Re: Time Gap in System Trace
These messages denote a gap in the time stamps. They say nothing about what the processor was actually doing during that interval: waiting, stopped, etc. This is exactly how parked processors look on a trace. Thanks, Ed. When I learned debugging, I was told that time gaps in systrace are a bad thing and to be very wary. Doing a systrace only for the active address space still spits out all these messages, which was confusing to me. Best regards, Barbara -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: COBOL HLPI JCL sample needed
Donald Johnson wrote: Can someone help me by providing a sample batch JCL member to compile COBOL programs using HLPI for DL/I? Perhaps, if you could tell us what is HLPI and DL/I. (I got a few vague hits in my bookmanager for DL/I, but nothing for HLPI.) Groete / Greetings Elardus Engelbrecht -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: remove() of PDSE member leaves PDS locked
On Mon, 26 Jul 2010 12:23:10 -0500, Paul Gilmartin paulgboul...@aim.com wrote: On Mon, 26 Jul 2010 11:02:24 -0500, Etienne Thijsse wrote: If I use the C function remove() to remove a member from a PDSE, then from that moment on, the PDSE is locked, ISPF says in use, I can't create a new member in it using fopen() in the same program. The PDSE only gets unlocked after the program has ended. The C RTL is a moron. It ought to use ISPF-style serialization rather than doing a blanket RESERVE. (I know; Shmuel will say that wouldn't be safe. Tell that to the ISPF designers.) And it ought to know the rules are different for PDSEs. If remove() fails to close the data set when it finishes, this ought to be cause for a PMR. But is there another stream that might be holding the data set open? -- gil Thanks for responding, Gil. There is no other stream. When I run under the debugger, the PDSE remains accessible with ISPF right up to the remove() statement; when I step over it, it is locked. I think I will try some other methods to remove it, maybe a dynalloc() with __DISP_DELETE followed by dynfree() will remove it without locking up the PDSE. Or maybe if I first allocate the PDSE with dynalloc and then remove() the member using the DDNAME, and then dynfree() the DDNAME; maybe that will work. Thanks, Etienne -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: C-I-C-S vs KICKS and screws
We also say SNAH and KICKS in The Netherlands and during a course in Atlanta it took me a while to understand what was meant with C-I-C-S. On the matter of screws: I own a 91 Jeep Wrangler with a lot of torx screws and in time the torx-hole becomes a round hole. Allan-screws are a bit better but still have the same problem. I personally prefer hex-bolts. Just too bad that Chrysler used both metric and inch sizes on my Jeep. -- Maarten -Oorspronkelijk bericht- Van: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] Namens Mark Pace Verzonden: maandag 26 juli 2010 19:44 Aan: IBM-MAIN@BAMA.UA.EDU Onderwerp: Re: C-I-C-S vs KICKS I had an SE many years ago that did say S-N-A as SNAH. Confused me every time. I've never heard anyone try to say R-J-E as a word. What you you use, reggie? - ATTENTION: The information in this electronic mail message is private and confidential, and only intended for the addressee. Should you receive this message by mistake, you are hereby notified that any disclosure, reproduction, distribution or use of this message is strictly prohibited. Please inform the sender by reply transmission and delete the message without copying or opening it. Messages and attachments are scanned for all viruses known. If this message contains password-protected attachments, the files have NOT been scanned for viruses by the ING mail domain. Always scan attachments before opening them. - -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
United Statesians (was C-I-C-S vs KICKS)
Including of course south of the border! I wonder how many know that Mexico is The United States of Mexico = Estados Unidos Mexicanos refer wiki http://en.wikipedia.org/wiki/Mexico which does not correctly identify the United States of America in the second sentence. On Mon, 26 Jul 2010 06:52:38 -0600, Howard Brazee howard.bra...@cusys.edu wrote: On 23 Jul 2010 18:24:26 -0700, zedgarhoo...@gmail.com (zMan) wrote: That's OK, John, Ted was just repeating what I'd said many posts earlier. So you can agree with me, and sleep at night. P.S. I like United Statesians -- makes perfect sense! It still isn't sufficient, there are other American countries with names that start off with The United States of. Regards Bruce Hewson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
Barbara Nitz wrote: No, it's 64K tracks. It is the same per volume limit as many other data set types (non-extended). But PDSes and PDSEs are also limited to a single volume. I am surprised. I did not know about *those* limitations. And most certainly, since they are documented, there will be no way to change things. But: I seem to remember that PDSEs were touted as the only ones making sense on an EAV, because of the 'extented' part of the name, and that they could get bigger (but maybe I misunderstood). Not that I would encourage use of such a large volume, as it is much too slow, and I still haven't opened an ETR to address 90s (or more) until ISPF 3.4 gives you the directory view. (Might end up on an ISPF queue, which would require me to open a complaint due to incompetence.) PDSEs have only one advantage: They don't need to get compressed. The rest us a huge amount of disadvantages. Regards, Barbara Well, they do have at least one other advantage: they can store program objects, which allows entry points with long, case-sensitive names, which is sometimes handy. -- Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-393-8716 http://www.trainersfriend.com * To get a good Return on your Investment, first make an investment! + Training your people is an excellent investment -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: COBOL HLPI JCL sample needed
DL/I means basically IMS ... However I've not heard of HLPI :-( ... So can't help sorry ... Elardus Engelbrecht elardus.engelbre...@sita.co.za Sent by: IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu 27/07/2010 08:41 AM Please respond to IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu To IBM-MAIN@bama.ua.edu cc Subject Re: COBOL HLPI JCL sample needed Donald Johnson wrote: Can someone help me by providing a sample batch JCL member to compile COBOL programs using HLPI for DL/I? Perhaps, if you could tell us what is HLPI and DL/I. (I got a few vague hits in my bookmanager for DL/I, but nothing for HLPI.) Groete / Greetings Elardus Engelbrecht -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html This e-mail message, including any attachments transmitted with it, is CONFIDENTIAL and may contain legally privileged information. This message is intended solely for the use of the individual or entity to whom it is addressed. If you have received this message in error, please notify us immediately and delete it from your system. Please visit our website to read the full disclaimer: http://www.euroclear.com/site/public/disclaimer
Re: Another reason to hate PDSE's
Steve Comstock pisze: Barbara Nitz wrote: [...] PDSEs have only one advantage: They don't need to get compressed. The rest us a huge amount of disadvantages. Regards, Barbara Well, they do have at least one other advantage: they can store program objects, which allows entry points with long, case-sensitive names, which is sometimes handy. While I could provide more PDSE advantages than Barbara, I would not mention long names. Reason: I HAVE NEVER SEEN AN APPLICATION WHICH USES THEM. Long names are not handy for me. Of course I know, there are some... but not in operating system components. -- Radoslaw Skorupka Lodz, Poland -- BRE Bank SA ul. Senatorska 18 00-950 Warszawa www.brebank.pl Sd Rejonowy dla m. st. Warszawy XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, nr rejestru przedsibiorców KRS 025237 NIP: 526-021-50-88 Wedug stanu na dzie 01.01.2009 r. kapita zakadowy BRE Banku SA (w caoci wpacony) wynosi 118.763.528 zotych. W zwizku z realizacj warunkowego podwyszenia kapitau zakadowego, na podstawie uchway XXI WZ z dnia 16 marca 2008r., oraz uchway XVI NWZ z dnia 27 padziernika 2008r., moe ulec podwyszeniu do kwoty 123.763.528 z. Akcje w podwyszonym kapitale zakadowym BRE Banku SA bd w caoci opacone. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: COBOL HLPI JCL sample needed
HI, In response to the earlier posts: Can someone help me by providing a sample batch JCL member to compile COBOL programs using HLPI for DL/I? Perhaps, if you could tell us what is HLPI and DL/I. Historically DL/I was, and probably still is, the VSE equivalent of IMS DB on z/OS. I suspect that HLPI is the acronym for High Level Programming Interface. Logically there is a stub in much the same way that there is for CICS and DB2. The IMS (DL/I) sample libraries should contain the skeleton of the JCL required to perform the requisite compile and link. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Please remove my name from the mailing list
Mathew, You obviously didn't read John M's previous note The clue is to read the bottom of every post on this list and it tells you what to do ... As John said 'Youth of today eh ?' Enjoy ... - Tibish Mathew tibish.mat...@wipro.com Sent by: IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu 26/07/2010 06:37 PM Please respond to IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu To IBM-MAIN@bama.ua.edu cc Subject Please remove my name from the mailing list Please do not print this email unless it is absolutely necessary. The information contained in this electronic message and any attachments to this message are intended for the exclusive use of the addressee(s) and may contain proprietary, confidential or privileged information. If you are not the intended recipient, you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately and destroy all copies of this message and any attachments. WARNING: Computer viruses can be transmitted via email. The recipient should check this email and any attachments for the presence of viruses. The company accepts no liability for any damage caused by any virus transmitted by this email. www.wipro.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html This e-mail message, including any attachments transmitted with it, is CONFIDENTIAL and may contain legally privileged information. This message is intended solely for the use of the individual or entity to whom it is addressed. If you have received this message in error, please notify us immediately and delete it from your system. Please visit our website to read the full disclaimer: http://www.euroclear.com/site/public/disclaimer
Re: remove() of PDSE member leaves PDS locked
Etienne Thijsse wrote: On Mon, 26 Jul 2010 12:23:10 -0500, Paul Gilmartin paulgboul...@aim.com wrote: On Mon, 26 Jul 2010 11:02:24 -0500, Etienne Thijsse wrote: If I use the C function remove() to remove a member from a PDSE, then from that moment on, the PDSE is locked, ISPF says in use, I can't create a new member in it using fopen() in the same program. The PDSE only gets unlocked after the program has ended. The C RTL is a moron. It ought to use ISPF-style serialization rather than doing a blanket RESERVE. (I know; Shmuel will say that wouldn't be safe. Tell that to the ISPF designers.) And it ought to know the rules are different for PDSEs. If remove() fails to close the data set when it finishes, this ought to be cause for a PMR. But is there another stream that might be holding the data set open? -- gil Thanks for responding, Gil. There is no other stream. When I run under the debugger, the PDSE remains accessible with ISPF right up to the remove() statement; when I step over it, it is locked. I think I will try some other methods to remove it, maybe a dynalloc() with __DISP_DELETE followed by dynfree() will remove it without locking up the PDSE. Or maybe if I first allocate the PDSE with dynalloc and then remove() the member using the DDNAME, and then dynfree() the DDNAME; maybe that will work. What is a real shame is that ISPF LMM services were not built on top of a services layer. In the 21st century the last thing a programmer wants to do is hack about with assembler macros. SAS/C has a nice BSAM low-level layer which has an osstow() function which is just what we need on z/OS. Unfortunately, it's time to RYO. Thanks, Etienne -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: COBOL HLPI JCL sample needed
Thanks Terry, in my stupor, I had forgotten to look in the IMS Sample libs. I will check there and hopefully have that JCL. Your analysis was spot on, by the way. * dj * On Tue, Jul 27, 2010 at 6:29 AM, Terry Sambrooks terry.sambro...@btclick.com wrote: HI, In response to the earlier posts: Can someone help me by providing a sample batch JCL member to compile COBOL programs using HLPI for DL/I? Perhaps, if you could tell us what is HLPI and DL/I. Historically DL/I was, and probably still is, the VSE equivalent of IMS DB on z/OS. I suspect that HLPI is the acronym for High Level Programming Interface. Logically there is a stub in much the same way that there is for CICS and DB2. The IMS (DL/I) sample libraries should contain the skeleton of the JCL required to perform the requisite compile and link. Kind Regards - Terry Director KMS-IT Limited 228 Abbeydale Road South Dore Sheffield S17 3LA UK Reg : 3767263 Outgoing e-mails have been scanned, but it is the recipients responsibility to ensure their anti-virus software is up to date. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: remove() of PDSE member leaves PDS locked
On Tue, 27 Jul 2010 19:02:19 +0800, David Crayford dcrayf...@gmail.com wrote: Etienne Thijsse wrote: On Mon, 26 Jul 2010 12:23:10 -0500, Paul Gilmartin paulgboul...@aim.com wrote: On Mon, 26 Jul 2010 11:02:24 -0500, Etienne Thijsse wrote: If I use the C function remove() to remove a member from a PDSE, then from that moment on, the PDSE is locked, ISPF says in use, I can't create a new member in it using fopen() in the same program. The PDSE only gets unlocked after the program has ended. The C RTL is a moron. It ought to use ISPF-style serialization rather than doing a blanket RESERVE. (I know; Shmuel will say that wouldn't be safe. Tell that to the ISPF designers.) And it ought to know the rules are different for PDSEs. If remove() fails to close the data set when it finishes, this ought to be cause for a PMR. But is there another stream that might be holding the data set open? -- gil Thanks for responding, Gil. There is no other stream. When I run under the debugger, the PDSE remains accessible with ISPF right up to the remove() statement; when I step over it, it is locked. I think I will try some other methods to remove it, maybe a dynalloc() with __DISP_DELETE followed by dynfree() will remove it without locking up the PDSE. Or maybe if I first allocate the PDSE with dynalloc and then remove() the member using the DDNAME, and then dynfree() the DDNAME; maybe that will work. What is a real shame is that ISPF LMM services were not built on top of a services layer. In the 21st century the last thing a programmer wants to do is hack about with assembler macros. SAS/C has a nice BSAM low-level layer which has an osstow() function which is just what we need on z/OS. Unfortunately, it's time to RYO. The previous version of our product was in fact written in SAS/C, and it did not have these problems; its PDS(E) support was a lot better. It had its own limitations, however, which forced us to go to the IBM compiler. Now I see myself faced with the task of implementing 'missing functionality', things that SAS/C could and IBM C can't. Anyway, I tried the dynalloc way with __DISP_DELETE, but it throws away the whole PDSE, not just the member; I must be doing something wrong... still investigating. The other option, allocating the PDSE, then removing DDNAME: (member) and dynfree the PDSE again works only partly: ISPF no longer reports the PDSE is in use, but fopen() to create a new member still fails. If anyone has an idea about how this can be fixed, that would be great. Or maybe you know of another method...? Thanks, Etienne -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: C-I-C-S vs KICKS
One type of screw head that I haven't seen mentioned here is the torx, or hexalobular, head. While the Philips screw was designed to cam out of the screw to prevent overtightening, the torx screw, like the Robertson screw, was designed to not cam out. It came about as better torque-limiting automatic screwdrivers were developed for use in factories and is becoming more popular for use on items like automobiles, bicycle brake systems, disk drive systems, computers, and other consumer electronics. Tom Kelman Capacity Planning Commerce Bank, Kansas City -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Dave Salt Sent: Monday, July 26, 2010 5:23 PM To: IBM-MAIN@bama.ua.edu Subject: Re: C-I-C-S vs KICKS So what's the advantage in having both Allen and Robertson screws? They seem to do the same thing. Allen keys are usually used at a 90 degree angle to the screw, which means they work more like a wrench than a screwdriver. Having said that, ratcheting screwdrivers can also be used in a wrench like fashion. I've used both Allen and Robertson screws straight on as well as at 90 degree angles, and in both cases I found Robertson much easier to work with. This brings up another advantage of Robertson screws, which is that they can easily be screwed in at just about any angle. In comparison, Phillips screws are difficult enough to screw in even when using them straight on, and if the job requires trying to screw them in at any sort of angle it becomes anything from highly frustrating to impossible. Robertson screws are not a new invention as they've been around for more than 100 years. Henry Ford recognized their value and wanted to make them in the U.S. but Robertson insisted he import them from Canada. So Ford more or less said screw you (pun intended) and continued using Phillips, even though Phillips are far inferior. Unfortunately it's been stuck that way ever since, but it's not Robertson that's getting screwed it's U.S. citizens. Dave Salt SimpList(tm) - try it; you'll get it! http://www.mackinney.com/products/program-development/simplist.html _ Learn more ways to connect with your buddies now http://go.microsoft.com/?linkid=9734388 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html * If you wish to communicate securely with Commerce Bank and its affiliates, you must log into your account under Online Services at http://www.commercebank.com or use the Commerce Bank Secure Email Message Center at https://securemail.commercebank.com NOTICE: This electronic mail message and any attached files are confidential. The information is exclusively for the use of the individual or entity intended as the recipient. If you are not the intended recipient, any use, copying, printing, reviewing, retention, disclosure, distribution or forwarding of the message or any attached file is not authorized and is strictly prohibited. If you have received this electronic mail message in error, please advise the sender by reply electronic mail immediately and permanently delete the original transmission, any attachments and any copies of this message from your computer system. * -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: EMC Timefinder Snap and Dealloc
Hi Lizette, I think EMC gives us a choice with this parameter: AUTOMATIC_DEALLOC|AUTO_DEAlloc(YES|NO) The AUTOMATIC_DEALLOC parameter allows or disallows automatic issuance of an S DEALLOC command to z/OS when a device VARY ONLINE or VARY OFFLINE appears to be hung. z/OS sometimes requires a job to go through allocation to handle these situations. Possible values are: YES Allow TimeFinder to automatically issue an S DEALLOC. NO Prevent TimeFinder from automatically issuing an S DEALLOC. Comments - The AUTOMATIC_DEALLOC parameter has a matching site option, AUTODEAL. Table 13 on page 331 lists the site options. - The AUTOMATIC_DEALLOC parameter only applies to locally addressable volumes. AUTOMATIC_DEALLOC is ignored if you specify it on actions with the SYMDV#, LOCAL or REMOTE parameters. Default value YES Example AUTO_DEAL(NO) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Neon tries again to make a slap at IBM
Well, this article is certainly a slam at Neon with this statement. Neon Software is being a smart-alek by offering an IMS-only version of zPrime for $1, and it is a shameless means of growing what is still a pretty small installed base for the zPrime product. And I love what they say at the end of the article. Wouldn't it be funny if someone sold a tool that tweaked zPrime so it would then do the full gamut of mainframe offloading, as the full zPrime 2.1 does? There would be a certain kind of symmetry to that. Neon isn't probably going very far with the zPrime product until they resolve the lawsuits with IBM. Of course, the resolution would have to be in Neon's favor. I know that my company, for one, isn't going to get a product that has the possibility of being cut down in the courts. It's just too big a business risk. Tom Kelman -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Ed Gould Sent: Monday, July 26, 2010 11:53 PM To: IBM-MAIN@bama.ua.edu Subject: Neon tries again to make a slap at IBM http://www.channelregister.co.uk/2010/07/15/neon_zprime_ims/ Neon Software sells cut-down zPrime for IMSAlertPrint Post comment Retweet FacebookAccelerate flatfile mainframe databases for a buck Outside of someone not understanding that IMS is not a flat file access,its not that far off. http://www.channelregister.co.uk/2010/07/15/neon_zprime_ims/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html * If you wish to communicate securely with Commerce Bank and its affiliates, you must log into your account under Online Services at http://www.commercebank.com or use the Commerce Bank Secure Email Message Center at https://securemail.commercebank.com NOTICE: This electronic mail message and any attached files are confidential. The information is exclusively for the use of the individual or entity intended as the recipient. If you are not the intended recipient, any use, copying, printing, reviewing, retention, disclosure, distribution or forwarding of the message or any attached file is not authorized and is strictly prohibited. If you have received this electronic mail message in error, please advise the sender by reply electronic mail immediately and permanently delete the original transmission, any attachments and any copies of this message from your computer system. * -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: United Statesians (was C-I-C-S vs KICKS)
So, what do we in the United States of America call ourselves. We've been called Americans, Americanos, or some other variation probably every since we became a country. However, I was in Bolivia one year and when I said to one of the Bolivians that I was an American he said You know that we're Americans also, and I thought You know, he's right. There is a song Columbia, the Gem of the Ocean and another Hail, Columbia which were unofficial national anthems until The Star Spangled Banner became official. Hail Columbia is still the official song to announce the entry of the Vice President. Maybe we should change the name of the country to Columbia. Oh, wait, that name is already taken. Tom Kelman -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Bruce Hewson Sent: Tuesday, July 27, 2010 2:45 AM To: IBM-MAIN@bama.ua.edu Subject: United Statesians (was C-I-C-S vs KICKS) Including of course south of the border! I wonder how many know that Mexico is The United States of Mexico = Estados Unidos Mexicanos refer wiki http://en.wikipedia.org/wiki/Mexico which does not correctly identify the United States of America in the second sentence. On Mon, 26 Jul 2010 06:52:38 -0600, Howard Brazee howard.bra...@cusys.edu wrote: On 23 Jul 2010 18:24:26 -0700, zedgarhoo...@gmail.com (zMan) wrote: That's OK, John, Ted was just repeating what I'd said many posts earlier. So you can agree with me, and sleep at night. P.S. I like United Statesians -- makes perfect sense! It still isn't sufficient, there are other American countries with names that start off with The United States of. Regards Bruce Hewson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html * If you wish to communicate securely with Commerce Bank and its affiliates, you must log into your account under Online Services at http://www.commercebank.com or use the Commerce Bank Secure Email Message Center at https://securemail.commercebank.com NOTICE: This electronic mail message and any attached files are confidential. The information is exclusively for the use of the individual or entity intended as the recipient. If you are not the intended recipient, any use, copying, printing, reviewing, retention, disclosure, distribution or forwarding of the message or any attached file is not authorized and is strictly prohibited. If you have received this electronic mail message in error, please advise the sender by reply electronic mail immediately and permanently delete the original transmission, any attachments and any copies of this message from your computer system. * -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
CFRM Structure Names
Does anyone have a comprehensive list of structure names and who uses them? I am attempting to improve documentation and didn't want to reinvent the wheel if someone has already produced a list of most of them and their definitions. Thanks in advance, Bob - Robert B. Richards(Bob) US Office of Personnel Management 1900 E Street NW Room: BH04L Washington, D.C. 20415 Phone: (202) 606-1195 Email: robert.richa...@opm.govmailto:robert.richa...@opm.gov - -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: United Statesians (was C-I-C-S vs KICKS)
On Tue, Jul 27, 2010 at 3:44 AM, Bruce Hewson bruce_hew...@hotmail.comwrote: snip refer wiki http://en.wikipedia.org/wiki/Mexico which does not correctly identify the United States of America in the second sentence. So fix it... -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CFRM Structure Names
Richards, Robert B. robert.richa...@opm.gov wrote in message news:2d14e7856646224aacdda13ab1d355570a7020b...@wdcv7exvs2.opm.gov... Does anyone have a comprehensive list of structure names and who uses them? I am attempting to improve documentation and didn't want to reinvent the wheel if someone has already produced a list of most of them and their definitions. Thanks in advance, Bob Bob, This may be a starting point for a great deal of them: SA22-7625-17 MVS Setting Up a Sysplex (THE manual for all your sysplex questions). Ch. 4.7 Coupling Facility Structures for IBM Products You have the IBM products using structures and pointers to the individual documentation. Kees. For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: United Statesians (was C-I-C-S vs KICKS)
Columbia should be just fine according to wikipedia! Col'o'mbia is already taken ;) - Columbia From Wikipedia, the free encyclopedia Not to be confused with Colombia, the country in South America. Columbia (name) is a poetic name for America (in the sense of European colonies in the New World), and the feminine personification of the United States of America. - -- Maarten -Oorspronkelijk bericht- Van: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] Namens Kelman, Tom Verzonden: dinsdag 27 juli 2010 14:50 Aan: IBM-MAIN@BAMA.UA.EDU Onderwerp: Re: United Statesians (was C-I-C-S vs KICKS) So, what do we in the United States of America call ourselves. We've been called Americans, Americanos, or some other variation probably every since we became a country. However, I was in Bolivia one year and when I said to one of the Bolivians that I was an American he said You know that we're Americans also, and I thought You know, he's right. There is a song Columbia, the Gem of the Ocean and another Hail, Columbia which were unofficial national anthems until The Star Spangled Banner became official. Hail Columbia is still the official song to announce the entry of the Vice President. Maybe we should change the name of the country to Columbia. Oh, wait, that name is already taken. Tom Kelman - ATTENTION: The information in this electronic mail message is private and confidential, and only intended for the addressee. Should you receive this message by mistake, you are hereby notified that any disclosure, reproduction, distribution or use of this message is strictly prohibited. Please inform the sender by reply transmission and delete the message without copying or opening it. Messages and attachments are scanned for all viruses known. If this message contains password-protected attachments, the files have NOT been scanned for viruses by the ING mail domain. Always scan attachments before opening them. - -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CFRM Structure Names
On Tue, 27 Jul 2010 08:53:38 -0400, Richards, Robert B. robert.richa...@opm.gov wrote: Does anyone have a comprehensive list of structure names and who uses them? I am attempting to improve documentation and didn't want to reinvent the wheel if someone has already produced a list of most of them and their definitions. The names are user defined and are pointed to by the exploiter via parms. XCF signaling structures must start with IXC, but I can't think of other structures that have a similar requirement off the top of my head. Logstreams are another story, many of them have required names (OPERLOG, LOGREC, RRS for example), but I don't have a list for those either. Others like Health Checker are user defined and you tell the exploiter what name to use. For IBM exploiters perhaps the CFSIZER web site can at least tell you who uses them. http://www-947.ibm.com/systems/support/z/cfsizer/ Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:mzel...@flash.net Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html Systems Programming expert at http://expertanswercenter.techtarget.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: I'm amazed
Hello, I read the announcement and it is my understanding that at first only AIX will be supported, *But*, later availability announced for Linux on Intel based blades. Am I correct ? Arye. On 27 July 2010 02:03, Gainsford, Allen allen.gainsf...@hp.com wrote: Which is more interesting ?-) No question. Especially when the CICS one is really about screwdrivers. :) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
On Tue, 27 Jul 2010 12:26:50 +0200, R.S. wrote: Steve Comstock pisze: Barbara Nitz wrote: [...] PDSEs have only one advantage: They don't need to get compressed. The rest us a huge amount of disadvantages. Regards, Barbara And, I believe, multiple members can be written concurrently (I believe; am I right?) How would one do this? Must one OPEN two or more DCBs, one for each member being written? And one might yet wish to be able to append or update in place existing members. Well, they do have at least one other advantage: they can store program objects, which allows entry points with long, case-sensitive names, which is sometimes handy. Steve, why would you call that an advantage? I thought you despise case-sensitivity. Anyway, old fashioned PDSes allow case-sensitive (but not long) member names; it's merely higher level interfaces that try to conceal the case-sensitivity. Would you advocate supporting case-insensitivity at the DFSMS layer, similar to Windows? Mac OS X gives the programmer a choice with a granularity of volume. While I could provide more PDSE advantages than Barbara, I would not mention long names. Reason: I HAVE NEVER SEEN AN APPLICATION WHICH USES THEM. Long names are not handy for me. Of course I know, there are some... but not in operating system components. Isn't this a solution seeking a problem? What interfaces support them? Surely, one can't code // EXEC PGM=Case-sensitive-Long-name? What about ATTACH EP=Case-sensitive-Long-name? What's the format of the word returned by NOTE for a PDSE. It's been discussed here that the low 24 bits contain the relative record number within a member (biased by 0x10). Do the top 8 bits then identify the member? What happens, then, if a programmer performs BLDL for 257 different members? can the NOTE words identify connections to all? If one performs 2 BLDLs for the same member, are the two returned pointers identical? How do Unix directories compare? o They don't need to be compressed. o Multiple members can be written concurrently. o Members can be appended or updated in place (with a granularity of byte.). o They support long case-sensitive names. o They allow a mixture of program objects and other member types. Deficiencies: o Alias entry points are not supported (AFAIK). o The BPAM support is read-only (so far). Questions: o How do performance and reliablity compare with PDS[E]? I suppose there might be four answers, separate for PDS vs. PDSE and for HFS vs. zFS. o What is the limit on member size? o What is the limit on number of members? -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: remove() of PDSE member leaves PDS locked
On Tue, 27 Jul 2010 19:02:19 +0800, David Crayford wrote: Etienne Thijsse wrote: Thanks for responding, Gil. There is no other stream. When I run under the debugger, the PDSE remains accessible with ISPF right up to the remove() statement; when I step over it, it is locked. It's yet possible that there's an outstanding ENQ SHR due ta another stream, or even an allocation in another job step. remove() upgrades this to EXC (bad design of C RTL; as you say, SAS (RIP) does better). Then there's no way to downgrade it to SHR (bad design of GRS). (BTW, what happens if you attempt the remove() while a different job holds ENQ SHR on the DSN?) What is a real shame is that ISPF LMM services were not built on top of a services layer. In the 21st century the last thing a programmer wants to do is hack about with assembler macros. SAS/C has a nice BSAM low-level layer which has an osstow() function which is just what we need on z/OS. Unfortunately, it's time to RYO. I thougnt ISPF services were available from Rexx address ISPEXEC and various other languages via CALL. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: remove() of PDSE member leaves PDS locked
On Tue, 27 Jul 2010 08:47:30 -0500, Paul Gilmartin paulgboul...@aim.com wrote: On Tue, 27 Jul 2010 19:02:19 +0800, David Crayford wrote: Etienne Thijsse wrote: Thanks for responding, Gil. There is no other stream. When I run under the debugger, the PDSE remains accessible with ISPF right up to the remove() statement; when I step over it, it is locked. It's yet possible that there's an outstanding ENQ SHR due ta another stream, or even an allocation in another job step. remove() upgrades this to EXC (bad design of C RTL; as you say, SAS (RIP) does better). Then there's no way to downgrade it to SHR (bad design of GRS). (BTW, what happens if you attempt the remove() while a different job holds ENQ SHR on the DSN?) What is a real shame is that ISPF LMM services were not built on top of a services layer. In the 21st century the last thing a programmer wants to do is hack about with assembler macros. SAS/C has a nice BSAM low-level layer which has an osstow() function which is just what we need on z/OS. Unfortunately, it's time to RYO. I thougnt ISPF services were available from Rexx address ISPEXEC and various other languages via CALL. That may well be true. At this moment however, I know nothing about ISPF services or how to call them from C. I'll keep this in mind as a lost resort, if all else fails. At the moment I am contemplating creating a separate executable, DELMBR, that will use remove() to delete it, thereby locking the PDSE, but when it finishes, the PDSE is unlocked. If I use system() to call this program then maybe the PDSE won't be locked when DELMBR finishes and fopen() succeeds... hopefully. Thanks, Etienne -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CFRM Structure Names
Kees, I had that open when I asked the question! smile I was not very impressed. no smile I attempted Google searches on some of them and was, again, a little disappointed. Bob -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Vernooij, CP - SPLXM Sent: Tuesday, July 27, 2010 9:17 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CFRM Structure Names Richards, Robert B. robert.richa...@opm.gov wrote in message news:2d14e7856646224aacdda13ab1d355570a7020b...@wdcv7exvs2.opm.gov... Does anyone have a comprehensive list of structure names and who uses them? I am attempting to improve documentation and didn't want to reinvent the wheel if someone has already produced a list of most of them and their definitions. Thanks in advance, Bob Bob, This may be a starting point for a great deal of them: SA22-7625-17 MVS Setting Up a Sysplex (THE manual for all your sysplex questions). Ch. 4.7 Coupling Facility Structures for IBM Products You have the IBM products using structures and pointers to the individual documentation. Kees. For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: C-I-C-S vs KICKS and screws
On 27 Jul 2010 00:03:45 -0700, maarten.slegtenho...@mail.ing.nl (Maarten Slegtenhorst) wrote: On the matter of screws: I own a 91 Jeep Wrangler with a lot of torx screws and in time the torx-hole becomes a round hole. Allan-screws are a bit better but still have the same problem. I personally prefer hex-bolts. Just too bad that Chrysler used both metric and inch sizes on my Jeep. Hex bolts only work when we want to end up with a head sticking out. Torx, Allen, Robertson (and Phillips flathead) can be flush. But when they are appropriate, they work the best.I'm quite happy with Allen for most everything else though. The round-hole bit can become a problem if people are sloppy.One nice thing is that a set of Allen wrenches can be all in one tool, so we have all the sizes without going back to the tool box - or without using the wrong size, creating that round-hole problem. Using an electric drill people can prefer Phillips - but a stripped Phillips is worthless. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: I'm amazed
On 26 Jul 2010 14:27:44 -0700, ken.porow...@cit.com (Ken Porowski) wrote: IBM makes what is claimed to be the biggest Mainframe announcement in decades and most of the traffic on this list is on the etymology of CICS and PoPs I love it. It's not like I'm going out today to buy a new mainframe. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: I'm amazed
It may be that they don't have the management piece for Linux yet Power7/AIX supported from November xBlades/Linux support is only a statement of direction for 1st half 2011 Maybe when that comes out we'll see Power7/Linux -Original Message- Kirk Wolf On Mon, Jul 26, 2010 at 4:33 PM, Starr, Alan alan_st...@calpers.ca.gov wrote: It would indeed be interesting to see discussion of this biggest Mainframe announcement in decades. 3) Is it sufficient to support AIX but not the other flavors of Unix (if I read the announcement correctly)? I also found this curious. From what I understand, the Power7 BladeCenter runs both AIX and Linux: http://www-03.ibm.com/systems/bladecenter/hardware/servers/ps700series/i ndex.html Why would Linux on Power be excluded? (but not Linux on X64?) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: United Statesians (was C-I-C-S vs KICKS)
On 27 Jul 2010 05:51:04 -0700, thomas.kel...@commercebank.com (Kelman, Tom) wrote: So, what do we in the United States of America call ourselves. Our name is like the United Nations or the United Kingdom - a description about what was wanted instead of a real name. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: C-I-C-S vs KICKS and screws
OH COME ON! Can we PLEASE kill this thread, NOW? Howard Brazee howard.bra...@cusys.edu 7/27/2010 10:13 AM On 27 Jul 2010 00:03:45 -0700, maarten.slegtenho...@mail.ing.nl (Maarten Slegtenhorst) wrote: On the matter of screws: I own a 91 Jeep Wrangler with a lot of torx screws and in time the torx-hole becomes a round hole. Allan-screws are a bit better but still have the same problem. I personally prefer hex-bolts. Just too bad that Chrysler used both metric and inch sizes on my Jeep. Hex bolts only work when we want to end up with a head sticking out. Torx, Allen, Robertson (and Phillips flathead) can be flush. But when they are appropriate, they work the best.I'm quite happy with Allen for most everything else though. The round-hole bit can become a problem if people are sloppy.One nice thing is that a set of Allen wrenches can be all in one tool, so we have all the sizes without going back to the tool box - or without using the wrong size, creating that round-hole problem. Using an electric drill people can prefer Phillips - but a stripped Phillips is worthless. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains confidential and privileged information intended only for the addressee. If you are not the intended recipient, please be advised that you have received this material in error and that any forwarding, copying, printing, distribution, use or disclosure of the material is strictly prohibited. If you have received this material in error, please (i) do not read it, (ii) reply to the sender that you received the message in error, and (iii) erase or destroy the material. Emails are not secure and can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by email. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CFRM Structure Names
Mark, Thanks for the pointers. So far, my best source is the reason I am documenting them now: the paper called System-Managed CF Structure Duplexing. I am in the process of identifying what should/should not be duplexed and thought I would produce a document of those decisions. Most structures are obvious but, again, I was looking to save myself some work if others have already produced it. As an alternative, anyone care to send me their policy defs so I can compare what I think should be duplexed and what you already KNOW should and have it working? Virtual beer to the first respondent. :-) Bob -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Mark Zelden Sent: Tuesday, July 27, 2010 9:31 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CFRM Structure Names On Tue, 27 Jul 2010 08:53:38 -0400, Richards, Robert B. robert.richa...@opm.gov wrote: Does anyone have a comprehensive list of structure names and who uses them? I am attempting to improve documentation and didn't want to reinvent the wheel if someone has already produced a list of most of them and their definitions. The names are user defined and are pointed to by the exploiter via parms. XCF signaling structures must start with IXC, but I can't think of other structures that have a similar requirement off the top of my head. Logstreams are another story, many of them have required names (OPERLOG, LOGREC, RRS for example), but I don't have a list for those either. Others like Health Checker are user defined and you tell the exploiter what name to use. For IBM exploiters perhaps the CFSIZER web site can at least tell you who uses them. http://www-947.ibm.com/systems/support/z/cfsizer/ Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:mzel...@flash.net Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html Systems Programming expert at http://expertanswercenter.techtarget.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CFRM Structure Names
Did I get the VB? We don't have any structures system managed duplexed because of the distance between de CF's in both our data centers. Kees. Richards, Robert B. robert.richa...@opm.gov wrote in message news:2d14e7856646224aacdda13ab1d355570a7020b...@wdcv7exvs2.opm.gov... Mark, Thanks for the pointers. So far, my best source is the reason I am documenting them now: the paper called System-Managed CF Structure Duplexing. I am in the process of identifying what should/should not be duplexed and thought I would produce a document of those decisions. Most structures are obvious but, again, I was looking to save myself some work if others have already produced it. As an alternative, anyone care to send me their policy defs so I can compare what I think should be duplexed and what you already KNOW should and have it working? Virtual beer to the first respondent. :-) Bob -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Mark Zelden Sent: Tuesday, July 27, 2010 9:31 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CFRM Structure Names On Tue, 27 Jul 2010 08:53:38 -0400, Richards, Robert B. robert.richa...@opm.gov wrote: Does anyone have a comprehensive list of structure names and who uses them? I am attempting to improve documentation and didn't want to reinvent the wheel if someone has already produced a list of most of them and their definitions. The names are user defined and are pointed to by the exploiter via parms. XCF signaling structures must start with IXC, but I can't think of other structures that have a similar requirement off the top of my head. Logstreams are another story, many of them have required names (OPERLOG, LOGREC, RRS for example), but I don't have a list for those either. Others like Health Checker are user defined and you tell the exploiter what name to use. For IBM exploiters perhaps the CFSIZER web site can at least tell you who uses them. http://www-947.ibm.com/systems/support/z/cfsizer/ Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:mzel...@flash.net Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html Systems Programming expert at http://expertanswercenter.techtarget.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: remove() of PDSE member leaves PDS locked
On Tue, 27 Jul 2010 09:01:46 -0500, Etienne Thijsse wrote: That may well be true. At this moment however, I know nothing about ISPF services or how to call them from C. I'll keep this in mind as a lost resort, if all else fails. The best I can say is that it's in the book. At the moment I am contemplating creating a separate executable, DELMBR, that will use remove() to delete it, thereby locking the PDSE, but when it finishes, the PDSE is unlocked. If I use system() to call this program then maybe the PDSE won't be locked when DELMBR finishes and fopen() succeeds... hopefully. Is your C program holding an ENQ SHR on the DSN? You can probe this prior to the remove() by submitting a batch job that attempts to allocate the PDSE with DISP=OLD. If you hold the ENQ SHR, then: o If system(DELMBR) runs in the same address space, it will upgrade the ENQ to EXC and leave the PDSE locked. o If system(DELMBR) runs in a separate address space, it will attempt to obtain an ENQ EXC and fail. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CFRM Structure Names
Yes, you were the first respondent. I should have made it an offline request *and* the actual define policy JCL! :-) Bob -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Vernooij, CP - SPLXM Sent: Tuesday, July 27, 2010 10:41 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CFRM Structure Names Did I get the VB? We don't have any structures system managed duplexed because of the distance between de CF's in both our data centers. Kees. Richards, Robert B. robert.richa...@opm.gov wrote in message news:2d14e7856646224aacdda13ab1d355570a7020b...@wdcv7exvs2.opm.gov... Mark, Thanks for the pointers. So far, my best source is the reason I am documenting them now: the paper called System-Managed CF Structure Duplexing. I am in the process of identifying what should/should not be duplexed and thought I would produce a document of those decisions. Most structures are obvious but, again, I was looking to save myself some work if others have already produced it. As an alternative, anyone care to send me their policy defs so I can compare what I think should be duplexed and what you already KNOW should and have it working? Virtual beer to the first respondent. :-) Bob -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Mark Zelden Sent: Tuesday, July 27, 2010 9:31 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CFRM Structure Names On Tue, 27 Jul 2010 08:53:38 -0400, Richards, Robert B. robert.richa...@opm.gov wrote: Does anyone have a comprehensive list of structure names and who uses them? I am attempting to improve documentation and didn't want to reinvent the wheel if someone has already produced a list of most of them and their definitions. The names are user defined and are pointed to by the exploiter via parms. XCF signaling structures must start with IXC, but I can't think of other structures that have a similar requirement off the top of my head. Logstreams are another story, many of them have required names (OPERLOG, LOGREC, RRS for example), but I don't have a list for those either. Others like Health Checker are user defined and you tell the exploiter what name to use. For IBM exploiters perhaps the CFSIZER web site can at least tell you who uses them. http://www-947.ibm.com/systems/support/z/cfsizer/ Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:mzel...@flash.net Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html Systems Programming expert at http://expertanswercenter.techtarget.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Synchronizing the IOCDS and the DS6800
We are installing a new z10 with a minimal DS6800 in a very small data center (to replace our venerable MP2003). Using the SMC, we have configured the DS6800 with RAID 5 to give us 250GB of usable storage set up as eleven 3390-3s and the rest as 3390-9s. (We wanted to use RAID 10 but the system insisted on keeping two of the DDMs in reserve so we ended up with only 125GB which is not sufficient.) I am using the Stand Alone IOCP on the z10 HMC to build the IOCDS. I have looked at every DS6800, HMC, IOCP, and HCD manual I could find but I cannot find any description of how the ADDRESS operand on the IODEVICE statement relates to the logical volumes on the DS6800. I have the same problem relating the CUNUMBER and CUADD operands on the CTLUNIT statement to the physical and logical control units on the DS6800. The Customs Offering Driver manual (GI11-2843-04) shows 3390 devices at addresses D40-D5F. Obviously I'm missing something but I see no method of assigning those addresses on the DS6800. A pointer to the relevant section of a manual would be greatly appreciated. Suggestions on how to use RAID 10 would also be welcome. Thank you -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
PDSEs have only one advantage: snip Well, they do have at least one other advantage: they can store program objects, which allows entry points with long, case-sensitive names, which is sometimes handy. http://bama.ua.edu/archives/ibm-main.html No not really. Longer names may be contained within the program object, e.g. CALL someverylongname and the binder will make sense of it. External entrypoints (those that could be used by ATTACH, LINK etc.) are still only 8 bytes long. -- This email might be from the artist formerly known as CC (or not) You be the judge. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Any ROT for DASD Response time
See imbedded. Hal -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Ron Hawkins Sent: Thursday, July 22, 2010 10:54 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Any ROT for DASD Response time Hal, I should have been clear. The statement I disagreed with is: It does not really matter what the response times are, the issue is that they are too slow I'm not sure where I can agree with you, and I still fail to see how near perfect response time can be too slow. If the DASD is delivering near perfect response times, then it can't go faster. If that's still not fast enough, then one -must- address I/O reduction. War story: most loved online was hitting a ceiling and just wouldn't scale past a specific transaction load. The cause was traced to a single checkpoint dataset. The fastest hardware available was brought in but it was not fast enough. The very reluctant, politically powerful support team was forced to address the I/O to that dataset. A relatively minor change solved the problem. The point is that making application changes may meet with a -lot- of resistance, but ya gotta do whatcha gotta do. To be fair, -any- change to that application was a medium to high risk. Any volume averaging 0.3ms response time is pretty close to zero delay, where a delay is something queued or waiting. I'm not sure why you don't believe this. The OP reported measurable delays. Therefore, it was unlikely the DASD was delivering optimal response times. ..snip I believe Response time does matter because it is a guide to the action required. It just should not be considered as the only metric that decides if IO is delaying an application. That's the key point putting us into substantial agreement. ..snip Ron -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Hal Merritt Sent: Thursday, July 22, 2010 7:49 AM To: IBM-MAIN@bama.ua.edu Subject: Re: [IBM-MAIN] Any ROT for DASD Response time Short answer: yes. And you go on to agree. Let's take a look at the OP's issue: Not meeting SLA's. A logical first place to look is DASD, and we find 'delays'. What kind of delay and how long of a delay we don't know. The question is how long of a delay is normal and to be expected. A ROT for an acceptable range. I find it a little hard to believe that a DASD subsystem can deliver 0.3ms response times with measurable delays. Therefore, IMHO, any measurable delay should be investigated and, if feasible, reduced. To zero. Of course, I/O avoidance is almost always something we want to consider. But that does not address the OP's question. NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: remove() of PDSE member leaves PDS locked
On Tue, 27 Jul 2010 09:47:15 -0500, Paul Gilmartin paulgboul...@aim.com wrote: On Tue, 27 Jul 2010 09:01:46 -0500, Etienne Thijsse wrote: That may well be true. At this moment however, I know nothing about ISPF services or how to call them from C. I'll keep this in mind as a lost resort, if all else fails. The best I can say is that it's in the book. At the moment I am contemplating creating a separate executable, DELMBR, that will use remove() to delete it, thereby locking the PDSE, but when it finishes, the PDSE is unlocked. If I use system() to call this program then maybe the PDSE won't be locked when DELMBR finishes and fopen() succeeds... hopefully. Is your C program holding an ENQ SHR on the DSN? You can probe this prior to the remove() by submitting a batch job that attempts to allocate the PDSE with DISP=OLD. If you hold the ENQ SHR, then: o If system(DELMBR) runs in the same address space, it will upgrade the ENQ to EXC and leave the PDSE locked. o If system(DELMBR) runs in a separate address space, it will attempt to obtain an ENQ EXC and fail. Any idea how to get rid of this ENQ SHR ? Thanks, Etienne -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Synchronizing the IOCDS and the DS6800
IIRC, the relationship is implicit. The first ADDRESS refers to the first logical volume, the second ADDRESS is the second logical volume, and so on. This can get tricky if you delete a logical volume. HTH and good luck -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Schwarz, Barry A Sent: Tuesday, July 27, 2010 10:05 AM To: IBM-MAIN@bama.ua.edu Subject: Synchronizing the IOCDS and the DS6800 We are installing a new z10 with a minimal DS6800 in a very small data center (to replace our venerable MP2003). Using the SMC, we have configured the DS6800 with RAID 5 to give us 250GB of usable storage set up as eleven 3390-3s and the rest as 3390-9s. (We wanted to use RAID 10 but the system insisted on keeping two of the DDMs in reserve so we ended up with only 125GB which is not sufficient.) I am using the Stand Alone IOCP on the z10 HMC to build the IOCDS. I have looked at every DS6800, HMC, IOCP, and HCD manual I could find but I cannot find any description of how the ADDRESS operand on the IODEVICE statement relates to the logical volumes on the DS6800. I have the same problem relating the CUNUMBER and CUADD operands on the CTLUNIT statement to the physical and logical control units on the DS6800. The Customs Offering Driver manual (GI11-2843-04) shows 3390 devices at addresses D40-D5F. Obviously I'm missing something but I see no method of assigning those addresses on the DS6800. A pointer to the relevant section of a manual would be greatly appreciated. Suggestions on how to use RAID 10 would also be welcome. Thank you NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CFRM Structure Names
Who would want a VIRTUAL beer anyway, they are not anywhere near as good as the real thing! Richards, Robert B. robert.richa...@opm.gov 7/27/2010 10:59 AM Yes, you were the first respondent. I should have made it an offline request *and* the actual define policy JCL! :-) Bob -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Vernooij, CP - SPLXM Sent: Tuesday, July 27, 2010 10:41 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CFRM Structure Names Did I get the VB? We don't have any structures system managed duplexed because of the distance between de CF's in both our data centers. Kees. Richards, Robert B. robert.richa...@opm.gov wrote in message news:2d14e7856646224aacdda13ab1d355570a7020b...@wdcv7exvs2.opm.gov... Mark, Thanks for the pointers. So far, my best source is the reason I am documenting them now: the paper called System-Managed CF Structure Duplexing. I am in the process of identifying what should/should not be duplexed and thought I would produce a document of those decisions. Most structures are obvious but, again, I was looking to save myself some work if others have already produced it. As an alternative, anyone care to send me their policy defs so I can compare what I think should be duplexed and what you already KNOW should and have it working? Virtual beer to the first respondent. :-) Bob -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Mark Zelden Sent: Tuesday, July 27, 2010 9:31 AM To: IBM-MAIN@bama.ua.edu Subject: Re: CFRM Structure Names On Tue, 27 Jul 2010 08:53:38 -0400, Richards, Robert B. robert.richa...@opm.gov wrote: Does anyone have a comprehensive list of structure names and who uses them? I am attempting to improve documentation and didn't want to reinvent the wheel if someone has already produced a list of most of them and their definitions. The names are user defined and are pointed to by the exploiter via parms. XCF signaling structures must start with IXC, but I can't think of other structures that have a similar requirement off the top of my head. Logstreams are another story, many of them have required names (OPERLOG, LOGREC, RRS for example), but I don't have a list for those either. Others like Health Checker are user defined and you tell the exploiter what name to use. For IBM exploiters perhaps the CFSIZER web site can at least tell you who uses them. http://www-947.ibm.com/systems/support/z/cfsizer/ Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:mzel...@flash.net Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html Systems Programming expert at http://expertanswercenter.techtarget.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives
IBMLink REMINDER: SRD Order Delivery Servers firewalls may need to be updated
Hi, One of our teams recently had difficulty downloading PTFs and again we traced it back to servers that were in use by IBMLink that were not in our firewall. We complained that we had not been notified of changes. This was acknowledged and an IBMLink news item was posted (PMR# 50090,487) REMINDER: SRD Order Delivery Servers This is just a reminder to ServiceLink users that the FTP servers which host orders for SRD that are delivered via INET were changed earlier this year. Please make sure that your corporate and/or personal firewall settings are adjusted accordingly. The current delivery servers and their IP addresses are as follows: delivery01-bld.dhe.ibm.com: 170.225.15.101 129.35.224.101 delivery01-mul.dhe.ibm.com: 129.35.224.102 170.225.15.102 download1.boulder.ibm.com : 170.225.15.106 download1.mul.ie.ibm.com : 129.35.224.106 An IBMLINK news item is posted now to provide the formal notification of the new sites, however, this appears to have happened several months ago and I can find no formal warning, like the October 2009 notifications. In regulated institution it is normal for firewall committees to keep a tight rein on the IP access list changes. We need fair notification to allow time to make these changes. Did anyone else miss this? I still cannot find a previous notification. Best Regards, Sam Knutson, GEICO System z Team Leader mailto:sknut...@geico.com (office) 301.986.3574 (cell) 301.996.1318 See how much YOU could save with GEICO! Use Referral Code: 61033 *Start Quote Now: http://www.geico.com/friends This email/fax message is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution of this email/fax is prohibited. If you are not the intended recipient, please destroy all paper and electronic copies of the original message. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: remove() of PDSE member leaves PDS locked
On Tue, 27 Jul 2010 10:15:11 -0500, Etienne Thijsse wrote: Any idea how to get rid of this ENQ SHR ? Have you verified that there's an outstanding ENQ? Use the TSO command FREE DSN(whatever.dsn) or equivalent call to DYNALLOC or BPXWDYN. Use TSO LISTALC STATUS SYSNAMES and find the DDNAME and FREE that. You probably don't want to do any of those. It's not nice to deceive the C RTL. FREE will fail if there's a DCB open on the DDNAME. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Synchronizing the IOCDS and the DS6800
Hope this helps if you need I can send IOCDS input file as a guide. This is a DS6800 setup CNTLUNIT CUNUMBR=3000,PATH=((CSS(0),D2,D3,D4,D5)),* UNITADD=((00,256)),CUADD=0,UNIT=1750 IODEVICE ADDRESS=(3000,256),CUNUMBR=(3000),STADET=Y,UNIT=3390 CNTLUNIT CUNUMBR=3100,PATH=((CSS(0),D2,D3,D4,D5)),* UNITADD=((00,256)),CUADD=1,UNIT=1750 IODEVICE ADDRESS=(3100,256),CUNUMBR=(3100),STADET=Y,UNIT=3390 CNTLUNIT CUNUMBR=3200,PATH=((CSS(0),D2,D3,D4,D5)),* UNITADD=((00,256)),CUADD=2,UNIT=1750 IODEVICE ADDRESS=(3200,256),CUNUMBR=(3200),STADET=Y,UNIT=3390 CNTLUNIT CUNUMBR=3300,PATH=((CSS(0),D2,D3,D4,D5)),* UNITADD=((00,256)),CUADD=3,UNIT=1750 IODEVICE ADDRESS=(3300,256),CUNUMBR=(3300),STADET=Y,UNIT=3390 Michael Saraco Systems Consultant 303-838-3374 x115 Cell 507-525-0530 From: Hal Merritt hmerr...@jackhenry.com To: IBM-MAIN@bama.ua.edu Date: 07/27/2010 10:26 AM Subject:Re: Synchronizing the IOCDS and the DS6800 Sent by:IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu IIRC, the relationship is implicit. The first ADDRESS refers to the first logical volume, the second ADDRESS is the second logical volume, and so on. This can get tricky if you delete a logical volume. HTH and good luck -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Schwarz, Barry A Sent: Tuesday, July 27, 2010 10:05 AM To: IBM-MAIN@bama.ua.edu Subject: Synchronizing the IOCDS and the DS6800 We are installing a new z10 with a minimal DS6800 in a very small data center (to replace our venerable MP2003). Using the SMC, we have configured the DS6800 with RAID 5 to give us 250GB of usable storage set up as eleven 3390-3s and the rest as 3390-9s. (We wanted to use RAID 10 but the system insisted on keeping two of the DDMs in reserve so we ended up with only 125GB which is not sufficient.) I am using the Stand Alone IOCP on the z10 HMC to build the IOCDS. I have looked at every DS6800, HMC, IOCP, and HCD manual I could find but I cannot find any description of how the ADDRESS operand on the IODEVICE statement relates to the logical volumes on the DS6800. I have the same problem relating the CUNUMBER and CUADD operands on the CTLUNIT statement to the physical and logical control units on the DS6800. The Customs Offering Driver manual (GI11-2843-04) shows 3390 devices at addresses D40-D5F. Obviously I'm missing something but I see no method of assigning those addresses on the DS6800. A pointer to the relevant section of a manual would be greatly appreciated. Suggestions on how to use RAID 10 would also be welcome. Thank you NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: getting NJE node name
yes, very much thanks Andy Robertson telephone mobile 0777 214 9545 home 01308 420797 From: Charles Mills charl...@mcn.org Does the following fragment help? * * INFORMATION RETRIEVED FROM JES VIA IEFSSREQ LAR1,ASSOB MVC RVDERMAC,=CL8'IEFSSREQ' IEFSSREQ , snip ** This email is confidential and may contain copyright material of the John Lewis Partnership. If you are not the intended recipient, please notify us immediately and delete all copies of this message. (Please note that it is your responsibility to scan this message for viruses). Email to and from the John Lewis Partnership is automatically monitored for operational and lawful business reasons. ** John Lewis plc Registered in England 233462 Registered office 171 Victoria Street London SW1E 5NN Websites: http://www.johnlewis.com http://www.waitrose.com http://www.greenbee.com http://www.johnlewispartnership.co.uk ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: remove() of PDSE member leaves PDS locked
On Tue, 27 Jul 2010 10:47:07 -0500, Paul Gilmartin paulgboul...@aim.com wrote: On Tue, 27 Jul 2010 10:15:11 -0500, Etienne Thijsse wrote: Any idea how to get rid of this ENQ SHR ? Have you verified that there's an outstanding ENQ? Use the TSO command FREE DSN(whatever.dsn) or equivalent call to DYNALLOC or BPXWDYN. Use TSO LISTALC STATUS SYSNAMES and find the DDNAME and FREE that. You probably don't want to do any of those. It's not nice to deceive the C RTL. FREE will fail if there's a DCB open on the DDNAME. -- gil There is a SYS00035 DDNAME associated with the PDSE, but freeing it with dynfree gave me error 4 reason 1056, which means the dataset hasn't been closed. :-( So that didn't work... Thanks, Etienne -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: remove() of PDSE member leaves PDS locked
On Tue, 27 Jul 2010 11:35:24 -0500, Etienne Thijsse wrote: There is a SYS00035 DDNAME associated with the PDSE, but freeing it with dynfree gave me error 4 reason 1056, which means the dataset hasn't been closed. :-( So that didn't work... Was it SHR? Why does C RTL have it OPEN? (It's probably only trying to help you.) Thinking of it, ISPF is probably bad advice. You'd need to be running under ISPF, which means you'd need to be running under TSO, which means you'd need to be running APF authorized. PITA. I hate MVS! I tried an experiment. It appears that FTP can delete a member while a PDS (I didn't try PDSE) is allocated SHR. Can you FTP LOCALHOST from your C program? Have you considered z/OS Unix files as an alternative to PDSE? Even though it is MVS, it's remarkably free of the allocation mickeymouse. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
On Mon, 26 Jul 2010 17:57:07 +, Ted MacNEIL wrote: I don't even like ordinary PDS. Other operating systems don't need them. That doesn't make them wrong. There are some implementation flaws, but they exist, so use them, and know flaws and repairs. If you don't understand what's wrong with PDS, re-read Etienne Thijsse's thread on attempting to delete a PDSE member. Or imagine my astonished dismay the first time I allocated a member with DISP=(OLD,DELETE) and watched the entire PDS vanish. Enough counterintuitive behaviors and flaws with recondite repairs add up to wrong. PS: Can you spell DLL? Nobody's perfect; that's no excuse. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: remove() of PDSE member leaves PDS locked
On Tue, 27 Jul 2010 11:50:35 -0500, Paul Gilmartin paulgboul...@aim.com wrote: On Tue, 27 Jul 2010 11:35:24 -0500, Etienne Thijsse wrote: There is a SYS00035 DDNAME associated with the PDSE, but freeing it with dynfree gave me error 4 reason 1056, which means the dataset hasn't been closed. :-( So that didn't work... Was it SHR? Why does C RTL have it OPEN? (It's probably only trying to help you.) Thinking of it, ISPF is probably bad advice. You'd need to be running under ISPF, which means you'd need to be running under TSO, which means you'd need to be running APF authorized. PITA. I hate MVS! I tried an experiment. It appears that FTP can delete a member while a PDS (I didn't try PDSE) is allocated SHR. Can you FTP LOCALHOST from your C program? Have you considered z/OS Unix files as an alternative to PDSE? Even though it is MVS, it's remarkably free of the allocation mickeymouse. Its not SHR. I think because remove() has to update its directory. Why it is left open... beats me. Maybe because a subsequent remove() or rename() will go faster... (rename() has the same problem, by the way). APF authorized is bad. The program must be able to run without. So no ISPF... FTP is a nice twist :-) that may work (although performance will suck.., but beter something than nothing). Unix files work fine, I know. But I need to enable everything that worked in the previous version, the SAS/C one, which version worked fine with PDS's and PDSE's, but did not support Unix files. People that upgrade to the new version I am working on won't like it if I was to tell them PDS's are not supported anymore... Thanks, Etienne -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: remove() of PDSE member leaves PDS locked
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Etienne Thijsse Sent: Tuesday, July 27, 2010 12:09 PM To: IBM-MAIN@bama.ua.edu Subject: Re: remove() of PDSE member leaves PDS locked On Tue, 27 Jul 2010 11:50:35 -0500, Paul Gilmartin paulgboul...@aim.com wrote: SNIPPAGE Thinking of it, ISPF is probably bad advice. You'd need to be running under ISPF, which means you'd need to be running under TSO, which means you'd need to be running APF authorized. PITA. SNIPPAGE APF authorized is bad. The program must be able to run without. So no ISPF... FTP is a nice twist :-) that may work (although performance will suck.., but beter something than nothing). SNIPPAGE If you run under ISPF, you do not have to be APF authorized. You don't even have to run from an APF library. When you invoke PDF services (now integral to ISPF, right?), the service communicates with ISPF as needed and so the cross-over between the TCB you are running under (applications run as a daughter task to ISPF as I recall) and ISPF will deal with authorization issues. SO, you can use ISPF services in a TSO Batch environment (or online for that matter). And probably get done what you need to do. Regards, Steve Thompson -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: remove() of PDSE member leaves PDS locked
On Tue, 27 Jul 2010 13:49:30 -0400, Thompson, Steve steve_thomp...@stercomm.com wrote: -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Etienne Thijsse Sent: Tuesday, July 27, 2010 12:09 PM To: IBM-MAIN@bama.ua.edu Subject: Re: remove() of PDSE member leaves PDS locked On Tue, 27 Jul 2010 11:50:35 -0500, Paul Gilmartin paulgboul...@aim.com wrote: SNIPPAGE Thinking of it, ISPF is probably bad advice. You'd need to be running under ISPF, which means you'd need to be running under TSO, which means you'd need to be running APF authorized. PITA. SNIPPAGE APF authorized is bad. The program must be able to run without. So no ISPF... FTP is a nice twist :-) that may work (although performance will suck.., but beter something than nothing). SNIPPAGE If you run under ISPF, you do not have to be APF authorized. You don't even have to run from an APF library. When you invoke PDF services (now integral to ISPF, right?), the service communicates with ISPF as needed and so the cross-over between the TCB you are running under (applications run as a daughter task to ISPF as I recall) and ISPF will deal with authorization issues. SO, you can use ISPF services in a TSO Batch environment (or online for that matter). And probably get done what you need to do. Regards, Steve Thompson That is interesting, but requiring the program to run under ISPF just so I can delete a PDSE member without locking it seems overkill a cannon to kill a fly. There must be a simpler way... Thanks anyway, Etienne -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Synchronizing the IOCDS and the DS6800
Barry, I don't know if this will help or not. The DS6800 installation, troubleshooting and recovery guide goes through building out the storage on the array. Unfortunately it leaves a bit to be desired on how to tie this to z-boxes. GC26-7678 (I have -08 generation) is the manual and chapter 7 is where I found the info 4 years ago when I put ours in. When you define the LCUs on the 6800 you need to give them LCU IDs as well as SSIDs. I BELIEVE the LCU ID corresponds to the CUADD field in the IOCDS CU definitions. As far as defining the actual addresses on the 6800 to addresses in your IOCDS, when you define the volumes on the 6800, you tell it which LCU you want the volumes put into, then when you either give it the base address and range (or allow it to default to the lowest number available) you are in essence giving it the address the Z will see. For example, on my 6800, I have LCUs 0-3. I have disk defined on each of the LCUs that have range 00-1E on LCU 0, 00-0D each on LCUs 1-3. On my Z, I have the 6800 defined as 4 CUs 1000, 1100, 1200, 1300. These correspond to CUADD 0-3. The Z has all 256 device addresses defined on each of the 4 CUs. I actually only have available on the Z, addresses 1000-101E, 1100-110D, 1200-120D, 1300-130D. Device 130D is 6800 address 0D on LCU 3. To use the addresses the customs driver offering gives, you would need to (in the IOCDS) define CU D00 on the CHPIDs plugged into the 6800 and make sure you have device addresses 40-5F defined on this CU; then, on the 6800, define addresses 40-5F on the correct LCU. HTH. Rex -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Schwarz, Barry A Sent: Tuesday, July 27, 2010 10:05 AM To: IBM-MAIN@bama.ua.edu Subject: Synchronizing the IOCDS and the DS6800 We are installing a new z10 with a minimal DS6800 in a very small data center (to replace our venerable MP2003). Using the SMC, we have configured the DS6800 with RAID 5 to give us 250GB of usable storage set up as eleven 3390-3s and the rest as 3390-9s. (We wanted to use RAID 10 but the system insisted on keeping two of the DDMs in reserve so we ended up with only 125GB which is not sufficient.) I am using the Stand Alone IOCP on the z10 HMC to build the IOCDS. I have looked at every DS6800, HMC, IOCP, and HCD manual I could find but I cannot find any description of how the ADDRESS operand on the IODEVICE statement relates to the logical volumes on the DS6800. I have the same problem relating the CUNUMBER and CUADD operands on the CTLUNIT statement to the physical and logical control units on the DS6800. The Customs Offering Driver manual (GI11-2843-04) shows 3390 devices at addresses D40-D5F. Obviously I'm missing something but I see no method of assigning those addresses on the DS6800. A pointer to the relevant section of a manual would be greatly appreciated. Suggestions on how to use RAID 10 would also be welcome. Thank you -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
If you don't understand what's wrong with PDS, re-read Etienne Thijsse's thread on attempting to delete a PDSE member. I didn't say I didn't understand, I said that you had to do so. Understand their limitations, and how to fix them when they break. They're not going away. Or imagine my astonished dismay the first time I allocated a member with DISP=(OLD,DELETE) and watched the entire PDS vanish. That is documented in so many places. The JCL Manual/User's Guide (or whatever IBM's calling it/them now), for example, and nowhere does it say DISP works at the member level. The explanation of DISP is at the dataset level, everywhere I've looked. Enough counterintuitive behaviors You can't blame PDS(E) for 45+ years of documented behaviour. and flaws with recondite repairs add up to wrong. Possibly, but there are many cases in z/OS where you are stuck with them. I'm not a fan of PDSE, anymore, since IBM broke them circa 2003. - I'm a SuperHero with neither powers, nor motivation! Kimota! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
A little OT, but just wondering: does ISPF do the same ENQs for PDSEs as with PDS when updating members? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Kirk Wolf Sent: Tuesday, July 27, 2010 1:52 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Another reason to hate PDSE's A little OT, but just wondering: does ISPF do the same ENQs for PDSEs as with PDS when updating members? Yes. -- John McKown Systems Engineer IV IT Administrative Services Group HealthMarkets(r) 9151 Boulevard 26 * N. Richland Hills * TX 76010 (817) 255-3225 phone * (817)-961-6183 cell john.mck...@healthmarkets.com * www.HealthMarkets.com Confidentiality Notice: This e-mail message may contain confidential or proprietary information. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. HealthMarkets(r) is the brand name for products underwritten and issued by the insurance subsidiaries of HealthMarkets, Inc. -The Chesapeake Life Insurance Company(r), Mid-West National Life Insurance Company of TennesseeSM and The MEGA Life and Health Insurance Company.SM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Hashing algorythm for text strings without embedded blanks
Is there a preferred hashing algorithm for such strings? The strings will be fixed length with trailing blanks. I was thinking of simply doing a MOD64 (or higher) of the sum of the non-blank part of the string by words, but as this is text with a limited character set, would this lead to excessive alias chains? Has research been done in this area? There will mostly be search activity but also add activity. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
zEnterprise at SHARE in Boston
The SHARE MVS Core Technologies Project is sponsoring the following technical presentations surrounding zEnterprise next week at SHARE in Boston. Be there or be square. Session 7585: Evaluating Best Fit Architecture for Customer Workloads on zEnterprise Systems Session 7538: IBM zEnterprise 196 (z196) Hardware Overview Session 7540: zEnterprise Unified Resource Manager Session 7545: System z Platform Performance Management Overview Session 8141: Energy Management for zEnterprise Session 7532: z/OS Software Positioning for the IBM zEnterprise System You can read about these sessions by following these links: http://share.confex.com/share/115/webprogram/Session7585.html http://share.confex.com/share/115/webprogram/Session7538.html http://share.confex.com/share/115/webprogram/Session7540.html http://share.confex.com/share/115/webprogram/Session7545.html http://share.confex.com/share/115/webprogram/Session8141.html http://share.confex.com/share/115/webprogram/Session7532.html -- Edward E Jaffe Phoenix Software International, Inc 831 Parkview Drive North El Segundo, CA 90245 310-338-0400 x318 edja...@phoenixsoftware.com http://www.phoenixsoftware.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashing algorythm for text strings without embedded blanks
What's the goal of the hashing -- obfuscation? Shortening the data? On Tue, Jul 27, 2010 at 3:18 PM, Binyamin Dissen bdis...@dissensoftware.com wrote: Is there a preferred hashing algorithm for such strings? The strings will be fixed length with trailing blanks. I was thinking of simply doing a MOD64 (or higher) of the sum of the non-blank part of the string by words, but as this is text with a limited character set, would this lead to excessive alias chains? Has research been done in this area? There will mostly be search activity but also add activity. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- zMan -- I've got a mainframe and I'm not afraid to use it -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashing algorythm for text strings without embedded blanks
On Tue, 27 Jul 2010 15:32:24 -0400 zMan zedgarhoo...@gmail.com wrote: :What's the goal of the hashing -- obfuscation? Shortening the data? Lookup. Does the entry exist, and if so what are its attributes. If does not exist, add. :On Tue, Jul 27, 2010 at 3:18 PM, Binyamin Dissen bdis...@dissensoftware.com : wrote: : Is there a preferred hashing algorithm for such strings? The strings will : be : fixed length with trailing blanks. : I was thinking of simply doing a MOD64 (or higher) of the sum of the : non-blank : part of the string by words, but as this is text with a limited character : set, : would this lead to excessive alias chains? Has research been done in this : area? There will mostly be search activity but also add activity. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
Or imagine my astonished dismay the first time I allocated a member with DISP=(OLD,DELETE) and watched the entire PDS vanish. In the early 1970s, at a bank using MVT on 370/155, soon after DOS-OS conversion, all procs were stored in SYS1.PROCLIB. Excessively neat programmer deleted a member using that technique. System was unbootable. When the system came back after the sysgen (no backup res pack!), an APPL.PROCLIB was created and all SYS1 datasets were password protected. Ops was not given the password. So in 40 yrs, the same design flaw has bit how many people/shops? On the other hand, most programs I wrote in the 1960s would run today, if there were still card readers. - The information contained in this communication (including any attachments hereto) is confidential and is intended solely for the personal and confidential use of the individual or entity to whom it is addressed. If the reader of this message is not the intended recipient or an agent responsible for delivering it to the intended recipient, you are hereby notified that you have received this communication in error and that any review, dissemination, copying, or unauthorized use of this information, or the taking of any action in reliance on the contents of this information is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail, and delete the original message. Thank you -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashing algorythm for text strings without embedded blanks
OK, I have a splitting headache and may be dense anyway: how is it easier to look it up once it's hashed? What am I missing? On Tue, Jul 27, 2010 at 3:36 PM, Binyamin Dissen bdis...@dissensoftware.com wrote: On Tue, 27 Jul 2010 15:32:24 -0400 zMan zedgarhoo...@gmail.com wrote: :What's the goal of the hashing -- obfuscation? Shortening the data? Lookup. Does the entry exist, and if so what are its attributes. If does not exist, add. :On Tue, Jul 27, 2010 at 3:18 PM, Binyamin Dissen bdis...@dissensoftware.com : wrote: : Is there a preferred hashing algorithm for such strings? The strings will : be : fixed length with trailing blanks. : I was thinking of simply doing a MOD64 (or higher) of the sum of the : non-blank : part of the string by words, but as this is text with a limited character : set, : would this lead to excessive alias chains? Has research been done in this : area? There will mostly be search activity but also add activity. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- zMan -- I've got a mainframe and I'm not afraid to use it -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashing algorythm for text strings without embedded blanks
I have used the technique of adding byte values for a hash count in two shops over two decades to cut the length of a threaded list. Both times I used mod256 to good effect. The first time the string was an eight character variable name, the second time a set of strings over 64 bytes long. Both could contain spaces. In the first case the set was in the low thousands and short/long ratio was less than 3/1. In the second case, worst case set was above 1 million and the short long ratio was less than 1.5/1. In this case, the performance hit is low enough (and probably the systems fast enough) that it does not pay to go mod512. A million pages is still a technology limit for the kind of reports being indexed. One thing that helped in both cases was allocating control blocks pointed to by the hash tables in sets of pages to improve locality of reference. IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu wrote on 07/27/2010 03:18:49 PM: From: Binyamin Dissen bdis...@dissensoftware.com Subject: Hashing algorythm for text strings without embedded blanks Is there a preferred hashing algorithm for such strings? The strings will be fixed length with trailing blanks. I was thinking of simply doing a MOD64 (or higher) of the sum of thenon-blank part of the string by words, but as this is text with a limited character set, would this lead to excessive alias chains? Has research been done in this area? There will mostly be search activity but also add activity. - The information contained in this communication (including any attachments hereto) is confidential and is intended solely for the personal and confidential use of the individual or entity to whom it is addressed. If the reader of this message is not the intended recipient or an agent responsible for delivering it to the intended recipient, you are hereby notified that you have received this communication in error and that any review, dissemination, copying, or unauthorized use of this information, or the taking of any action in reliance on the contents of this information is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail, and delete the original message. Thank you -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: I'm amazed
snip IBM makes what is claimed to be the biggest Mainframe announcement in decades and most of the traffic on this list is on the etymology of CICS and PoPs I love it. ---unsnip-- That's because the HYPE FILTERS are in full operation. We'll check it out for ourselves, in conjunction with our business needs and projected growth paths. :-) Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: remove() of PDSE member leaves PDS locked
At 8:47 AM -0500 on 7/27/10, Paul Gilmartin wrote about Re: remove() of PDSE member leaves PDS locked: remove() upgrades this to EXC (bad design of C RTL; as you say, SAS (RIP) does better). Then there's no way to downgrade it to SHR (bad design of GRS). I agree with you about the bad design that does not allow an EXC to be downgraded to a SHR. I fail to see why it is not allowed. The EXC is the first entry in the queue and may be followed by another EXC request or SHR requests in a wait state. Right now if I do the DEQ of the EXC it is removed and the waiting ENQs are taken out of wait status in queued order until an EXC request is found or the queue is exhausted. What is so hard (or dangerous) about just altering the status of the EXC to SHR and then running the same code as the DEQ (after first checking if the second entry is a SHR request [if it is an EXC do not run the code])? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashin g algorith m for text strings w ithout emb edded blan ks
corrected text: Worth trying first is von Neumann's classical scheme. Divide the value obtained using the z/Architecture machine instruction CKSUM. Then use its remainder mod(s), where s is any convenient small prime. The result will often be an approximately rectangular distribution of the hash values 0, 1, 2, . . . , s - 1. The use of a composite hashing modulus c is NOT a good idea. Clustering at its prime factors is all but certain. Using, say, c = 60 = 2^2 x 3 x 5 would yield clusters at 2, 3, and 5 John Gilmore Ashland, MA 01721-1817 USA _ Hotmail has tools for the New Busy. Search, chat and e-mail from your inbox. http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_1 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: I.B.M. Is Target of Antitrust Inquiry
-snip Yeah, I was astounded to see this bubble up high enough that a gas station blabber-at-you-while-you-pump screen had the story! unsnip--- Seems like a waste of time. If I build a left-nostril inhaler that has your state motto on it and glows in the dark and you chose not to duplicate that, why should you be allowed to sue me? Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashing algorythm for text strings without embedded blanks
This is what I have used in past mainframe applications: http://www.vm.ibm.com/download/packages/descript.cgi?HASHWF /Tom Kern Binyamin Dissen wrote: Is there a preferred hashing algorithm for such strings? The strings will be fixed length with trailing blanks. I was thinking of simply doing a MOD64 (or higher) of the sum of the non-blank part of the string by words, but as this is text with a limited character set, would this lead to excessive alias chains? Has research been done in this area? There will mostly be search activity but also add activity. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashing algorythm for text strings without embedded blanks
On Tue, 27 Jul 2010 15:43:47 -0400 zMan zedgarhoo...@gmail.com wrote: :OK, I have a splitting headache and may be dense anyway: how is it easier to :look it up once it's hashed? What am I missing? Not easier, faster. Assume 10 strings. A serial search will take on average 5 compares. A mod64 hash should reduce it on average to under 800 compares, hash to slot and run the alias chain. A b-tree would be better but then there is the issue of balancing it while others are busy transversing it. :On Tue, Jul 27, 2010 at 3:36 PM, Binyamin Dissen bdis...@dissensoftware.com : wrote: : On Tue, 27 Jul 2010 15:32:24 -0400 zMan zedgarhoo...@gmail.com wrote: : :What's the goal of the hashing -- obfuscation? Shortening the data? : Lookup. : Does the entry exist, and if so what are its attributes. If does not exist, : add. : :On Tue, Jul 27, 2010 at 3:18 PM, Binyamin Dissen : bdis...@dissensoftware.com : : wrote: : : Is there a preferred hashing algorithm for such strings? The strings : will : : be : : fixed length with trailing blanks. : : I was thinking of simply doing a MOD64 (or higher) of the sum of the : : non-blank : : part of the string by words, but as this is text with a limited : character : : set, : : would this lead to excessive alias chains? Has research been done in : this : : area? There will mostly be search activity but also add activity. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: C-I-C-S vs KICKS and screws
-snip-- We also say SNAH and KICKS in The Netherlands and during a course in Atlanta it took me a while to understand what was meant with C-I-C-S. On the matter of screws: I own a 91 Jeep Wrangler with a lot of torx screws and in time the torx-hole becomes a round hole. Allan-screws are a bit better but still have the same problem. I personally prefer hex-bolts. Just too bad that Chrysler used both metric and inch sizes on my Jeep. unsnip- GM has exhibited the same incompetence; I have both flavors of nuts and bolts on my 2001 Suburban. :-( I think I've heard almost every variation of SNA and CICS and I cease to be surprised at the endless variations. Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: remove() of PDSE member leaves PDS locked
Robert A. Rosenberg wrote: What is so hard (or dangerous) about just altering the status of the EXC to SHR and then running the same code as the DEQ (after first checking if the second entry is a SHR request [if it is an EXC do not run the code])? Agreed. This is a long-standing complaint. It's doable, but not yet done for some reason. Perhaps there is no formal requirement? -- Edward E Jaffe Chief Technology Officer Phoenix Software International, Inc 831 Parkview Drive North El Segundo, CA 90245 310-338-0400 x318 edja...@phoenixsoftware.com http://www.phoenixsoftware.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
-snip Barbara Nitz wrote: No, it's 64K tracks. It is the same per volume limit as many other data set types (non-extended). But PDSes and PDSEs are also limited to a single volume. I am surprised. I did not know about *those* limitations. And most certainly, since they are documented, there will be no way to change things. But: I seem to remember that PDSEs were touted as the only ones making sense on an EAV, because of the 'extented' part of the name, and that they could get bigger (but maybe I misunderstood). Not that I would encourage use of such a large volume, as it is much too slow, and I still haven't opened an ETR to address 90s (or more) until ISPF 3.4 gives you the directory view. (Might end up on an ISPF queue, which would require me to open a complaint due to incompetence.) PDSEs have only one advantage: They don't need to get compressed. The rest us a huge amount of disadvantages. Regards, Barbara Well, they do have at least one other advantage: they can store program objects, which allows entry points with long, case-sensitive names, which is sometimes handy. unsnip--- Steve, I'm incredibly happy you said SOMETIMES, because I've lived with 8-character PDS member names for 40+ years and never could think of a really severe need for the variations you suggest. :-) Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
A little OT, but just wondering: does ISPF do the same ENQs for PDSEs as with PDS when updating members? I don't think it's OT, but the answer is YES. PDSEs, while different under the covers, still look like PDS's to the uninitiated (programmes, not people). - I'm a SuperHero with neither powers, nor motivation! Kimota! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashin g algorith m for text strings w ithout emb edded blan ks?
On Tue, 27 Jul 2010 19:59:01 + john gilmore john_w_gilm...@msn.com wrote: :Worth trying first is von Neumann's classical scheme. Divide the value obtained using the z/Architecture machine instruction CKSUM. Then use its remainder mod(s), where s is any convenient small prime. The result will often be an approximately rectangular distribution of the hash values Yes, CKSM is a better idea than doing the adding myself. :0, 1, 2, . . . , s - 1. :The use of a composite hashing modulus c is NOT a good idea. Clustering at its prime factors is all but certain. Using, say, c = 60 = 2^2 x 3 x 5 would yield clusters at 2, 3, and 5 So using 61 would lead to a better distribution than using 64? -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: C-I-C-S vs KICKS
snip--- One type of screw head that I haven't seen mentioned here is the torx, or hexalobular, head. While the Philips screw was designed to cam out of the screw to prevent overtightening, the torx screw, like the Robertson screw, was designed to not cam out. It came about as better torque-limiting automatic screwdrivers were developed for use in factories and is becoming more popular for use on items like automobiles, bicycle brake systems, disk drive systems, computers, and other consumer electronics. ---unsnip-- There's no good reason that a torque-limiting automatic screwdriver can't use a Robertson screw. All you need to do is change the bit. :-) I submit that your argument is self-defeating. Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Panvalet Question
Lizette, Apologies for replying so late, I am not a Panvalet expert but I asked someone who is and their reply is: PANMODI is the Panvalet I/O processor. It is used by ROSCOE to access Panvalet PANLIBs (IMPORT/EXPORT members between Panvalet and ROSCOE). PANMODI gets linked with the RSSCPAN0 interface in ROSCOE. PANMODI is part of the Library Access Method for Panvalet (PAM). The version of PANMODI which is distributed with CA Panvalet is not the same as the PANMODI shipped with CA Easytrieve Plus. Also, PANMODC, PSCCLPVI, and PVPVLAMS are aliases of PANMODI. More detail on PANMODI can be found in the CA Panvalet System Management Guide. If you no longer use Panvalet (and no longer need to access data residing on PANLIBs), you do not need PANMODI. Please let me know if you have additional questions regarding PANMODI. Thanks. Aurora Aurora Emanuela Dell'Anno CA Technologies - MSC Sr. Engineering Services Architect Tel: +44 (0)1753 577 733 Mobile: +44 (0)7768 235 339 aurora.della...@ca.com CA Limited Ditton Park, Riding Court Road, Datchet, SL3 9LL, UK CA Limited is a company registered in England and Wales under company registration number 1282495 with its registered office at the address set out above. VAT number 697904179. http://www.ca.com/ P please don't print this e-mail unless you really need to! -Original Message- From: Lizette Koehler [mailto:stars...@mindspring.com] Sent: 21 July 2010 20:33 Subject: Panvalet Question I am trying to clean up all the no longer used panvalet modules. And of course there are lots of pieces everywhere. I ran across a module that seems to be access via ROSCOE but do not know what it is used. PANMODI is the Panvalet Options Module. What function does it perform if we no longer use Panvalet? I have not been able to find anything specific on CA's website other than some very skimpy information in CA Easytrieve 6.3 manuals. Lizette -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: I.B.M. Is Target of Antitrust Inquiry
Um, what??? On Tue, Jul 27, 2010 at 4:09 PM, Rick Fochtman rfocht...@ync.net wrote: -snip Yeah, I was astounded to see this bubble up high enough that a gas station blabber-at-you-while-you-pump screen had the story! unsnip--- Seems like a waste of time. If I build a left-nostril inhaler that has your state motto on it and glows in the dark and you chose not to duplicate that, why should you be allowed to sue me? Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- zMan -- I've got a mainframe and I'm not afraid to use it -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
snip-- If you don't understand what's wrong with PDS, re-read Etienne Thijsse's thread on attempting to delete a PDSE member. Or imagine my astonished dismay the first time I allocated a member with DISP=(OLD,DELETE) and watched the entire PDS vanish. Enough counterintuitive behaviors and flaws with recondite repairs add up to wrong. --unsnip-- I submit that this issue was caused by a faulty understanding of how PDS's and JCL work together. You can view it as a flaw if you like, and I do, but there are provided mechanisms to circumvent this flaw. Not always nice and certainly not intuitive, but still available. Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashing algorythm for text strings without embedded blanks
Am I missing something? Why not use a binary chop search? That is, each compare cuts the universe in half. For a million entries, you would need 20 or less compares. http://en.wikipedia.org/wiki/Binary_search_algorithm -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Binyamin Dissen Sent: Tuesday, July 27, 2010 3:14 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Hashing algorythm for text strings without embedded blanks On Tue, 27 Jul 2010 15:43:47 -0400 zMan zedgarhoo...@gmail.com wrote: :OK, I have a splitting headache and may be dense anyway: how is it easier to :look it up once it's hashed? What am I missing? Not easier, faster. Assume 10 strings. A serial search will take on average 5 compares. A mod64 hash should reduce it on average to under 800 compares, hash to slot and run the alias chain. A b-tree would be better but then there is the issue of balancing it while others are busy transversing it. :On Tue, Jul 27, 2010 at 3:36 PM, Binyamin Dissen bdis...@dissensoftware.com : wrote: : On Tue, 27 Jul 2010 15:32:24 -0400 zMan zedgarhoo...@gmail.com wrote: : :What's the goal of the hashing -- obfuscation? Shortening the data? : Lookup. : Does the entry exist, and if so what are its attributes. If does not exist, : add. : :On Tue, Jul 27, 2010 at 3:18 PM, Binyamin Dissen : bdis...@dissensoftware.com : : wrote: : : Is there a preferred hashing algorithm for such strings? The strings : will : : be : : fixed length with trailing blanks. : : I was thinking of simply doing a MOD64 (or higher) of the sum of the : : non-blank : : part of the string by words, but as this is text with a limited : character : : set, : : would this lead to excessive alias chains? Has research been done in : this : : area? There will mostly be search activity but also add activity. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
John Gilmore's Munging of Subject lines (was Re: Hashin g algorith m)
John, What's up with the subject lines getting destroyed when you post? It makes threading difficult. Mark -- Mark Zelden - Zelden Consulting Services - z/OS, OS/390 and MVS mailto:mzel...@flash.net Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html Systems Programming expert at http://expertanswercenter.techtarget.com/ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashing algorythm for text strings without embedded blanks
On Tue, 27 Jul 2010 15:43:08 -0500, Hal Merritt wrote: Am I missing something? Why not use a binary chop search? That is, each compare cuts the universe in half. For a million entries, you would need 20 or less compares. http://en.wikipedia.org/wiki/Binary_search_algorithm Insertion? For John G.'s suggestion of CKSUM followed by modulo small prime: Does primality matter? Shouldn't if the range of CKSUM is spectrally neutral. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
On Tue, 27 Jul 2010 15:42:57 -0400, Kirk Talman wrote: Or imagine my astonished dismay the first time I allocated a member with DISP=(OLD,DELETE) and watched the entire PDS vanish. In the early 1970s, at a bank using MVT on 370/155, soon after DOS-OS conversion, all procs were stored in SYS1.PROCLIB. Excessively neat programmer deleted a member using that technique. System was unbootable. When the system came back after the sysgen (no backup res pack!), an APPL.PROCLIB was created and all SYS1 datasets were password protected. Ops was not given the password. So in 40 yrs, the same design flaw has bit how many people/shops? But none of those should perceive a problem, since the behavior is documented. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Synchronizing the IOCDS and the DS6800
It depends on the number of DDM's and the size of the DDM's and if you make 1 or two array sites how your IOCDS will look like. Cuadd= has a relation with the lcuid 2010/7/27 Schwarz, Barry A barry.a.schw...@boeing.com We are installing a new z10 with a minimal DS6800 in a very small data center (to replace our venerable MP2003). Using the SMC, we have configured the DS6800 with RAID 5 to give us 250GB of usable storage set up as eleven 3390-3s and the rest as 3390-9s. (We wanted to use RAID 10 but the system insisted on keeping two of the DDMs in reserve so we ended up with only 125GB which is not sufficient.) I am using the Stand Alone IOCP on the z10 HMC to build the IOCDS. I have looked at every DS6800, HMC, IOCP, and HCD manual I could find but I cannot find any description of how the ADDRESS operand on the IODEVICE statement relates to the logical volumes on the DS6800. I have the same problem relating the CUNUMBER and CUADD operands on the CTLUNIT statement to the physical and logical control units on the DS6800. The Customs Offering Driver manual (GI11-2843-04) shows 3390 devices at addresses D40-D5F. Obviously I'm missing something but I see no method of assigning those addresses on the DS6800. A pointer to the relevant section of a manual would be greatly appreciated. Suggestions on how to use RAID 10 would also be welcome. Thank you -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- Met vriendelijke groeten/With kind regards Dick de Groot -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashing algorythm for text strings without embedded blanks
As I wrote, there is the issue of dynamically balancing the tree as random insertions come in. On Tue, 27 Jul 2010 15:43:08 -0500 Hal Merritt hmerr...@jackhenry.com wrote: :Am I missing something? Why not use a binary chop search? That is, each compare cuts the universe in half. For a million entries, you would need 20 or less compares. : :http://en.wikipedia.org/wiki/Binary_search_algorithm : : :-Original Message- :From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Binyamin Dissen :Sent: Tuesday, July 27, 2010 3:14 PM :To: IBM-MAIN@bama.ua.edu :Subject: Re: Hashing algorythm for text strings without embedded blanks : :On Tue, 27 Jul 2010 15:43:47 -0400 zMan zedgarhoo...@gmail.com wrote: : ::OK, I have a splitting headache and may be dense anyway: how is it easier to ::look it up once it's hashed? What am I missing? : :Not easier, faster. : :Assume 10 strings. A serial search will take on average 5 compares. A :mod64 hash should reduce it on average to under 800 compares, hash to slot and :run the alias chain. : :A b-tree would be better but then there is the issue of balancing it while :others are busy transversing it. : ::On Tue, Jul 27, 2010 at 3:36 PM, Binyamin Dissen bdis...@dissensoftware.com :: wrote: : :: On Tue, 27 Jul 2010 15:32:24 -0400 zMan zedgarhoo...@gmail.com wrote: : :: :What's the goal of the hashing -- obfuscation? Shortening the data? : :: Lookup. : :: Does the entry exist, and if so what are its attributes. If does not exist, :: add. : :: :On Tue, Jul 27, 2010 at 3:18 PM, Binyamin Dissen :: bdis...@dissensoftware.com :: : wrote: : :: : Is there a preferred hashing algorithm for such strings? The strings :: will :: : be :: : fixed length with trailing blanks. : :: : I was thinking of simply doing a MOD64 (or higher) of the sum of the :: : non-blank :: : part of the string by words, but as this is text with a limited :: character :: : set, :: : would this lead to excessive alias chains? Has research been done in :: this :: : area? There will mostly be search activity but also add activity. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashin g algorith m for text strings w ithout emb edded blan ks
Three responses: Yes, 61, which is prime, is better than 64 = 2^6, which is composite. A binary search/chop is easy when one has all of the values one is going to search for compresent and available to be put into a table. When one is acquiring these values serially in time, a binary-search tree can be used instead; but it must be kept balanced/compact; and this is a non-trivial undertaking. For many applications--compiler and assembler symbol tables are the obvious example--a set of ordered sublists, one for each hash value, yields faster results. Much depends upon what you have in hand in the way of already working routines. If division-method hashing is used a prime divisor/modulus is highly desirable. Clustering at the prime divisors of a composite modulus does occur. I dislike arguments from authority, but 1) this is not the place for a bibliography and 2) RKFATWTF. John Gilmore Ashland, MA 01721-1817 USA _ The New Busy is not the old busy. Search, chat and e-mail from your inbox. http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_3 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
Paul Gilmartin wrote: On Tue, 27 Jul 2010 12:26:50 +0200, R.S. wrote: Steve Comstock pisze: Barbara Nitz wrote: [...] PDSEs have only one advantage: They don't need to get compressed. The rest us a huge amount of disadvantages. Regards, Barbara And, I believe, multiple members can be written concurrently (I believe; am I right?) How would one do this? Must one OPEN two or more DCBs, one for each member being written? And one might yet wish to be able to append or update in place existing members. Well, they do have at least one other advantage: they can store program objects, which allows entry points with long, case-sensitive names, which is sometimes handy. Steve, why would you call that an advantage? I thought you despise case-sensitivity. I do. But in some environments (e.g., DLLs, C, C++) it is a fact of life. If you want to port / use applications from the z/OS world it is good to have the ability. Anyway, old fashioned PDSes allow case-sensitive (but not long) member names; it's merely higher level interfaces that try to conceal the case-sensitivity. Ah, good point. I'd forgotten that, since the interfaces I work with day to day are exactly of that type. Would you advocate supporting case-insensitivity at the DFSMS layer, similar to Windows? Mac OS X gives the programmer a choice with a granularity of volume. Not sure on that one. While I could provide more PDSE advantages than Barbara, I would not mention long names. Reason: I HAVE NEVER SEEN AN APPLICATION WHICH USES THEM. Long names are not handy for me. Of course I know, there are some... but not in operating system components. Isn't this a solution seeking a problem? What interfaces support them? Surely, one can't code // EXEC PGM=Case-sensitive-Long-name? What about ATTACH EP=Case-sensitive-Long-name? Well, you can call DLL entry points from Assembler, COBOL, C, and PL/I. But you can't invoke them from JCL, that's true. Nor can you LOAD, XCTL, or ATTACH to long entry points. But several bpx services can access a long, mixed case, entry name. I admit, it's a stretch. The average day-to-day application programmer does not have a need / use for this feature, at least not today, and one has to work at it to be able to use it. What's the format of the word returned by NOTE for a PDSE. It's been discussed here that the low 24 bits contain the relative record number within a member (biased by 0x10). Do the top 8 bits then identify the member? What happens, then, if a programmer performs BLDL for 257 different members? can the NOTE words identify connections to all? If one performs 2 BLDLs for the same member, are the two returned pointers identical? How do Unix directories compare? o They don't need to be compressed. o Multiple members can be written concurrently. o Members can be appended or updated in place (with a granularity of byte.). o They support long case-sensitive names. o They allow a mixture of program objects and other member types. Deficiencies: o Alias entry points are not supported (AFAIK). o The BPAM support is read-only (so far). Questions: o How do performance and reliablity compare with PDS[E]? I suppose there might be four answers, separate for PDS vs. PDSE and for HFS vs. zFS. o What is the limit on member size? o What is the limit on number of members? -- gil Well, I've been getting more and more into the z/OS UNIX world, and I think you've raised some good questions / concerns here. But based on a thread last year (or was it two years ago), there seems to be precious little management interest in, or support for, developing new applications using z/OS UNIX, and the systems folks on ibm-main are certainly not big fans (for the most part, anyway), eh Barbara? -- Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-393-8716 http://www.trainersfriend.com * To get a good Return on your Investment, first make an investment! + Training your people is an excellent investment -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: I'm amazed
I suspect IBM wants to keep the penguin colonies appropriately corralled. Hard to tout you can support hundreds/thousands of Linuses in a (native) LPAR environment. Does Power have a z/VM analogue ?. Shane ... On Wed, Jul 28th, 2010 at 12:16 AM, Ken Porowski wrote: It may be that they don't have the management piece for Linux yet Power7/AIX supported from November xBlades/Linux support is only a statement of direction for 1st half 2011 Maybe when that comes out we'll see Power7/Linux -Original Message- Kirk Wolf On Mon, Jul 26, 2010 at 4:33 PM, Starr, Alan alan_st...@calpers.ca.gov wrote: It would indeed be interesting to see discussion of this biggest Mainframe announcement in decades. 3) Is it sufficient to support AIX but not the other flavors of Unix (if I read the announcement correctly)? I also found this curious. From what I understand, the Power7 BladeCenter runs both AIX and Linux: http://www-03.ibm.com/systems/bladecenter/hardware/servers/ps700series/i ndex.html Why would Linux on Power be excluded? (but not Linux on X64?) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
John Gilmo re's Mungi ng of Subj ect lines (was Re: H ashin g al gorith m)
The munging comes and the munging goes. Today it is occurring. Yesterday it did not. John Gilmore Ashland, MA 01721-1817 USA _ Hotmail is redefining busy with tools for the New Busy. Get more from your inbox. http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_2 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: I'm amazed
Shane Ginnane wrote: I suspect IBM wants to keep the penguin colonies appropriately corralled. Hard to tout you can support hundreds/thousands of Linuses in a (native) LPAR environment. Does Power have a z/VM analogue ?. Not the same functionality as z/VM. There is PowerVM which is the Power7 version of the z LPAR code plus paging - PowerVM can page LPARs using a service LPAR to do the I/O. Also Active Memory Sharing that allows LPARs to donate memory they don't need to other LPARs. The LPAR architecture for Power is such that the guests have to be aware, and it often takes a little longer to get needed changes into the Linux distros Shane ... h -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashin g algorith m for text strings w ithout emb edded blan ks
On 7/27/2010 6:06 PM, john gilmore wrote: into a table. When one is acquiring these values serially in time, a binary-search tree can be used instead; but it must be kept balanced/compact; and this is a non-trivial undertaking. It depends on one's perception of trivial. Volume 3 of Knuth's Art of Computer Programming has a very simple algorithm for building balanced trees. Gerhard Postpischil Bradford, VT -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: United Statesians (was C-I-C-S vs KICKS)
If citizens of the United States of Mexico are called Mexicans then why shouldn't the citizens of the United States of America be called Americans? Other than the USA there is no one place that is simply referred to as America. There is North America and South America, which are continents. Then there is America, which is the short name for the United States of America, a country in North America. Though apparently it's United Mexican States, not United States of Mexico, but anyway... On 7/27/2010 at 8:18 AM, in message piqt465ggadlccgeguamjbvr0um4pgv...@4ax.com, Howard Brazee howard.bra...@cusys.edu wrote: On 27 Jul 2010 05:51:04 -0700, thomas.kel...@commercebank.com (Kelman, Tom) wrote: So, what do we in the United States of America call ourselves. Our name is like the United Nations or the United Kingdom - a description about what was wanted instead of a real name. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html The information contained in this electronic communication and any document attached hereto or transmitted herewith is confidential and intended for the exclusive use of the individual or entity named above. If the reader of this message is not the intended recipient or the employee or agent responsible for delivering it to the intended recipient, you are hereby notified that any examination, use, dissemination, distribution or copying of this communication or any part thereof is strictly prohibited. If you have received this communication in error, please immediately notify the sender by reply e-mail and destroy this communication. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashin g algorith m for text strings w ithout emb edded blan ks
---snip--- It depends on one's perception of trivial. Volume 3 of Knuth's Art of Computer Programming has a very simple algorithm for building balanced trees. ---unsnip-- I can tell you from bitter experience that while the algorithm is fairly simple, implementation is most assuredly NOT simple. :-( Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashin g algorith m for text strings w ithout emb edded blan ks
On 7/27/2010 8:42 PM, Rick Fochtman wrote: I can tell you from bitter experience that while the algorithm is fairly simple, implementation is most assuredly NOT simple. :-( About twelve years ago I was working as a contractor at a government agency that routinely processed files with hundreds of millions of records. My task was data extraction maintenance for a program that did an insertion sort on selected records. It took a few days to get the code working, but it was time well spent. The hard part was reading out the records in sequence, a task that Knuth left as an exercise for the reader g Gerhard Postpischil Bradford, VT -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashing algorythm for text strings without embedded blanks
Explanation of hashing functions and table look up: If you have a table with entries identified by a key, one of the typical requirements is to locate a table entry having some given key (or prove the entry doesn't exist). If the range of key values is suitably small so that all key values may be uniquely mapped to a distinct numeric value with a modest range, then the simplest solution may be an array using that unique value as a direct index into the array. But, in many cases the range of possible key values makes that totally impossible -- e.g., an 8-byte, unconstrained key could assume 2**64 possible values which would be impractical for a directly-indexed, in-memory table. One solution in such cases is to instead use a hashing function to transform the key domain to a relatively small, non-unique numeric range that is only slightly larger (say 125%) than the maximum number of distinct table entries to be stored, and to use a hash table sized to match the hash function range. The numeric hash value rather than the actual key is used as a direct index into the table array. Since the hash function range is smaller than the key domain, multiple keys can map to a single hash value, so the initial table entry located might be for a different key. To make look up work, each table entry must also contain the actual key value for the entry, and there must be a rule (or perhaps a pointer) that tells where to look next in the table for cases where there is a collision when the hash function points to a used location in the table for a different key. A number of different schemes are used for handling collisions, but basically you try other table entry locations until you either find an empty location or one with the right key. The beauty of this scheme is that with a suitable hash function, suitably distributed key values, suitable collision handling rules, and a table that is guaranteed to never become over 80% full, it can be proved that the average number of key comparisons to locate an entry will never exceed around 2.5. It doesn't matter how big the table is as long as the 80% rule is not violated. A binary search requires an average of 2.4 key comparisons to locate all entries in a 7-entry table, 3.2 comparisons for a 15-entry table, and the average increases as the number of entries increases. Even with a less than optimal hashing function and a less than optimal distribution of key values it is easy to see how hash table lookup can run circles around binary search for repeated random lookups as the total number of entries becomes large. The disadvantage is that if at the end of processing you want to list all table entries in any semblance of order, a sorting process will be required; and depending on implementation technique, you may even have to hunt through a sparsely filled table just to find all the entries. Joel C Ewing On 07/27/2010 02:43 PM, zMan wrote: OK, I have a splitting headache and may be dense anyway: how is it easier to look it up once it's hashed? What am I missing? On Tue, Jul 27, 2010 at 3:36 PM, Binyamin Dissen bdis...@dissensoftware.com wrote: On Tue, 27 Jul 2010 15:32:24 -0400 zMan zedgarhoo...@gmail.com wrote: :What's the goal of the hashing -- obfuscation? Shortening the data? Lookup. Does the entry exist, and if so what are its attributes. If does not exist, add. :On Tue, Jul 27, 2010 at 3:18 PM, Binyamin Dissen bdis...@dissensoftware.com : wrote: : Is there a preferred hashing algorithm for such strings? The strings will : be : fixed length with trailing blanks. : I was thinking of simply doing a MOD64 (or higher) of the sum of the : non-blank : part of the string by words, but as this is text with a limited character : set, : would this lead to excessive alias chains? Has research been done in this : area? There will mostly be search activity but also add activity. -- Binyamin Dissen bdis...@dissensoftware.com http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. ... -- Joel C. Ewing, Fort Smith, ARjcew...@acm.org -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashin g algorith m for text strings w ithout emb edded blan ks
On Tue, 27 Jul 2010 22:06:18 +, john gilmore wrote: Yes, 61, which is prime, is better than 64 = 2^6, which is composite. ... If division-method hashing is used a prime divisor/modulus is highly desirable. Clustering at the prime divisors of a composite modulus does occur. I dislike arguments from authority, but 1) this is not the place for a bibliography and 2) RKFATWTF. For pure division-method, surely. Modulo 64 merely extracts the rightmost 6 bits of the original string. But you had suggested CKSUM, then modulo. And if CKSUM is of high quality, I'd expect any modulus to give good results. RKFATWTF!? Not in my lexicon. Nor in Google's, apparently. But the last three characters are familiar and hauntingly apt. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
On 27 Jul 2010 13:18:29 -0700, in bit.listserv.ibm-main you wrote: -snip Barbara Nitz wrote: No, it's 64K tracks. It is the same per volume limit as many other data set types (non-extended). But PDSes and PDSEs are also limited to a single volume. I am surprised. I did not know about *those* limitations. And most certainly, since they are documented, there will be no way to change things. But: I seem to remember that PDSEs were touted as the only ones making sense on an EAV, because of the 'extented' part of the name, and that they could get bigger (but maybe I misunderstood). Not that I would encourage use of such a large volume, as it is much too slow, and I still haven't opened an ETR to address 90s (or more) until ISPF 3.4 gives you the directory view. (Might end up on an ISPF queue, which would require me to open a complaint due to incompetence.) PDSEs have only one advantage: They don't need to get compressed. The rest us a huge amount of disadvantages. Regards, Barbara Well, they do have at least one other advantage: they can store program objects, which allows entry points with long, case-sensitive names, which is sometimes handy. unsnip--- Steve, I'm incredibly happy you said SOMETIMES, because I've lived with 8-character PDS member names for 40+ years and never could think of a really severe need for the variations you suggest. :-) Given the obscure program names, proc names and member names we have due to the 8 character limitation, I for one would have liked names to be at least 16 characters. In fact I still would and the 8 byte limitation must seem weird and out of date to someone coming from a UNIX or Windows environment. Clark Morris Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Another reason to hate PDSE's
On 27 Jul 2010 14:17:48 -0700, in bit.listserv.ibm-main you wrote: On Tue, 27 Jul 2010 15:42:57 -0400, Kirk Talman wrote: Or imagine my astonished dismay the first time I allocated a member with DISP=(OLD,DELETE) and watched the entire PDS vanish. In the early 1970s, at a bank using MVT on 370/155, soon after DOS-OS conversion, all procs were stored in SYS1.PROCLIB. Excessively neat programmer deleted a member using that technique. System was unbootable. When the system came back after the sysgen (no backup res pack!), an APPL.PROCLIB was created and all SYS1 datasets were password protected. Ops was not given the password. So in 40 yrs, the same design flaw has bit how many people/shops? But none of those should perceive a problem, since the behavior is documented. Just because a stupid design is documented doesn't make it any less stupid. Clark Morris -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Please comment:What's so special about parallel sysplex
Hello experts here, Found a blog trying to comparing UNIX technology with mainframe, please comment: http://www.c0t0d0s0.org/archives/6775-Whats-so-special-about-the-Parallel-Sysplex.html And answered questions asked by author: What's so special with parallel sysplex? Regards Victor -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Hashin g algorith m for text strings w ithout emb edded blan ks
Paul Gilmartin wrote: On Tue, 27 Jul 2010 22:06:18 +, john gilmore wrote: Yes, 61, which is prime, is better than 64 = 2^6, which is composite. ... If division-method hashing is used a prime divisor/modulus is highly desirable. Clustering at the prime divisors of a composite modulus does occur. I dislike arguments from authority, but 1) this is not the place for a bibliography and 2) RKFATWTF. For pure division-method, surely. Modulo 64 merely extracts the rightmost 6 bits of the original string. But you had suggested CKSUM, then modulo. And if CKSUM is of high quality, I'd expect any modulus to give good results. Unfortunately CKSUM is not high quality. It's pathologically pathetic. It's nothing more than an additive hash. You will be forced to use a hash table sized by a prime number. The best hash table sizes are powers of two so you can use bitwise ANDs instead of mod division, much faster for dynamically resizing the table. A good hash function must achieve avalanche which requires a mixing step using magic ratios (usually a special prime number). I've timed just about every known hashing algorithm for strings and the best one by some distance on z is the murmur hash. http://sites.google.com/site/murmurhash/ Here's the murmur 2 hash assembler produced by the Metal/C compiler. HASHMUR#C CSECT HASHMUR#C AMODE 31 HASHMUR#C RMODE ANY SYSSTATE ARCHLVL=2 * unsigned int MurmurHash2( *const void * key, *int len, *unsigned int seed *) .* The HLASM GOFF option is needed to assemble this code @@c...@1 ALIAS C'MurmurHash2' ENTRY @@c...@1 @@c...@1 AMODE 31 @@c...@1 RMODE ANY @@c...@1 DS0F STM 14,6,12(13) LR15,13 L 13,8(,13) ST15,4(,13) @@b...@1 DS0H USING @@a...@1,13 LARL 3,@@l...@1 USING @@l...@1,3 STMH 14,6,80(13) * { * // 'm' and 'r' are mixing constants generated offline. * // They're not really 'magic', they just happen to work well. * const unsigned int m = 0x5BD1E995; * const int r = 24; * * // Initialize the hash to a 'random' value * unsigned int h = seed ^ len; USING @@pa...@1,1 L 15,@4seed L 0,@3len X 15,@3len CHI 0,4 * * // Mix 4 bytes at a time into the hash * const unsigned char * data = (const unsigned char *)key; L 14,@2key * * while(len = 4) BRL @1L4 LR2,0 AHI 2,-4 SRL 2,2 AHI 2,1 SLLG 4,2,2 LARL 1,@@co...@area@@ LR6,2 SLR 0,4 @1L3 DS0H * { *unsigned int k = *(unsigned int *)data; L 4,0(,14)(*)uint * *k *= m; MS4,0(,1) *k ^= k r; LR5,4 SRL 5,24 XR4,5 MS15,=F'1540483477' *k *= m; MS4,=F'1540483477' * *h *= m; *h ^= k; * *data += 4; LA14,4(,14) #AddressShadow XR15,4 BRCT 6,@1L3 @1L4 DS0H *len -= 4; * } * * // Handle the last few bytes of the input array * switch(len) CHI 0,1 BRE @1L7 CHI 0,2 BRE @1L8 CHI 0,3 BRNE @1L5 * { * case 3: h ^= data[2] 16; LLGC 0,2(0,14) (*)Cuchar SLL 0,16 XR15,0 @1L8 DS0H * case 2: h ^= data[1] 8; LLGC 0,1(0,14) (*)Cuchar SLL 0,8 XR15,0 @1L7 DS0H * case 1: h ^= data[0]; LLGC 14,0(0,14) (*)Cuchar XR15,14 * h *= m; MS15,=F'1540483477' @1L5 DS0H * }; * * // Do a few final mixes of the hash to ensure the last few * // bytes are well-incorporated. * h ^= h 13; LR14,15 SRL 14,13 XR15,14 * h *= m; MS15,=F'1540483477' * h ^= h 15; LR14,15 SRL 14,15 XR15,14 * * return h; * } @1L6 DS0H LMH 14,6,80(13) DROP L 13,4(,13) L 14,12(,13) LM1,6,24(13) BR14 DS0F @@l...@1 LTORG EJECT @@a...@1 DSECT DSXL144 ORG @@a...@1 #GPR_SA_1 DS 18F DSF @@pa...@1 DSECT DSXL12 ORG @@pa...@1+0 @2keyDSF ORG @@pa...@1+4 @3lenDSF ORG @@pa...@1+8 @4seed DSF EJECT HASHMUR#C CSECT , @@co...@area@@ DS 0D DCXL4'5BD1E995' END ,(5694A01 ,1B00,10209) RKFATWTF!? Not in my lexicon. Nor in Google's, apparently. But the last three characters are familiar and hauntingly apt. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to
Re: Hashin g algorith m for text strings w ithout emb edded blan ks
---snip-- On 7/27/2010 8:42 PM, Rick Fochtman wrote: I can tell you from bitter experience that while the algorithm is fairly simple, implementation is most assuredly NOT simple. :-( About twelve years ago I was working as a contractor at a government agency that routinely processed files with hundreds of millions of records. My task was data extraction maintenance for a program that did an insertion sort on selected records. It took a few days to get the code working, but it was time well spent. The hard part was reading out the records in sequence, a task that Knuth left as an exercise for the reader g -unsnip- I'll bet you a virtual case of your favorite beer that the answer was a recursive tree walker. :-) I found the problem in building and balancing the tree, not extracting data from it. Rick -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html