Hi,
In the past, I’ve used Jan Jaeger’s NODSI program to delete datasets that had
an enque against them.
Since we move to z/OS 1.11, the program has stopped working correctly.
The JCL I am using is:
//NODSIEXEC PGM=NODSI,PARM='IEHPROGM,LINECNT=66'
//VOLDDDD
Dear all
One system has been migrated from z/OS 1.9 to z/OS 1.11
in ZOS 1.9 sdsf joblog,the information of a job will be like:
JOB61899 -JOBNAME STEPNAME PROCSTEPRC EXCP CONNTCBSRB
JOB61899 -NBJRDBH DEL531 00246442 551177.00
I don't know if this applies to your situation. But it does relate to
left over ENQs.
http://www-01.ibm.com/support/docview.wss?uid=isg1OA32615
2011/4/13 גדי בן אבי gad...@malam.com:
Hi,
In the past, I’ve used Jan Jaeger’s NODSI program to delete datasets that had
an enque against them.
No,
That relates to NFS, which we don't use at all.
Thanks
Gadi
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Mike Schwab
Sent: Wednesday, April 13, 2011 9:15 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Problem with NODSI program
I
Radek,
with every integrated solution you can say you can buy individual
things and put them together. Of course. It is the controlling logic
that makes it integrated, in this case zManager.
Power blades in zBX - I don't think there are other than IBM Power
blades, IBM decided to support one kind
Dear all
I checked the PMR and found the following result:
I have checked several of our systems and the default, at z/OS 1.11
1.10 and 1.8 does not show JOBNAME.
We
W dniu 2011-04-13 08:26, Marian Gasparovic pisze:
[...]
It is the controlling logic
that makes it integrated, in this case zManager.
It's still managemnet for management. While centralized management is
fine, it's still not crucial for the applications to run. (see also end
of my post)
Have you tried SCRATCH DSNAME=SYS1.VTAMLST,VOL=3390=Z1BD05 ?
Date: Wed, 13 Apr 2011 09:07:16 +0300
From: gad...@malam.com
Subject: Problem with NODSI program
To: IBM-MAIN@bama.ua.edu
Hi,
In the past, I’ve used Jan Jaeger’s NODSI program to delete datasets that had
an enque
Thanks,
I guess you have better eye sight than I do.
Gadi
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
J R
Sent: Wednesday, April 13, 2011 10:24 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Problem with NODSI program
Have you tried
Short version of the question: Does anyone know which access method
AMATERSE uses to write untersed data out?
Longer version: Does anyone have any practical experience of using it with
BatchPipes/MVS aka Pipes? Particularly with SMF.
Here's why I ask: The first thing I do when I get a
They're not the easiest records to parse, BTW. But then again they're not
the hardest. :-)
Martin
Martin Packer,
Mainframe Performance Consultant, zChampion
Worldwide Banking Center of Excellence, IBM
+44-7802-245-584
email: martin_pac...@uk.ibm.com
Twitter / Facebook IDs: MartinPacker
Blog:
Thanks Ravi. I was going to post the same answer. But it begs the
question: What's a connector in this context?
(Yes, I've mapped this record before and am still attempting to understand
what it's telling me.)
Thanks, Martin
Martin Packer,
Mainframe Performance Consultant, zChampion
Worldwide
Mark,
I'm suitably impressed.
You can do this with some of the database reorg software, but they aren't
part of the base OS.
I can understand some of the OP's frustration now.
Ron
If it was a file on a Linux system using LVM, I could move the physical
extents that hold that file anywhere
Martin Packer martin_pac...@uk.ibm.com wrote on 04/13/2011 04:04:36 AM:
Short version of the question: Does anyone know which access method
AMATERSE uses to write untersed data out?
Short answer to the short version of the question: QSAM
Jim Mulder z/OS System Test IBM Corp.
Did a simple Google trick ..
http://www.pacsys.com/smf/smf74_subtype7.htm
and it explain SMF747CO 4 binary Offset to connector data section.
Purpose: Record type 74 has several subtypes.
Subtype 7 — FICON Director Statistics
FCD connector data section : Contains configuration data for
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Gibney, Dave
That's a couple of big ifs - that's why we can't use it. Our
workstation IP
addresses, even if fixed (like mine - most are not), cannot be
accessed from
z/OS. I would think most real-world shops
-Original Message-
From: IBM Mainframe Discussion List
[mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Dick Bond
Sent: Tuesday, April 12, 2011 5:19 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Cool Things You Can Do in z/OS
That's a couple of big ifs - that's why we can't use it.
Our
I would submit that the plural of virus is probably Windows.
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On
Behalf Of IBM-MAIN automatic digest system
Sent: Wednesday, April 13, 2011 12:00 AM
To: IBM-MAIN@bama.ua.edu
Subject: IBM-MAIN Digest - 11 Apr 2011 to 12 Apr 2011
From personal experience here: Our z/OS network person campaigned for no
outbound connections (other than whitelisted) because he knows that the
majority of the corporate information resides on the z/OS system. So he felt
this was a good security thing. But then we allow anybody to do an ftp
After that last effort I decided I'd better see who had trodden on
Johns corns and caused him to fire up again.
Dave, Dave, Dave ...
Next time we bump into each other in a bar this should keep us
suitably entertained.
Shane ...
Hello,
How do I check that all the dataset in the Target volumes
are indirectly cataloged.
For the single datset, I can go to ISPF 3.4 and against the
datset listcat ent(/) all command will give me volser information ,
catalog information and device type detai.
-Original Message-
From: IBM Mainframe Discussion List
[mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Donnelly, John P
Sent: Tuesday, April 12, 2011 3:35 PM
To: IBM-MAIN@bama.ua.edu
Subject: TSO Profile NUM and PACK
We had some difficulties with a critical FTP transmission
over
snip
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On
Behalf Of Frisbie, Jim
Sent: Wednesday, April 13, 2011 7:38 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: IBM-MAIN Digest - 11 Apr 2011 to 12 Apr 2011 (#2011-102)
I would submit that the plural of virus is probably Windows.
Saurabh,
I use a two step process for this.
1) I execute an IEHLIST against the volume that I wish to validate all
data sets are indirectly cataloged (normally a SYSRES and/or DLIB volume)
2) I then execute a Rexx execute that I wrote which will perform a LISTC
against the data set name
Hi, All,
In a RECEIVE FROMNETWORK job stream that has worked flawlessly for
centuries, the following DD statement today spewed a JCL error:
SMPWKDIR DD PATH='/tmp/gimsmp/',
PATHOPTS=(ORDWR,OCREAT,OEXCL),
PATHMODE=(SIRWXU,SIRGRP)
The /tmp filesystem is
On 4/13/2011 6:36 AM, Anthony Thompson wrote:
We had a similar issue here: occasionally a mountpoint directory and/or
associated symbolics went missing after an OS upgrade and a new root file
system was moved into production / development systems.
This is not a good answer for upgrades, but
snip
z/OS V1R11.0 Migration - All supported migration paths z/OS V1R11.0
GA22-7499-16
Description: No supported release of z/OS® honors the IMBED, REPLICATE, and
KEYRANGE attributes for new VSAM data sets.
/snip
Our z/OS 1.11 system is allowing the IMBED attribute for new VSAM data
sets. Is this
I would think that 'allowing' and 'honoring' are two different things. That is,
the cluster may have the attribute in the catalog entry but the code no longer
does anything with it.
You see this in other contexts for depreciated keywords: '...checked for syntax
and ignored...'
HTH and good
Some might argue that a LAN cannot be considered 'secure' if there is a Windows
box anywhere in the path :-)
As near as I can tell, PCI does not currently require encryption on internal
LANs. However, I've read about internal networks being penetrated and
compromised, so I wonder if that the
I am trying to get TSSO running, and I have run into a problem the worst of
which is being a newbie to TSSO. The OSCMD command works fine in a CLIST,
but I prefer to use REXX. I originally tried setting CMDRESP= 'CLIST' but found
out with a Instruction trace that while the code finds the
IIRC no new dataset can be created with those attributes (keywords
ignored) but if an existing dataset has them it is still processed
accordingly. If the dataset is recreated (delete/define) or restored
the attributes will be removed.
-Original Message-
From: IBM Mainframe Discussion
JC that was a good question, I was a network guy in a past life, I think some
of
the fear is not justified if the companies have the right firewalls in place.
I worked a place that had 3 firewalls to separate companies, etc. This was a
maintenance nightmare. But this issue was of poor design.
The creation date was 2011.097 according to LISTCAT.
Regards,
John K
From: Ken Porowski ken.porow...@cit.com
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On
Behalf Of Shane
Sent: Wednesday, April 13, 2011 5:44 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: The plural of 'virus'
After that last effort I decided I'd better see who had trodden on
Johns
Perhaps network/PC people simply can't conceive of a server being that
secure/robust. Indeed, I know of a network guy who firmly believes that the MF
would fail if presented with enough network traffic.
To be fair, the burden of dealing with Windows security has fallen to the
network
On Wed, 13 Apr 2011 10:06:36 -0500, John P Kalinich wrote:
The creation date was 2011.097 according to LISTCAT.
I think that's the restore date not the true creation date. The IMBED
attribute is not removed by DFSMSdss/hsm during restore.
Norbert Friemel
Norbert,
We use ABR instead of HSM, but the create date was from an IDCAMS DEFINE.
Regards,
John K
From: Norbert Friemel nf.ibmm...@web.de
W dniu 2011-04-13 17:06, John P Kalinich pisze:
The creation date was 2011.097 according to LISTCAT.
Can it be result of RESTORE?
--
Radoslaw Skorupka
Lodz, Poland
--
Tre tej wiadomoci moe zawiera informacje prawnie chronione Banku
przeznaczone wycznie do uytku subowego adresata.
On Wed, 13 Apr 2011 12:14:45 -0500, John P Kalinich jkali...@csc.com
wrote:
Norbert,
We use ABR instead of HSM, but the create date was from an IDCAMS
DEFINE.
Regards,
John K
John, you may want to verify that is a fact. I just attempted to do a DEFINE
with IMBED and REPLICATE and the
Latin is a dead language
It's dead as it can be
First it killed the Romans
And now it's killing me.
Tom Puddicombe
Mainframe Performance Capacity Planning
CSC
71 Deerfield Rd, Meriden, CT 06450
ITIS | (860) 428-3252 | tpudd...@csc.com | www.csc.com
This is a PRIVATE message. If you are not
Mea culpa. Yes, it was the result of a FDR/ABR restore.
Regards,
John K
From: R.S. r.skoru...@bremultibank.com.pl
You are correct, it was from an ABR RESTORE. Sorry to bother the list.
Regards,
John K
From: Patrick Lyon ptl...@midamerican.com
I need to run an ALTER on a number of datasets that nullifies the
MANAGEMENTCLASS. I've tried IDCAMS ALTER with MGMTCLAS(), MGMTCLAS(''),
MGMTCLAS(-), and a number of other combinations. Nothing seems to be
allowed in batch, whereas I can specifiy a '-' in MANAGEMENTCLASS in the
ISMF panels and
wow - good thing I didn't say I thought it was 4th declension. but then I
don't trust most 50yr old memories even those from Latin School. I toured
my high school 2 yrs ago during 50th reunion and the thing looks a lot
smaller inside than I remember. It was nice to see places in the building
Latin is not dead. Many people converse in Latin around the world, especially
within Vatican City. There is also a radio news broadcast in Latin:
http://en.wikipedia.org/wiki/Nuntii_Latini
At least one American public high school has conversational Latin classes:
According
tohttp://dtsc.dfw.ibm.com/MVSDS/%27HTTPD2.ADCD.GLOBAL.HTML%28READM112%29%27#Header_04http://dtsc.dfw.ibm.com/MVSDS/%27HTTPD2.ADCD.GLOBAL.HTML%28READM112%29%27#Header_04
the Ported tools for z/OS (HOS1120) is part of the ADCD. A scan through SMP/E
indicates it's installed. However, I
Is it possible there are filesystems that have not been properly mounted?
On Wed, Apr 13, 2011 at 2:28 PM, Neale Ferguson ne...@sinenomine.netwrote:
According to
http://dtsc.dfw.ibm.com/MVSDS/%27HTTPD2.ADCD.GLOBAL.HTML%28READM112%29%27#Header_04
My approach is brute force.
1 - Run a LISTCAT VOL against the catalog(s) of interest.
2 - Edit the resulting listing (usually using SDSF SE command)
3 - Issue multiple X ALL VOLSERvv commands where vv
is each indirect (including **) or actual volume I'm not
Copy the IEFACTRT source you were using on the old system and reassemble it.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
ibmnew
Sent: Tuesday, April 12, 2011 11:34 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Jobname colums was lost in
That should be NX, not NV.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Schwarz, Barry A
Sent: Wednesday, April 13, 2011 11:44 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: LISTCAT command
My approach is brute force.
1 - Run a LISTCAT
Over the years many modules with unnnecessary AC=1 attributes have been
changed to be AC=0.
I thought the original post asserted that there was a problem when this
module was not AC=1. Did anyone explain what that problem was?
Obviously if it needs to do authorized things *and* if it can be a
For global settings, check the ISPF Configuration Table section of the ISPF
Planning and Customization manual (my copy is GC34-4814-08, chapter 2, figure
8).
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Donnelly, John P
Sent:
Are you getting an error message on the attempt? Can you post it?
Greg Shirey
Ben E. Keith Company
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Eric Gustavison
Sent: Wednesday, April 13, 2011 12:42 PM
I need to run an ALTER on a number of datasets that
Hi, just wanted to get this on your calendarswork is underway to
relaunch the VM Workshop as the VM and Linux Workshop.
July 28-30, 2011 at Ohio State University in Columbus Ohio.
When they tell me that the new workshop web site is ready I will
add the link to it on the VM events calendar.
snip--
I would submit that the plural of virus is probably Windows.
/snip
More precisely Microsoft Outlook
-unsnip-
Don't ignore IE
-snip
Saurabh,
I use a two step process for this.
1) I execute an IEHLIST against the volume that I wish to validate all
data sets are indirectly cataloged (normally a SYSRES and/or DLIB volume)
2) I then execute a
-snip
Perhaps network/PC people simply can't conceive of a server being that secure/robust. Indeed, I know of a network guy who firmly believes that the MF would fail if presented with enough network traffic.
To
My LISTCAT output shows the symbolic (SYSR1) for the volume name the
datasets reside on. So you should be able to parse the IDCAMS LISTCAT
output looking for the dataset and symbolic volume name.
On Wed, 13 Apr 2011 14:45:36 -0500, Rick Fochtman rfocht...@ync.net wrote:
-Original Message-
From: IBM Mainframe Discussion List
[mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Rick Fochtman
Sent: Wednesday, April 13, 2011 2:58 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Fear the Internet, was Cool Things You Can Do in z/OS
snip
Hal, you're right in that no
On Wed, Apr 13, 2011 at 3:18 PM, McKown, John
john.mck...@healthmarkets.com wrote:
Try running Linux with the SELinux enhancements fully implemented. That makes
Linux very difficult (to me) to break. SELinux implements MAC controls
instead of DAC controls. And it can even make it impossible
-Original Message-
From: IBM Mainframe Discussion List
[mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Mike Schwab
Sent: Wednesday, April 13, 2011 3:25 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Fear the Internet, was Cool Things You Can Do in z/OS
snip
Writing the SE Linux was done
mike.a.sch...@gmail.com (Mike Schwab) writes:
Writing the SE Linux was done with a National Security Agency (No Such
Agency) (NSA) research grant.
http://www.nsa.gov/research/selinux/
also from long ago and far away:
http://www.nsa.gov/research/selinux/list-archive/0409/8362.shtm
--
Ok guys, let me ask one question, btw I also working in Security now,ACF2,RACF
and TSS. How many MF hackers or viruses have you seen, I have been at it
40yrs,
never one .. I am not saying it wont occur, but the odds are against it based
on
the complexity of the environments. I have customers
XMASCARD EXEC
i
-- Original Message --
Received: 04:12 PM COT, 04/13/2011
From: Scott Ford scott_j_f...@yahoo.com
To: IBM-MAIN@bama.ua.edu
Subject: Re: Fear the Internet, was Cool Things You Can Do in z/OS
Ok guys, let me ask one question, btw I also working in Security
now,ACF2,RACF
??? whats it XMASCARD
Scott J Ford
From: Ian S. Worthington ianworthing...@usa.net
To: IBM-MAIN@bama.ua.edu
Sent: Wed, April 13, 2011 5:16:07 PM
Subject: Re: Fear the Internet, was Cool Things You Can Do in z/OS
XMASCARD EXEC
i
--
Especially since I have read that Washington, Jefferson and their crew
wanted to originally model the republic after the old Greek form of
government.
On Wed, Apr 13, 2011 at 11:08 AM, Bill Fairchild bi...@mainstar.com wrote:
Latin is not dead. Many people converse in Latin around the world,
At least one American public high school has conversational Latin classes
There was a recent contest in Toronto.
The T-Shirts, worn by the team of the winning high school, was inscribed with
the motto:
Quis est patris vobis?
Sent wirelessly from my BlackBerry device on the Bell network.
Envoyé
That was an interesting bit of history, but the link you provided is missing a
trailing letter L (shtml, not shtm) for anyone else who wants to try the link.
HTH
Peter
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On
Behalf Of Anne Lynn
Don't ignore IE (Internet Express). More holes than a screen door!
INTERNET Explorer.
Sent wirelessly from my BlackBerry device on the Bell network.
Envoyé sans fil par mon terminal mobile BlackBerry sur le réseau de Bell.
--
Don't ignore IE (Internet Express). More holes than a screen door!
INTERNET Explorer.
Internet EXPLODER!
CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains
confidential and privileged information intended only for the addressee.
If you are not the intended recipient,
We can connect to IBM and other known Internet websites just fine from our
mainframes but some of our Intranet(s) are prohibited, like the one my PC is
on. We also are not allowed remote access to our HMC(s). I can't vouch
for our network people, I was just stating what they apparently consider
I meant wsa.exe
On Wed, Apr 13, 2011 at 2:43 PM, Dick Bond dickbond...@gmail.com wrote:
We can connect to IBM and other known Internet websites just fine from our
mainframes but some of our Intranet(s) are prohibited, like the one my PC is
on. We also are not allowed remote access to our
On Wed, Apr 13, 2011 at 4:18 PM, Scott Ford scott_j_f...@yahoo.com wrote:
??? whats it XMASCARD
Scott J Ford
http://forums.vindy.com/read.php?1,489019,page=3
While a Student at Illinois State University in Normal, I was told
they had some program hogging the 3270 terminals
Eric,
I believe that the behavior you are seeing is consistent with the designs of
IDCAMS and ISMF.
As far as I know, the IDCAMS ALTER command has no notation to indicate a null
management class.
The ISMF ALTER command is handled by PGM(DGTFAL01), which normally invokes a
CLIST called
Technically, a worm. It was an exec that if you executed it, it sent
itself to everyone in your address list. Back in the days of bitnet.
Tended to fill VM spool
Cookie and its ilk required the prankster to physically access your
logged on session.
Dave Gibney
Information Technology Services
scott_j_f...@yahoo.com (Scott Ford) writes:
??? whats it XMASCARD
recent post
http://www.garlic.com/~lynn/2011b.html#9
mentions:
there was xmas exec on bitnet in nov87 ... vmshare archive
http://vm.marist.edu/~vmshare/browse?fn=CHRISTMAft=PROB
and was almost exactly a year
Well 1987 wow before the real firewalls. Security was on the inbound/outbound
dial devices. Also worked VM, cut my teeth on VM/SP1
, loved VM, still do, I can how a exec would cause major pain in a VM system,
no
doubt. z/OS would be a bit tougher I would think, plus a pre-req would be
enough
they had some program hogging the 3270 terminals saying it was the Cookie
Monster and when someone typed in Cookie it shut down.
Guessing some sort of prank program.
I was told, in University by masters grad who co-op'd as a MULTICS developer,
that it was a security penetration process that was
Oh boy, do you have some fun cut out for you!
//SYSLIB DD DISP=SHR,DSN=DB2.DSN710.ADSNMACS
//SYSINDD *
* See DB2 Performance and Tuning Section 5.4.1.1
* *** DSNDQWST DSECT=YES,SUBTYPE=ALLType 100
scott_j_f...@yahoo.com (Scott Ford) writes:
Well 1987 wow before the real firewalls. Security was on the inbound/outbound
dial devices. Also worked VM, cut my teeth on VM/SP1
, loved VM, still do, I can how a exec would cause major pain in a VM system,
no
doubt. z/OS would be a bit tougher
In my second job as a capacity/performance, MICS wasn't ready for DB2.
So, I took the manual and coded a SAS programme to parse the SMF records
produced.
The documentation didn't have offsets -- just type length.
There were a lot of typo and offset errors before I got clean code.
Also, the
Update a service request
To utilize all of the features of SR for the System z software to which
you are licensed, it is now necessary to have a System z software services
contract for SoftwareXcel Enterprise Edition, SoftwareXcel Basic Edition
or Resolve. Our information indicates that your
*Does anybody can help me about esoterics names in DB2 V8 ??? We want to
make a migrate, to unit Hydra, and we are not sure, if exist this nomination
for it, tests were made in previous version(V7), and failed.*
**
*Answers will be welcome *
**
*Best regards*
**
*Jorge Arueira *
*Support
Quite possibly. I'm a USS-newbie so don't know where to start looking to answer
that question.
Neale
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET
You can't answer the question without local site knowledge; no amount of USS
training will help you. The dsname of the filesystem that is mounted at any
mountpoint is completely up to whoever installed the software in that
directory, hopefully using local dataset naming standards.
The only
On Mon, Apr 11, 2011 at 9:38 PM, Gibney, Dave gib...@wsu.edu wrote:
snip
As to cynical, I only need look at some of the recent neophyte questions
on these lists to realize just how far some outfits are out on the limb
asking with completely unprepared people to safeguard systems presumably
Hi,
What version of TSSO are you using and what version of z/OS are you using it
under?
Did you assemble TSSO on the level of the system that you are using now?
You can contact me offline if you want to discuss how to set things up
correctly.
Brian Westerman
There is no shame in not knowing how to complete the setup, especially on an
ADCD system. The first thing that you have to remember is that not all ADCD
releases had the complete set of ported tools, there are many parts and they
are not all necessarily there for you to use yet, but the good news
88 matches
Mail list logo