W dniu 2012-03-19 03:28, Alan Altmark pisze:
[...]
I found it on ResourceLink. There's nothing secret about it.
I just checked again - I don't see it. Maybe the content you see depends
on authorities. Note: there are other publications with service in the
title - maybe you mixed up the
You may also want to read this excellent paper:
https://www-03.ibm.com/systems/resources/servers_eserver_zseries_zos_wlm
_pdf_presrb.pdf
--
Peter Hunkeler
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send
Hi,
I have downloaded the below three files to install RDz but I dont find
the FEKSETUP job to configure the Z/os end :
1) *IBM Rational Developer for System z with EGL V8.0.3 (Core) Multilingual
Multiplatform eAssembly (CRG26ML)*
*
*
*2) IBM Rational Developer for System z V8.0.3 Quick Start
The z/OS part is SMPE installed. There is a separate CD image that has the
z/OS Parts. There is also a separate manual (or at least section of the
manual) for z/OS configuration. There are several started tasks to configure
as well.
Not hard to setup.
Hi
We are now in 2012 and thing are occurring in mill or nanosecond
intervals, but some functions still working in seconds range.
Disturb me ,:
- the JES job-log time stamps are in seconds
- LOGREC IFCEREP query in seconds
If someone has an idea to overcome this
Hi All,
I am looking for the difference between the JES2 checkpoint level and
checkpoint mode(w.r.t sysplex environment where there are multiple z/os lpar's
of different versions),more specifically difference between z2,z4 modes and the
checkpoint level of z/os 1.2.
I have tried to google it
My HMC's are all on the network, the problem is you can not FTP the WWPN off to
your workstation, I was told in an ETR that is was because the SE has no FTP
connection to the outside network. When I go in to single object mode to the SE
so I can see the FCP configuration, I have an option to
Hi,
I am having problems with following coding generating a re-entrable version
of the WTOR below is the relvant code
LTORG
DEBUG_MESS DC C'THE BASE ADDRESS IS '
TBL DC240X'00'
DCC'0123456789ABCDEF'
WTOR and WTO are macros that require a model parameter list to be constructed
and populated *before* you issue the MF=E form.
Zeroing the parameter list is NOT sufficient - you must move in a model MF=L
form just before the MF=E invocation.
More modern macros have the ,COMPLETE option on the
Here is some code from a working program I have to issue a rent WTOR.
You should be able to modify this for your needs..
*--*
* WTOR
*--*
LAR2,L'REPLY
While I believe all our meetings are good ones, I think the upcoming one is
overflowing with VM and Linux goodness:
Date: March 28, 2012
Location: Computer Associates
2291 Wood Oak Drive
Herndon VA
Time: 8:30 for 9:00 until 2pm
STASH - Jim Porell IBM
This session
Rob,
I understand that however moving the model *statement* would be sufficient
if I coded WTOR MF=(E,WTOR_LIST)
By coding
WTOR TEXT=(D_MSG,REPLYAREA,REPLY_LEN,REPLY_ECB),MF=(E,WTO_D_LX
ST)
With the parameters the macro should
Hi,
Does anybody have a clue how the
PASSPHRASE is encrypted in RACF? It looks very much like SHA (SHA-1 I
hope), it depends on both the username and password, but how is it
build?
Yes, I have asked in the RACF list already :)
Br,
Costin
I do not think so.
There could well be parameter list contents that are not set during MF=E logic
that are primed by MF=L.
Just because you specify all possible parameters does not mean that WTOR/WTO
MF=E will generate a fully constructed parameter list.
It is a historical thing - and
What error are you getting?
On Mon, 19 Mar 2012 10:07:18 -0400 Micheal Butz michealb...@optonline.net
wrote:
:Rob,
:
:I understand that however moving the model *statement* would be sufficient
:if I coded WTOR MF=(E,WTOR_LIST)
:By coding
:
:WTOR
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf
Of Rob Scott
Sent: Monday, March 19, 2012 10:17 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: WTOR problem
I do not think so.
There could well be parameter list contents that are not set during MF=E
Thanks
worked
WTO_D_CON WTOR TEXT=(,REPLYAREA,REPLY_LEN,REPLY_ECB),MF=L model
statement
WTO_D_CON_LEN EQU *-WTO_D_CON
Followed by
WTOR TEXT=D_MSG,MF=(E,WTO_D_LST)
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On
As you specified it, it is not reentrant as the MF=L generates A-cons.
On Mon, 19 Mar 2012 11:02:00 -0400 Micheal Butz michealb...@optonline.net
wrote:
:Thanks
:
:worked
:
:WTO_D_CON WTOR TEXT=(,REPLYAREA,REPLY_LEN,REPLY_ECB),MF=L model
:statement
:WTO_D_CON_LEN EQU *-WTO_D_CON
:
Sorry if I'm being pedantic, but SHA-1 is not an encryption algorithm - it
is a cryptographic hash function.
http://en.wikipedia.org/wiki/Cryptographic_hash_function
On Mon, Mar 19, 2012 at 9:09 AM, Costin Enache e_cos...@yahoo.com wrote:
Hi,
Does anybody have a clue how the
PASSPHRASE is
Checkpoint LEVEL and checkpoint MODE are 2 distinct and unrelated
parameters.
Checkpoint LEVEL is a JES level set required for MAS dependencies on
certain functions. If any system in the MAS is not at the required
level, or the checkpoint level is insufficient, the new function
cannot be used
And this requirement to move from an assembled model expansion into the remote
parameter list is even documented in the IBM book(s). For example, find the
first chapter Using the Services, section Macro forms, subsection
Conventional List Form Macros in any of the Assembler Services Guide
Of course. The final result looks like SHA-1, but several operations could take
place before - DES, etc. At the end it is a cryptographic operation. The corect
question would be - how are the passwords hashed, and potentially encrypted,
for RACF passworh phrases?
On Mon, 19 Mar 2012 07:36:06 -0500, J Ellis jerry.el...@libertymutual.com
wrote:
If there is a way to get this remotely, [without t]he SE being on the network,
please tell me how.
I have had some success with a sellect/copy all, and then pasting into an
EXCEL worksheet, most
of the time EXCEL
http://www.arcamax.com/thefunnies/freerange/s-1110960
John McKown
Systems Engineer IV
IT
Administrative Services Group
HealthMarkets(r)
9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone *
john.mck...@healthmarkets.com * www.HealthMarkets.com
Confidentiality Notice: This
Ben - I disagree that the code is non-rent. While there are a-cons
generated by the WTOR MF=L macro expansion the WTOR MF=E macro is
replacing these a-cons. The code does successfully execute in a program
linked as RENT REUS.
MF=L WTOR:
Loc Object CodeAddr1 Addr2 Stmt Source
On 3/19/2012 10:27 AM, McKown, John wrote:
http://www.arcamax.com/thefunnies/freerange/s-1110960
Ummm. so which comic struck you so funny? The discosaurus?
John McKown
Systems Engineer IV
IT
Administrative Services Group
HealthMarkets(r)
9151 Boulevard 26 * N. Richland Hills * TX 76010
On Mon, 19 Mar 2012 16:19:37 +, Costin Enache wrote:
Of course. The final result looks like SHA-1, but several operations could
take place before - DES, etc. At the end it is a cryptographic operation. The
corect question would be - how are the passwords hashed, and potentially
encrypted,
Yes. I kept getting a John Travolta Saturday Night Fever overlay in my sight
and couldn't stop laughing. Sorry for the off-topic.
--
John McKown
Systems Engineer IV
IT
Administrative Services Group
HealthMarkets(r)
9151 Boulevard 26 * N. Richland Hills * TX 76010
(817) 255-3225 phone *
Well, the standard DES crypto for RACF (iSeries also) is using the password as
the key to encrypt the username (profile name). In a practical sense, it is
like hashing - the key is never stored on the system, so it cannot get stolen.
It is also quite strong, but the algo is outdated and
Airplane! did a good Staying Alive dance.
http://www.youtube.com/watch?v=xLQWPgQMHhQ
On Mon, Mar 19, 2012 at 11:38 AM, McKown, John
john.mck...@healthmarkets.com wrote:
Yes. I kept getting a John Travolta Saturday Night Fever overlay in my
sight and couldn't stop laughing. Sorry for the
On 3/19/2012 8:45 AM, Micheal Butz wrote:
I am having problems with following coding generating a re-entrable version
of the WTOR below is the relvant code
WTOR TEXT=(D_MSG,REPLYAREA,REPLY_LEN,REPLY_ECB),MF=(E,WTO_D_L
When you are dealing with old macros, use a PRINT ON,GEN
On 3/18/2012 1:29 PM, Paul Gilmartin wrote:
When you use the ALLDATA option, DSS copies whatever exists past
the last valid EOF. ...
Presumably also past DS1LSTAR?
I didn't want to write a novel. When I make permanent backups
with DSS, I normally use ALLEXCP; that way a clobbered LSTAR
W dniu 2012-03-19 13:36, J Ellis pisze:
My HMC's are all on the network, the problem is you can not FTP the WWPN off to
your workstation, I was told in an ETR that is was because the SE has no FTP
connection to the outside network. When I go in to single object mode to the SE
so I can see the
In our configuration data set, you can specify a default, global value for
something. Specific entries in the configuration can override that global
value. However, there are cases where you *must* specify a null value on a
specific entry, as if you had no default, global value.
Our internal
I feel the asterisk should mean use the global default and the '' should mean
don't use
any value.
/Tom Kern
On 3/19/2012 17:12, Phil Smith wrote:
In our configuration data set, you can specify a default, global value for
something. Specific entries in the configuration can override that
IMHO using '*' to represent null violates the Principle of Least
Astonishment. '*' is often used in masking to represent anything,
which is a long way from null.
How about using NULL to represent null, e.g.,
thing3(option1,NULL) /* This would define another thing and say even
if you have a
Seems retro to me like when I wrote my first CLIST back in 1976. Sort of
depends on the called program and how it's gonna parse the entries-DEBUG(Y).
In a message dated 3/19/2012 4:16:20 P.M. Central Daylight Time,
p...@voltage.com writes:
Based on the collective wisdom of the
I think (hope) you mean two single quotes '
Not a double quote
Are you asking how to document or how to code the parameter or how to code the
interpretation of the parameter?
Dave Gibney
Information Technology Services
Washington State University
-Original Message-
From: IBM
On Tue, 13 Mar 2012 12:51:26 -0400, Shmuel Metz (Seymour J.)
shmuel+ibm-m...@patriot.net wrote:
Is there any translation table in z/os 1.11 that translates the NOT
SIGN x'5F' to an ascii x'AC',
These is no ASCII 'AC'X; you really need to know what code pages
you're using to get a correct
Hi Folks,
With todays' modern disk arrays, is there any reason (z/OS based or other)
that response time for my Mod54s is consistently higher than for my Mod9s?
Assume identical workload against each, single array with multiple LCUs.
RMF says the LCUs are pretty well balanced.
On Mon, 19 Mar 2012 17:43:45 -0400, Gord Tomlin wrote:
IMHO using '*' to represent null violates the Principle of Least
Astonishment. '*' is often used in masking to represent anything,
which is a long way from null.
How about using NULL to represent null, e.g.,
thing3(option1,NULL) /* This
Lester, Bob wrote:
Hi Folks,
With todays' modern disk arrays, is there any reason (z/OS based or other)
that response time for my Mod54s is consistently higher than for my Mod9s?
Assume identical workload against each, single array with multiple LCUs.
RMF says the LCUs are pretty
Bob,
On reason why 3390-54 may have higher response time than 16x3390-9 is that
the underlying volume is striped over less physical disk drives.
Ignoring wide striping, in most DASD volume layouts a single volume is
spread over two, four or eight disk drives. One 3390-54 will there have 2 to
8
Gil,
When I said choked, I really meant crashed (as in choked and died).
The reference to DFSMSdss is my bad, and in fact it may have been changing
DFSMShsm to use the dss datamover that solved many of the dataset left
behind problems we were having at this particular site. It's been 15 years
Gerhard,
Does this ALLDATA change the access method used by DFSMSdss? For logical
copy I've found that DFSMSdss actually calls utilities like IDCAMS and
IEBCOPY to read or write the dataset. I'm guessing that using ALLDATA to
read all the allocated space for a dataset would cause DFSMSdss invoke
You can use DF/DSS EXEC card parm UTILMSG=YES to see what 'general access
method' ADRDSSU is using to copy data. Default is UTILMSG=ERROR (only if
utility bugs out).
Ant.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Ron Hawkins
46 matches
Mail list logo