04) shows 3390 devices at
 addresses D40-D5F.  Obviously I'm missing something but I see no method of
 assigning those addresses on the DS6800.  A pointer to the relevant section
 of a manual would be greatly appreciated.  Suggestions on how to use RAID 10
 would also be welcome.

 Thank you

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html




-- 
Met vriendelijke groeten/With kind regards

Dick de Groot

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashing algorythm for text strings without embedded blanks

2010-07-27 Thread Binyamin Dissen
As I wrote, there is the issue of dynamically balancing the tree as random
insertions come in.

On Tue, 27 Jul 2010 15:43:08 -0500 Hal Merritt hmerr...@jackhenry.com wrote:

:Am I missing something? Why not use a binary chop search? That is, each 
compare cuts the universe in half.  For a million entries, you would need 20 or 
less compares. 
:
:http://en.wikipedia.org/wiki/Binary_search_algorithm
:
:
:-Original Message-
:From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf 
Of Binyamin Dissen
:Sent: Tuesday, July 27, 2010 3:14 PM
:To: IBM-MAIN@bama.ua.edu
:Subject: Re: Hashing algorythm for text strings without embedded blanks
:
:On Tue, 27 Jul 2010 15:43:47 -0400 zMan zedgarhoo...@gmail.com wrote:
:
::OK, I have a splitting headache and may be dense anyway: how is it easier to
::look it up once it's hashed? What am I missing?
:
:Not easier, faster.
:
:Assume 10 strings. A serial search will take on average 5 compares. A
:mod64 hash should reduce it on average to under 800 compares, hash to slot and
:run the alias chain.
:
:A b-tree would be better but then there is the issue of balancing it while
:others are busy transversing it.
:
::On Tue, Jul 27, 2010 at 3:36 PM, Binyamin Dissen bdis...@dissensoftware.com
:: wrote:
:
:: On Tue, 27 Jul 2010 15:32:24 -0400 zMan zedgarhoo...@gmail.com wrote:
:
:: :What's the goal of the hashing -- obfuscation? Shortening the data?
:
:: Lookup.
:
:: Does the entry exist, and if so what are its attributes. If does not 
exist,
:: add.
:
:: :On Tue, Jul 27, 2010 at 3:18 PM, Binyamin Dissen 
:: bdis...@dissensoftware.com
:: : wrote:
:
:: : Is there a preferred hashing algorithm for such strings? The strings
:: will
:: : be
:: : fixed length with trailing blanks.
:
:: : I was thinking of simply doing a MOD64 (or higher) of the sum of the
:: : non-blank
:: : part of the string by words, but as this is text with a limited
:: character
:: : set,
:: : would this lead to excessive alias chains? Has research been done in
:: this
:: : area? There will mostly be search activity but also add activity.

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashin g algorith m for text strings w ithout emb edded blan ks‏

2010-07-27 Thread john gilmore
Three responses:

 

Yes, 61, which is prime, is better than 64 = 2^6, which is composite.

 

A binary search/chop is easy when one has all of the values one is going to 
search for compresent and available to be put into a table.  When one is 
acquiring these values serially in time, a binary-search tree can be used 
instead; but it must be kept balanced/compact; and this is a non-trivial 
undertaking.  For many applications--compiler and assembler symbol tables are 
the obvious example--a set of ordered sublists, one for each hash value, yields 
faster results.  Much depends upon what you have in  hand in the way of already 
working routines.

 

If division-method hashing is used a prime divisor/modulus is highly desirable. 
 Clustering at the prime divisors of a composite modulus does occur.  I dislike 
arguments from authority, but 1) this is not the place for a bibliography and 
2) RKFATWTF.   
John Gilmore Ashland, MA 01721-1817 USA


  
_
The New Busy is not the old busy. Search, chat and e-mail from your inbox.
http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_3

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread Steve Comstock

Paul Gilmartin wrote:

On Tue, 27 Jul 2010 12:26:50 +0200, R.S. wrote:


Steve Comstock pisze:

Barbara Nitz wrote:

[...]

PDSEs have only one advantage: They don't need to get compressed. The
rest us a huge amount of disadvantages.

Regards, Barbara

And, I believe, multiple members can be written concurrently (I
believe; am I right?)  How would one do this?  Must one OPEN two or
more DCBs, one for each member being written?  And one might yet
wish to be able to append or update in place existing members.


Well, they do have at least one other advantage: they can store
program objects, which allows entry points with long, case-sensitive
names, which is sometimes handy.

Steve, why would you call that an advantage?  I thought you despise
case-sensitivity.  


I do. But in some environments (e.g., DLLs, C, C++) it is a fact of life.
If you want to port / use applications from the z/OS world it is good
to have the ability.


Anyway, old fashioned PDSes allow case-sensitive

(but not long) member names; it's merely higher level interfaces that
try to conceal the case-sensitivity.  


Ah, good point. I'd forgotten that, since the interfaces I work
with day to day are exactly of that type.

Would you advocate supporting

case-insensitivity at the DFSMS layer, similar to Windows?  Mac OS X
gives the programmer a choice with a granularity of volume.


Not sure on that one.




While I could provide more PDSE advantages than Barbara, I would not
mention long names.

Reason: I HAVE NEVER SEEN AN APPLICATION WHICH USES THEM. Long names are
not handy for me. Of course I know, there are some... but not in
operating system components.


Isn't this a solution seeking a problem?  What interfaces support them?
Surely, one can't code // EXEC PGM=Case-sensitive-Long-name?  What about
ATTACH EP=Case-sensitive-Long-name?


Well, you can call DLL entry points from Assembler, COBOL, C, and PL/I.

But you can't invoke them from JCL, that's true. Nor can you LOAD,
XCTL, or ATTACH to long entry points. But several bpx services can
access a long, mixed case, entry name. I admit, it's a stretch. The
average day-to-day application programmer does not have a need / use
for this feature, at least not today, and one has to work at it to be
able to use it.




What's the format of the word returned by NOTE for a PDSE.  It's
been discussed here that the low 24 bits contain the relative
record number within a member (biased by 0x10).  Do the top 8
bits then identify the member?  What happens, then, if a programmer
performs BLDL for 257 different members?  can the NOTE words
identify connections to all?  If one performs 2 BLDLs for the
same member, are the two returned pointers identical?

How do Unix directories compare?

o They don't need to be compressed.

o Multiple members can be written concurrently.

o Members can be appended or updated in place (with a granularity
  of byte.).

o They support long case-sensitive names.

o They allow a mixture of program objects and other member types.

Deficiencies:

o Alias entry points are not supported (AFAIK).

o The BPAM support is read-only (so far).

Questions:

o How do performance and reliablity compare with PDS[E]?  I suppose
  there might be four answers, separate for PDS vs. PDSE and for
  HFS vs. zFS.

o What is the limit on member size?

o What is the limit on number of members?

-- gil


Well, I've been getting more and more into the z/OS UNIX world,
and I think you've raised some good questions / concerns here.
But based on a thread last year (or was it two years ago), there
seems to be precious little management interest in, or support for,
developing new applications using z/OS UNIX, and the systems folks
on ibm-main are certainly not big fans (for the most part, anyway),
eh Barbara?




--

Kind regards,

-Steve Comstock
The Trainer's Friend, Inc.

303-393-8716
http://www.trainersfriend.com

* To get a good Return on your Investment, first make an investment!
  + Training your people is an excellent investment

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: I'm amazed

2010-07-27 Thread Shane Ginnane
I suspect IBM wants to keep the penguin colonies appropriately corralled.
Hard to tout you can support hundreds/thousands of Linuses in a (native) LPAR
environment. Does Power have a z/VM analogue ?.

Shane ...

On Wed, Jul 28th, 2010 at 12:16 AM, Ken Porowski wrote:

 It may be that they don't have the management piece for Linux yet
 Power7/AIX supported from November
 
 xBlades/Linux support is only a statement of direction for 1st half 2011
 Maybe when that comes out we'll see Power7/Linux 
 
 -Original Message-
 Kirk Wolf
 
 On Mon, Jul 26, 2010 at 4:33 PM, Starr, Alan alan_st...@calpers.ca.gov
 wrote:
  It would indeed be interesting to see discussion of this biggest
 Mainframe announcement in decades.
 
 
  3) Is it sufficient to support AIX but not the other flavors of Unix
 (if I read the announcement correctly)?
 
 I also found this curious.  From what I understand, the Power7
 BladeCenter runs both AIX and Linux:
 
 http://www-03.ibm.com/systems/bladecenter/hardware/servers/ps700series/i
 ndex.html
 
 Why would Linux on Power be excluded?  (but not Linux on X64?)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


John Gilmo re's Mungi ng of Subj ect lines (was Re: H ashin g al gorith m)‏

2010-07-27 Thread john gilmore
The munging comes and the munging goes.  Today it is occurring.  Yesterday it 
did not.

John Gilmore Ashland, MA 01721-1817 USA

  
_
Hotmail is redefining busy with tools for the New Busy. Get more from your 
inbox.
http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_2

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: I'm amazed

2010-07-27 Thread Henry Willard
Shane Ginnane wrote:

 I suspect IBM wants to keep the penguin colonies appropriately corralled.
 Hard to tout you can support hundreds/thousands of Linuses in a (native) LPAR
 environment. Does Power have a z/VM analogue ?.

Not the same functionality as z/VM. There is PowerVM which is the Power7 version
of the z LPAR code plus paging - PowerVM can page LPARs using a service LPAR to
do the I/O. Also Active Memory Sharing that allows LPARs to donate memory they
don't need to other LPARs.

The LPAR architecture for Power is such that the guests have to be aware, and it
often takes a little longer to get needed changes into the Linux distros



 Shane ...


h

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashin g algorith m for text strings w ithout emb edded blan ks‏

2010-07-27 Thread Gerhard Postpischil

On 7/27/2010 6:06 PM, john gilmore wrote:

into a table.  When one is acquiring these values serially in
time, a binary-search tree can be used instead; but it must
be kept balanced/compact; and this is a non-trivial
undertaking.


It depends on one's perception of trivial. Volume 3 of Knuth's 
Art of Computer Programming has a very simple algorithm for 
building balanced trees.



Gerhard Postpischil
Bradford, VT

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: United Statesians (was C-I-C-S vs KICKS)

2010-07-27 Thread Frank Swarbrick
If citizens of the United States of Mexico are called Mexicans then why 
shouldn't the citizens of the United States of America be called Americans?  
Other than the USA there is no one place that is simply referred to as America. 
 There is North America and South America, which are continents.  Then there is 
America, which is the short name for the United States of America, a country in 
North America.

Though apparently it's United Mexican States, not United States of Mexico, but 
anyway...

On 7/27/2010 at 8:18 AM, in message
piqt465ggadlccgeguamjbvr0um4pgv...@4ax.com, Howard Brazee
howard.bra...@cusys.edu wrote:
 On 27 Jul 2010 05:51:04 -0700, thomas.kel...@commercebank.com (Kelman,
 Tom) wrote:
 
So, what do we in the United States of America call ourselves. 
 
 Our name is like the United Nations or the United Kingdom - a
 description about what was wanted instead of a real name.
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
 Search the archives at http://bama.ua.edu/archives/ibm-main.html

 

The information contained in this electronic communication and any document 
attached hereto or transmitted herewith is confidential and intended for the 
exclusive use of the individual or entity named above.  If the reader of this 
message is not the intended recipient or the employee or agent responsible for 
delivering it to the intended recipient, you are hereby notified that any 
examination, use, dissemination, distribution or copying of this communication 
or any part thereof is strictly prohibited.  If you have received this 
communication in error, please immediately notify the sender by reply e-mail 
and destroy this communication.  Thank you.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashin g algorith m for text strings w ithout emb edded blan ks‏

2010-07-27 Thread Rick Fochtman

---snip---
It depends on one's perception of trivial. Volume 3 of Knuth's Art of 
Computer Programming has a very simple algorithm for building balanced 
trees.

---unsnip--
I can tell you from bitter experience that while the algorithm is fairly 
simple, implementation is most assuredly NOT simple. :-(


Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashin g algorith m for text strings w ithout emb edded blan ks‏

2010-07-27 Thread Gerhard Postpischil

On 7/27/2010 8:42 PM, Rick Fochtman wrote:

I can tell you from bitter experience that while the algorithm
is fairly simple, implementation is most assuredly NOT simple. :-(


About twelve years ago I was working as a contractor at a 
government agency that routinely processed files with hundreds 
of millions of records. My task was data extraction maintenance 
for a program that did an insertion sort on selected records. It 
took a few days to get the code working, but it was time well 
spent. The hard part was reading out the records in sequence, a 
task that Knuth left as an exercise for the reader g



Gerhard Postpischil
Bradford, VT

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashing algorythm for text strings without embedded blanks

2010-07-27 Thread Joel C. Ewing
Explanation of hashing functions and table look up:
  If you have a table with entries identified by a key, one of the
typical requirements is to locate a table entry having some given key
(or prove the entry doesn't exist).
  If the range of key values is suitably small so that all key values
may be uniquely mapped to a distinct numeric value with a modest range,
then the simplest solution may be an array using that unique value as a
direct index into the array.  But, in many cases the range of possible
key values makes that totally impossible --  e.g.,  an 8-byte,
unconstrained key could assume 2**64 possible values which would be
impractical for a directly-indexed, in-memory table.
  One solution in such cases is to instead use a hashing function to
transform the key domain to a relatively small, non-unique numeric range
that is only slightly larger (say 125%) than the maximum number of
distinct table entries to be stored, and to use a hash table sized to
match the hash function range.  The numeric hash value rather than the
actual key is used as a direct index into the table array.  Since the
hash function range is smaller than the key domain, multiple keys can
map to a single hash value, so the initial table entry located might be
for a different key.  To make look up work, each table entry must also
contain the actual key value for the entry, and there must be a rule (or
perhaps a pointer) that tells where to look next in the table for cases
where there is a collision when the hash function points to a used
location in the table for a different key.  A number of different
schemes are used for handling collisions, but basically you try other
table entry locations until you either find an empty location or one
with the right key.
  The beauty of this scheme is that with a suitable hash function,
suitably distributed key values, suitable collision handling rules, and
a table that is guaranteed to never become over 80% full, it can be
proved that the average number of key comparisons to locate an entry
will never exceed around 2.5. It doesn't matter how big the table is as
long as the 80% rule is not violated.  A binary search requires an
average of 2.4 key comparisons to locate all entries in a  7-entry
table,  3.2 comparisons for a 15-entry table, and the average increases
as the number of entries increases.  Even with a less than optimal
hashing function and a less than optimal distribution of key values it
is easy to see how hash table lookup can run circles around binary
search for repeated random lookups as the total number of entries
becomes large.
  The disadvantage is that if at the end of processing you want to list
all table entries in any semblance of order, a sorting process will be
required; and depending on implementation technique, you may even have
to hunt through a sparsely filled table just to find all the entries.
   Joel C Ewing

On 07/27/2010 02:43 PM, zMan wrote:
 OK, I have a splitting headache and may be dense anyway: how is it easier to
 look it up once it's hashed? What am I missing?
 
 On Tue, Jul 27, 2010 at 3:36 PM, Binyamin Dissen bdis...@dissensoftware.com
 wrote:
 
 On Tue, 27 Jul 2010 15:32:24 -0400 zMan zedgarhoo...@gmail.com wrote:

 :What's the goal of the hashing -- obfuscation? Shortening the data?

 Lookup.

 Does the entry exist, and if so what are its attributes. If does not exist,
 add.

 :On Tue, Jul 27, 2010 at 3:18 PM, Binyamin Dissen 
 bdis...@dissensoftware.com
 : wrote:

 : Is there a preferred hashing algorithm for such strings? The strings
 will
 : be
 : fixed length with trailing blanks.

 : I was thinking of simply doing a MOD64 (or higher) of the sum of the
 : non-blank
 : part of the string by words, but as this is text with a limited
 character
 : set,
 : would this lead to excessive alias chains? Has research been done in
 this
 : area? There will mostly be search activity but also add activity.

 --
 Binyamin Dissen bdis...@dissensoftware.com
 http://www.dissensoftware.com

 Director, Dissen Software, Bar  Grill - Israel


 Should you use the mailblocks package and expect a response from me,
 you should preauthorize the dissensoftware.com domain.

 I very rarely bother responding to challenge/response systems,
 especially those from irresponsible companies.
...

-- 
Joel C. Ewing, Fort Smith, ARjcew...@acm.org

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashin g algorith m for text strings w ithout emb edded blan ks

2010-07-27 Thread Paul Gilmartin
On Tue, 27 Jul 2010 22:06:18 +, john gilmore wrote:

Yes, 61, which is prime, is better than 64 = 2^6, which is composite.

 ...


If division-method hashing is used a prime divisor/modulus is highly 
desirable.  Clustering at the prime divisors of a composite modulus does 
occur.  I dislike arguments from authority, but 1) this is not the place for a 
bibliography and 2) RKFATWTF.

For pure division-method, surely.  Modulo 64 merely extracts the
rightmost 6 bits of the original string.  But you had suggested
CKSUM, then modulo.  And if CKSUM is of high quality, I'd expect
any modulus to give good results.

RKFATWTF!?  Not in my lexicon.  Nor in Google's, apparently.  But
the last three characters are familiar and hauntingly apt.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread Clark Morris
On 27 Jul 2010 13:18:29 -0700, in bit.listserv.ibm-main you wrote:

-snip

 Barbara Nitz wrote:

 No, it's 64K tracks.  It is the same per volume limit as many other
 data set types (non-extended).  But PDSes and PDSEs are also limited
 to a single volume.


 I am surprised. I did not know about *those* limitations. And most 
 certainly, since they are documented, there will be no way to change 
 things.

 But: I seem to remember that PDSEs were touted as the only ones 
 making sense on an EAV, because of the 'extented' part of the name, 
 and that they could get bigger (but maybe I misunderstood). Not that 
 I would encourage use of such a large volume, as it is much too slow, 
 and I still haven't opened an ETR to address 90s (or more) until ISPF 
 3.4 gives you the directory view. (Might end up on an ISPF queue, 
 which would require me to open a complaint due to incompetence.)

 PDSEs have only one advantage: They don't need to get compressed. The 
 rest us a huge amount of disadvantages.

 Regards, Barbara


 Well, they do have at least one other advantage: they can store
 program objects, which allows entry points with long, case-sensitive
 names, which is sometimes handy.

unsnip---
Steve, I'm incredibly happy you said SOMETIMES, because I've lived 
with 8-character PDS member names for 40+ years and never could think of 
a really severe need for the variations you suggest.  :-)

Given the obscure program names, proc names and member names we have
due to the 8 character limitation, I for one would have liked names to
be at least 16 characters.  In fact I still would and the 8 byte
limitation must seem weird and out of date to someone coming from a
UNIX or Windows environment.

Clark Morris

Rick


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Another reason to hate PDSE's

2010-07-27 Thread Clark Morris
On 27 Jul 2010 14:17:48 -0700, in bit.listserv.ibm-main you wrote:

On Tue, 27 Jul 2010 15:42:57 -0400, Kirk Talman wrote:

 Or imagine my astonished dismay the first time I allocated a member with
DISP=(OLD,DELETE) and watched the entire PDS vanish.

In the early 1970s, at a bank using MVT on 370/155, soon after DOS-OS
conversion, all procs were stored in SYS1.PROCLIB.  Excessively neat
programmer deleted a member using that technique.  System was unbootable.

When the system came back after the sysgen (no backup res pack!), an
APPL.PROCLIB was created and all SYS1 datasets were password protected.
Ops was not given the password.

So in 40 yrs, the same design flaw has bit how many people/shops?

But none of those should perceive a problem, since the behavior
is documented.

Just because a stupid design is documented doesn't make it any less
stupid.

Clark Morris

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Please comment:What's so special about parallel sysplex

2010-07-27 Thread Victor Zhang
Hello experts here,
Found a blog trying to comparing UNIX technology with mainframe, please comment:
http://www.c0t0d0s0.org/archives/6775-Whats-so-special-about-the-Parallel-Sysplex.html

And answered questions asked by author:
What's so special with parallel sysplex?

Regards
Victor

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Hashin g algorith m for text strings w ithout emb edded blan ks

2010-07-27 Thread David Crayford

Paul Gilmartin wrote:

On Tue, 27 Jul 2010 22:06:18 +, john gilmore wrote:
  

Yes, 61, which is prime, is better than 64 = 2^6, which is composite.

...


If division-method hashing is used a prime divisor/modulus is highly desirable. 
 Clustering at the prime divisors of a composite modulus does occur.  I dislike 
arguments from authority, but 1) this is not the place for a bibliography and 
2) RKFATWTF.



For pure division-method, surely.  Modulo 64 merely extracts the
rightmost 6 bits of the original string.  But you had suggested
CKSUM, then modulo.  And if CKSUM is of high quality, I'd expect
any modulus to give good results.

  


Unfortunately CKSUM is not high quality. It's pathologically pathetic. 
It's nothing more than an additive hash. You will be forced to use a 
hash table
sized by a prime number. The best hash table sizes are powers of two so 
you can use bitwise ANDs instead of mod division, much

faster for dynamically resizing the table.

A good hash function must achieve avalanche which requires a mixing step 
using magic ratios (usually a special prime number).
I've timed just about every known hashing algorithm for strings and the 
best one by some distance on z is the murmur hash.


http://sites.google.com/site/murmurhash/

Here's the murmur 2 hash assembler produced by the Metal/C compiler.

HASHMUR#C CSECT
HASHMUR#C AMODE 31
HASHMUR#C RMODE ANY
SYSSTATE ARCHLVL=2
* unsigned int MurmurHash2(
*const void * key,
*int len,
*unsigned int seed
*)
.* The HLASM GOFF option is needed to assemble this code
@@c...@1  ALIAS C'MurmurHash2'
ENTRY @@c...@1
@@c...@1  AMODE 31
@@c...@1  RMODE ANY
@@c...@1  DS0F
STM   14,6,12(13)
LR15,13
L 13,8(,13)
ST15,4(,13)
@@b...@1  DS0H
USING @@a...@1,13
LARL  3,@@l...@1
USING @@l...@1,3
STMH  14,6,80(13)
* {
* // 'm' and 'r' are mixing constants generated offline.
* // They're not really 'magic', they just happen to work well.
* const unsigned int m = 0x5BD1E995;
* const int r = 24;
*
* // Initialize the hash to a 'random' value
* unsigned int h = seed ^ len;
USING @@pa...@1,1
L 15,@4seed
L 0,@3len
X 15,@3len
CHI   0,4
*
* // Mix 4 bytes at a time into the hash
* const unsigned char * data = (const unsigned char *)key;
L 14,@2key
*
* while(len = 4)
BRL   @1L4
LR2,0
AHI   2,-4
SRL   2,2
AHI   2,1
SLLG  4,2,2
LARL  1,@@co...@area@@
LR6,2
SLR   0,4
@1L3 DS0H
* {
*unsigned int k = *(unsigned int *)data;
L 4,0(,14)(*)uint
*
*k *= m;
MS4,0(,1)
*k ^= k  r;
LR5,4
SRL   5,24
XR4,5
MS15,=F'1540483477'
*k *= m;
MS4,=F'1540483477'
*
*h *= m;
*h ^= k;
*
*data += 4;
LA14,4(,14)   #AddressShadow
XR15,4
BRCT  6,@1L3
@1L4 DS0H
*len -= 4;
* }
*
* // Handle the last few bytes of the input array
* switch(len)
CHI   0,1
BRE   @1L7
CHI   0,2
BRE   @1L8
CHI   0,3
BRNE  @1L5
* {
* case 3: h ^= data[2]  16;
LLGC  0,2(0,14)   (*)Cuchar
SLL   0,16
XR15,0
@1L8 DS0H
* case 2: h ^= data[1]  8;
LLGC  0,1(0,14)   (*)Cuchar
SLL   0,8
XR15,0
@1L7 DS0H
* case 1: h ^= data[0];
LLGC  14,0(0,14)  (*)Cuchar
XR15,14
* h *= m;
MS15,=F'1540483477'
@1L5 DS0H
* };
*
* // Do a few final mixes of the hash to ensure the last few
* // bytes are well-incorporated.
* h ^= h  13;
LR14,15
SRL   14,13
XR15,14
* h *= m;
MS15,=F'1540483477'
* h ^= h  15;
LR14,15
SRL   14,15
XR15,14
*
* return h;
* }
@1L6 DS0H
LMH   14,6,80(13)
DROP
L 13,4(,13)
L 14,12(,13)
LM1,6,24(13)
BR14
DS0F
@@l...@1  LTORG
EJECT
@@a...@1 DSECT
DSXL144
ORG   @@a...@1
#GPR_SA_1 DS   18F
DSF
@@pa...@1 DSECT
DSXL12
ORG   @@pa...@1+0
@2keyDSF
ORG   @@pa...@1+4
@3lenDSF
ORG   @@pa...@1+8
@4seed   DSF
EJECT
HASHMUR#C CSECT ,
@@co...@area@@ DS 0D
DCXL4'5BD1E995'
END   ,(5694A01   ,1B00,10209)



RKFATWTF!?  Not in my lexicon.  Nor in Google's, apparently.  But
the last three characters are familiar and hauntingly apt.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to 

Re: Hashin g algorith m for text strings w ithout emb edded blan ks‏

2010-07-27 Thread Rick Fochtman

---snip--


On 7/27/2010 8:42 PM, Rick Fochtman wrote:


I can tell you from bitter experience that while the algorithm
is fairly simple, implementation is most assuredly NOT simple. :-(



About twelve years ago I was working as a contractor at a government 
agency that routinely processed files with hundreds of millions of 
records. My task was data extraction maintenance for a program that 
did an insertion sort on selected records. It took a few days to get 
the code working, but it was time well spent. The hard part was 
reading out the records in sequence, a task that Knuth left as an 
exercise for the reader g


-unsnip-
I'll bet you a virtual case of your favorite beer that the answer was a 
recursive tree walker. :-)


I found the problem in building and balancing the tree, not extracting 
data from it.


Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


  1   2   >