Re: When will ADRDSSU start to ENQUEUE on data sets?
Hello Johnny, Does your backup job use generic dataset masks for the INCLUDE list? Search the archives for earlier posts on DF/DSS using the older SVC26 interface to retrieve CATALOG data. In one case here a job took 2 hours to build the dataset list before mounting the first output tape. Changing the job by adding build-include-list step, before calling ADRDSSU, which uses REXX to call the IGGCSI00 Catalog Search Interface and built an explicit filter list (FILTERDD), reduced that wait time to 2 minutes. If you need to ENQUEUE on the dataset, just add //DD001 DD DISP=SHR,DSN=dataset1 etc to your backup JCL. On Wed, 30 Apr 2008 11:08:56 +0800, Johnny Luo [EMAIL PROTECTED] wrote: Hi, We encountered a problem on our production system. A job was using DSS to backup a lot of data sets (logical dump) and we got ADR321E for one extended format PS data set: the data set was not on the supposed volume. This job will run more than 3 hours and we found out that another job will delete the data set and re-create it during that time (1.5 hours after the dump job starts). It might be the cause of ADR321E. snip Best Regards, Johnny Luo Regards Bruce Hewson //MYUSERBLD JOB (ACCT#),'BUILD FILTER LIST', // CLASS=I, // MSGCLASS=X, // NOTIFY=SYSUID //* //* //BGTSOEXEC PGM=IKJEFT01,DYNAMNBR=100 //* //MASKLIST DD * SA%%.CICS.%%.DFHCSD SE%%.CICS.%%.DFHCSD SC%%.CICS.%%.DFHCSD /* //SYSTSIN DD * %BILDFILT MASKLIST /* //* //FILTERDD DD DISP=(NEW,PASS), // SPACE=(TRK,(1,1)), // DSORG=PS,LRECL=80,RECFM=FB,BLKSIZE=0, // DSN=amp;FILTERDD //* //* //SYSTSPRT DD SYSOUT=* //SYSPRINT DD SYSOUT=* //SYSPROC DD DISP=SHR,DSN=MYUSER.USER.CMDPROC //* //* //DUMPEXEC PGM=ADRDSSU,PARM='TYPRUN=NORUN' //FILTERDD DD DISP=(OLD,DELETE), // DSN=amp;FILTERDD //SYSPRINT DD UNIT=SYSDA,DISP=(NEW,CATLG),SPACE=(CYL,(2,1),RLSE), // DSN=MYUSER.DFDSS.TESTRUN.SYSPRINT,DCB=DSCB, // RECFM=VFB,LRECL=137,DSORG=PS //BACKUPDD DSN=MYUSER.DFDSS.TESTRUN.BACKUP, // UNIT=3390,SPACE=(CYL,(100,20),RLSE), // DISP=(,CATLG,DELETE) //SYSINDD * DUMP DATASET( - FILTERDD(FILTERDD) - ) - OUTDDNAME(BACKUP) - TOLERATE(ENQFAILURE) - SPHERE- CONCURRENT- SHARE /* //* // -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: When will ADRDSSU start to ENQUEUE on data sets?
Bruce, Thanks a lot!!! I must say, it's a great idea. We have lots of job runing hours to backup data sets both in production and test environment and they all use generic filter. The possible performance gain is well worth doing and I will work on it right now. The rexx requires some work cause I don't want to change the way other people use DSS. So my rexx must be able to process any data set list syntax DSS recognizes. Thanks. On Wed, Apr 30, 2008 at 2:01 PM, Bruce Hewson [EMAIL PROTECTED] wrote: Hello Johnny, Does your backup job use generic dataset masks for the INCLUDE list? Search the archives for earlier posts on DF/DSS using the older SVC26 interface to retrieve CATALOG data. In one case here a job took 2 hours to build the dataset list before mounting the first output tape. Changing the job by adding build-include-list step, before calling ADRDSSU, which uses REXX to call the IGGCSI00 Catalog Search Interface and built an explicit filter list (FILTERDD), reduced that wait time to 2 minutes. If you need to ENQUEUE on the dataset, just add //DD001 DD DISP=SHR,DSN=dataset1 etc to your backup JCL. On Wed, 30 Apr 2008 11:08:56 +0800, Johnny Luo [EMAIL PROTECTED] wrote: Hi, We encountered a problem on our production system. A job was using DSS to backup a lot of data sets (logical dump) and we got ADR321E for one extended format PS data set: the data set was not on the supposed volume. This job will run more than 3 hours and we found out that another job will delete the data set and re-create it during that time (1.5 hours after the dump job starts). It might be the cause of ADR321E. snip Best Regards, Johnny Luo Regards Bruce Hewson //MYUSERBLD JOB (ACCT#),'BUILD FILTER LIST', // CLASS=I, // MSGCLASS=X, // NOTIFY=SYSUID //* //* //BGTSOEXEC PGM=IKJEFT01,DYNAMNBR=100 //* //MASKLIST DD * SA%%.CICS.%%.DFHCSD SE%%.CICS.%%.DFHCSD SC%%.CICS.%%.DFHCSD /* //SYSTSIN DD * %BILDFILT MASKLIST /* //* //FILTERDD DD DISP=(NEW,PASS), // SPACE=(TRK,(1,1)), // DSORG=PS,LRECL=80,RECFM=FB,BLKSIZE=0, // DSN=FILTERDD //* //* //SYSTSPRT DD SYSOUT=* //SYSPRINT DD SYSOUT=* //SYSPROC DD DISP=SHR,DSN=MYUSER.USER.CMDPROC //* //* //DUMPEXEC PGM=ADRDSSU,PARM='TYPRUN=NORUN' //FILTERDD DD DISP=(OLD,DELETE), // DSN=FILTERDD //SYSPRINT DD UNIT=SYSDA,DISP=(NEW,CATLG),SPACE=(CYL,(2,1),RLSE), // DSN=MYUSER.DFDSS.TESTRUN.SYSPRINT,DCB=DSCB, // RECFM=VFB,LRECL=137,DSORG=PS //BACKUPDD DSN=MYUSER.DFDSS.TESTRUN.BACKUP, // UNIT=3390,SPACE=(CYL,(100,20),RLSE), // DISP=(,CATLG,DELETE) //SYSINDD * DUMP DATASET( - FILTERDD(FILTERDD) - ) - OUTDDNAME(BACKUP) - TOLERATE(ENQFAILURE) - SPHERE- CONCURRENT- SHARE /* //* // -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- Best Regards, Johnny Luo -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Call XMIT from batch program
Hi Can I call TRASMIT/RECEIVE from batch program ? Do I need any special authorization ? -- Miklos Szigetvari Development Team ISIS Information Systems Gmbh tel: (+43) 2236 27551 570 Fax: (+43) 2236 21081 E-mail: [EMAIL PROTECTED] Info: [EMAIL PROTECTED] Hotline: +43-2236-27551-111 Visit our Website: http://www.isis-papyrus.com --- This e-mail is only intended for the recipient and not legally binding. Unauthorised use, publication, reproduction or disclosure of the content of this e-mail is not permitted. This email has been checked for known viruses, but ISIS accepts no responsibility for malicious or inappropriate content. --- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Chargeback for zIIP zAAP Usage
Al Sherkow writes: If you lower the general CPU rate you are passing on some of the platform's lower TCO with zXXP to *all* the users/customers. If you carry this far enough you lower the general CPU rate, and then you could use your option A. The same as for regular CPU.! If you believe chargebacks should accurately reflect true costs, I don't think I would agree with a single blended rate (for the same reasons I don't think there should be a single rate blending fixed and variable costs). End users do have the ability to influence zAAP and zIIP eligibility. If they fail to upgrade from backlevel Java, then they won't get zAAP benefits and they shouldn't pay the same rate as another user who did go to the trouble of upgrading, to pick one example. Or if they copy (stale) data from DB2 to some other data store via FTP rather than just accessing it directly via JDBC or ODBC, there should be a real reflection of true costs and the very different zIIP results between those two cases. But I do see your point about zAAP and zIIP eligibility versus actually running on the specialty engines. If zAAP or zIIP eligible work gets dispatched to the CPs, what rate should that work be? Said another way, do the operations people have any responsibility for trying to maximize the amount of eligible work that actually gets dispatched to the specialties? How do you preserve the incentives for operations to be as efficient as possible? I think the typical way business users keep their IT staff honest is by checking the price of outsourcing periodically -- getting competitive bids and comparing them to their internal organization, basically. This too raises a number of questions and potential problems, but it is one method. I generally find that bad chargebacks are worse than no chargebacks, so if you have to pick one pick the latter. Worse means they do more damage to the company's own financial and innovative interests. And there are a lot of bad chargeback regimes out there, unfortunately. For example, a lot of companies still put most or all of the data center facilities costs into mainframe chargebacks. That's just nuts and totally indefensible in 2008: the mainframe is the smallest and least demanding piece of equipment in many data centers. - - - - - Timothy Sipples IBM Consulting Enterprise Software Architect Specializing in Software Architectures Related to System z Based in Tokyo, Serving IBM Japan and IBM Asia-Pacific E-Mail: [EMAIL PROTECTED] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DFSMSRMM Server/Client setup
Hi There, Anybody out there using DFSMSRMM server/Client on systems that are using different levels of z/OS? The DFSMSRMM Implementation and Customization Guide has confusing statement in it. Which of these two are true ? 'All client and server systems must be at least at this release level. You can share the control data set with other systems that run any supported level of DFSMSrmm with any supported level of DFSMSrmm that has appropriate toleration maintenance installed. Crispin Hugo Systems Programmer Macro 4 Direct Line: +44 (0)1293 872121, Switchboard: +44 (0)1293 872000, Fax: +44 (0)1293 872001 This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 plc internal virus protection system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Call XMIT from batch program
I'd do it from a TSO step. At least that works for XMIT. Probably RECEIVE as well - though you'd have to know WHEN to RECEIVE. Martin Martin Packer Performance Consultant IBM United Kingdom Ltd +44-20-8832-5167 +44-7802-245-584 [EMAIL PROTECTED] Unless stated otherwise above: IBM United Kingdom Limited - Registered in England and Wales with number 741598. Registered office: PO Box 41, North Harbour, Portsmouth, Hampshire PO6 3AU -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Secure TN3270
You'll probably also want to think about how you move users over to encrypted connections in a sensible, phased manner so that you retire the non-encrypted connections by some expeditious date certain. (How expeditious depends on the sensitivity of your applications.) And the key -- no pun intended -- is to communicate well with users and explain the benefits to *them*. There are various approaches that work, but as you think about port definitions and the like it's something to anticipate. I think end users find it easier to figure out how to switch IP addresses instead of ports. So you can establish a second IP address with its own name server entry (e.g. secure.mainframe.mycompany.com) and start to ease people over to that. I'm biased, but it's even easier if you're steering people to the Web (e.g. Host On-Demand) for access, so it's a good time to rethink your whole deployment of clients -- like maybe to stop deploying client software completely. At that point you turn mainframe access into a simple Web address, with a link from your company's internal homepage presumably, e.g. http://w3.mycompany.com/mainframe. You would also start to insert a warning message on the unencrypted address/port which gets progressively more urgent. At first the warning message is an extra line or two on the first screen (GREAT NEWS! We are enhancing our company's security. You have the most important role in protecting our customers' private information. You may need to make small changes to meet this goal. Find out more today at http://w3.mycompany.com/mainframe/security;), then there might be an interstitial screen that everybody sees and must acknowledge (and which breaks those logon macros with hardcoded clear text user passwords -- a feature, not a bug :-)), then some particularly sensitive application functions removed (like displaying somebody's Social Security number over an unencrypted connection), and finally retiring the connection completely with only a single screen presented announcing the end of that access and how to reestablish access. That last screen might stay in place for a year or more, and you'd monitor it until you see that nobody hit it for a year or more. Always with very friendly and constructively helpful language, of course. But whatever path you choose, I want to reiterate that it's critical to work very closely with the users, understand their needs, and clearly articulate why this move is good for them. I find that we IT people too often forget to do that. - - - - - Timothy Sipples IBM Consulting Enterprise Software Architect Specializing in Software Architectures Related to System z Based in Tokyo, Serving IBM Japan and IBM Asia-Pacific E-Mail: [EMAIL PROTECTED] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Supported Documentation
I've observed that the new InfoCenter format seems to enjoy a higher velocity of updates, corrections, and amplifications. If you look at the WebSphere Application Server for z/OS InfoCenter, for example, there are date stamps on certain pages within the past month. The InfoCenter format has been spreading to many products. I see CICS, MQ, DB2, DB2 tools, AD/PD tools (like File Manager, Fault Analyzer, etc.) -- I think all the major products and a fair number of the less common products have InfoCenter coverage now. I see pages in the CICS Transaction Server V3.2 InfoCenter that were updated within the past month, to pick another example. You can place the InfoCenters on the mainframe and serve them right from there, so that's a nice plus, especially for your disaster recovery needs when you probably need documentation the most. I think there's a certain training company that can show you how if you haven't figured it out. :-) - - - - - Timothy Sipples IBM Consulting Enterprise Software Architect Specializing in Software Architectures Related to System z Based in Tokyo, Serving IBM Japan and IBM Asia-Pacific E-Mail: [EMAIL PROTECTED] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Slowly biting the dust.... IBM scalable... but only so far
John, You can contact me offline if you wish and I can look into why you're not getting an SAP on z proposal from IBM. That bothers me, absent more information at least. I am not aware of any particular size issues like you describe. In terms of company revenue, Baldor (SAP on z) is quite a bit smaller than you are, I would expect. I'm located where your corporate parent is if that's convenient. Sometimes the basis for comparison is skewed. If, for example, you (or your bosses, in particular) profess not to care about such mundane issues as disaster recovery, or at least forget about it when making a purchasing decision, then you can get some strange results. If you don't care about qualities of service even slightly then the mainframe might be at a disadvantage. A common pattern (unfortunately) is that businesses forget about QoS, implement SAP in one manner, then come back and say, I guess we do care and reimplement. (We have a number of cases like that.) That epiphany might come the first time there's a database version upgrade or patch when the factory runs 24 hours a day, to pick an example. I suppose that reimplementation is good business for somebody's services team, but I wouldn't recommend that pattern if you can avoid it. - - - - - Timothy Sipples IBM Consulting Enterprise Software Architect Specializing in Software Architectures Related to System z Based in Tokyo, Serving IBM Japan and IBM Asia-Pacific E-Mail: [EMAIL PROTECTED] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: When will ADRDSSU start to ENQUEUE on data sets?
I think there might be one issue you also need to deal with. This is old knowledge and I do not know if the limit still exists, but at one time DFDSS could only handle so many control cards at one time. The generic allowed you to handle 100's of files but specific data set backups had a limitation. I am thinking I remember that it could only handle 254 input files, but I could be wrong. Does anyone know if there is still a limitation on the number of input control cards for file names? For example, INC(DS(A.B, A.C, ... A.ZZZ.) Lizette -- Snip I must say, it's a great idea. We have lots of job runing hours to backup data sets both in production and test environment and they all use generic filter. The possible performance gain is well worth doing and I will work on it right now. The rexx requires some work cause I don't want to change the way other people use DSS. So my rexx must be able to process any data set list syntax DSS recognizes. -- UnSnip -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: When will ADRDSSU start to ENQUEUE on data sets?
Yes, it exists. We're using z/OS 1.7 and the limitation forced me to use FILTERDD. The limitation is only for the SYSIN. On Wed, Apr 30, 2008 at 6:18 PM, Lizette Koehler [EMAIL PROTECTED] wrote: I think there might be one issue you also need to deal with. This is old knowledge and I do not know if the limit still exists, but at one time DFDSS could only handle so many control cards at one time. The generic allowed you to handle 100's of files but specific data set backups had a limitation. I am thinking I remember that it could only handle 254 input files, but I could be wrong. Does anyone know if there is still a limitation on the number of input control cards for file names? For example, INC(DS(A.B, A.C, ... A.ZZZ.) Lizette -- Snip I must say, it's a great idea. We have lots of job runing hours to backup data sets both in production and test environment and they all use generic filter. The possible performance gain is well worth doing and I will work on it right now. The rexx requires some work cause I don't want to change the way other people use DSS. So my rexx must be able to process any data set list syntax DSS recognizes. -- UnSnip -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- Best Regards, Johnny Luo -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: When will ADRDSSU start to ENQUEUE on data sets?
Bruce, 'Search the archives for earlier posts on DF/DSS using the older SVC26 interface to retrieve CATALOG data' I have tried various keywords but sill can not find the thread. Can you give more hints? Thanks. On Wed, Apr 30, 2008 at 2:01 PM, Bruce Hewson [EMAIL PROTECTED] wrote: Hello Johnny, Does your backup job use generic dataset masks for the INCLUDE list? Search the archives for earlier posts on DF/DSS using the older SVC26 interface to retrieve CATALOG data. In one case here a job took 2 hours to build the dataset list before mounting the first output tape. Changing the job by adding build-include-list step, before calling ADRDSSU, which uses REXX to call the IGGCSI00 Catalog Search Interface and built an explicit filter list (FILTERDD), reduced that wait time to 2 minutes. If you need to ENQUEUE on the dataset, just add //DD001 DD DISP=SHR,DSN=dataset1 etc to your backup JCL. On Wed, 30 Apr 2008 11:08:56 +0800, Johnny Luo [EMAIL PROTECTED] wrote: Hi, We encountered a problem on our production system. A job was using DSS to backup a lot of data sets (logical dump) and we got ADR321E for one extended format PS data set: the data set was not on the supposed volume. This job will run more than 3 hours and we found out that another job will delete the data set and re-create it during that time (1.5 hours after the dump job starts). It might be the cause of ADR321E. snip Best Regards, Johnny Luo Regards Bruce Hewson //MYUSERBLD JOB (ACCT#),'BUILD FILTER LIST', // CLASS=I, // MSGCLASS=X, // NOTIFY=SYSUID //* //* //BGTSOEXEC PGM=IKJEFT01,DYNAMNBR=100 //* //MASKLIST DD * SA%%.CICS.%%.DFHCSD SE%%.CICS.%%.DFHCSD SC%%.CICS.%%.DFHCSD /* //SYSTSIN DD * %BILDFILT MASKLIST /* //* //FILTERDD DD DISP=(NEW,PASS), // SPACE=(TRK,(1,1)), // DSORG=PS,LRECL=80,RECFM=FB,BLKSIZE=0, // DSN=FILTERDD //* //* //SYSTSPRT DD SYSOUT=* //SYSPRINT DD SYSOUT=* //SYSPROC DD DISP=SHR,DSN=MYUSER.USER.CMDPROC //* //* //DUMPEXEC PGM=ADRDSSU,PARM='TYPRUN=NORUN' //FILTERDD DD DISP=(OLD,DELETE), // DSN=FILTERDD //SYSPRINT DD UNIT=SYSDA,DISP=(NEW,CATLG),SPACE=(CYL,(2,1),RLSE), // DSN=MYUSER.DFDSS.TESTRUN.SYSPRINT,DCB=DSCB, // RECFM=VFB,LRECL=137,DSORG=PS //BACKUPDD DSN=MYUSER.DFDSS.TESTRUN.BACKUP, // UNIT=3390,SPACE=(CYL,(100,20),RLSE), // DISP=(,CATLG,DELETE) //SYSINDD * DUMP DATASET( - FILTERDD(FILTERDD) - ) - OUTDDNAME(BACKUP) - TOLERATE(ENQFAILURE) - SPHERE- CONCURRENT- SHARE /* //* // -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- Best Regards, Johnny Luo -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Slowly biting the dust.... IBM scalable... but only so far
Timothy Sipples wrote: John, You can contact me offline if you wish and I can look into why you're not getting an SAP on z proposal from IBM. That bothers me, absent more information at least. I am not aware of any particular size issues like you describe. In terms of company revenue, Baldor (SAP on z) is quite a bit smaller than you are, I would expect. I'm located where your corporate parent is if that's convenient. My understanding of how the IBM world works today is that the largest 600 IBM customers are actually handled by IBM salespeople who are really IBM employess. Everyone else is served by VARs. Maybe the OP's VAR is doing cherry picking, only bothering to go after the clients with the most potential net revenue. It's not your father's IBM any more. Sometimes the basis for comparison is skewed. If, for example, you (or your bosses, in particular) profess not to care about such mundane issues as disaster recovery, or at least forget about it when making a purchasing decision, then you can get some strange results. If you don't care about qualities of service even slightly then the mainframe might be at a disadvantage. A common pattern (unfortunately) is that businesses forget about QoS, implement SAP in one manner, then come back and say, I guess we do care and reimplement. (We have a number of cases like that.) That epiphany might come the first time there's a database version upgrade or patch when the factory runs 24 hours a day, to pick an example. I suppose that reimplementation is good business for somebody's services team, but I wouldn't recommend that pattern if you can avoid it. - - - - - Timothy Sipples IBM Consulting Enterprise Software Architect Specializing in Software Architectures Related to System z Based in Tokyo, Serving IBM Japan and IBM Asia-Pacific E-Mail: [EMAIL PROTECTED] Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-393-8716 http://www.trainersfriend.com z/OS Application development made easier * Our classes include + How things work + Programming examples with realistic applications + Starter / skeleton code + Complete working programs + Useful utilities and subroutines + Tips and techniques == call or email to receive a free sample student handout == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ACS and External Drives
OK, it seems that the weirdness happens on one of the jobs when the stacked file count hits 25. At the 25th file a change was put in to have subsequent files go to another tape volulme. Strange in any case! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
SDSF REXX problem
Hi! I have a problem when running SDSF REXX commands. When looping the returned isfrows after ISFEXEC ST command, the second ISFACT returns INVALID COMMAND (and rc = 0). I can't see why. The REXX: /* REXX */ Trace R x = Isfcalls('ON') isfprefix = 'S000TBE5' isfcols = 'JNAME JOBID OWNERID JCLASS POS STATUS' , 'SYSNAME WORKLOAD CPU TRANACT SRVCLS SRVCLASS ACTSYS' , 'SYSAFF TOKEN PRTDEST' Address SDSF 'ISFEXEC ST (ALTERNATE)' isfcols2 = , 'DDNAME STEPN PROCS DSID OCLASS RECCNT BYTECNT DSNAME' Do i = 1 To isfrows Address SDSF ISFACT ST TOKEN('token.i') , 'PARM(NP ?)' Trace N Say rc Say isfmsg Do j = 1 To isfmsg2.0 Say isfmsg2.j End Do j = 1 To dsname.0 Say dsname.j End Trace R End x = Isfcalls('OFF') Exit 0 The output: 2 *-* x = Isfcalls('ON') 0 3 *-* isfprefix = 'S000TBE5' S000TBE5 4 *-* isfcols = 'JNAME JOBID OWNERID JCLASS POS STATUS' , 'SYSNAME WORKLOAD CPU TRANACT SRVC LS SRVCLASS ACTSYS' , 'SYSAFF TOKEN PRTDEST' JNAME JOBID OWNERID JCLASS POS STATUS SYSNAME WORKLOAD CPU TRANACT SRVCLS SRVCLASS ACTSYS SYSAFF TOKEN PRTDEST 7 *-* Address SDSF 'ISFEXEC ST (ALTERNATE)' ISFEXEC ST (ALTERNATE) 8 *-* isfcols2 = , 'DDNAME STEPN PROCS DSID OCLASS RE CCNT BYTECNT DSNAME' DDNAME STEPN PROCS DSID OCLASS RECCNT BYTECNT DSNAME 11 *-* Do i = 1 To isfrows 1 2 12 *-* Address SDSF ISFACT ST TOKEN('token.i') , 'PARM(NP ?)' ISFACT ST TOKEN('6jkSNicbJpKic/D1m8LEQNp38PrbwuNA6yKmVtAgRrDmEzI1o1LFTisSNjQ6IReE4 tDw6OPDUEDj+XPw4rJGQOP4fPDrExO CEgEGCBQ=') PARM(NP ?) 14 *-* Trace N 0 ISF754I Command 'PREFIX S000TBE5' generated from associated variable ISFPREFIX. S000TBE.S000TBE5.JOB01687.D002.JESMSGLG S000TBE.S000TBE5.JOB01687.D003.JESJCL S000TBE.S000TBE5.JOB01687.D004.JESYSMSG S000TBE.S000TBE5.JOB01687.D104.? S000TBE.S000TBE5.JOB01687.D108.? S000TBE.S000TBE5.JOB01687.D111.? 27 *-* End 11 *-* Do i = 1 To isfrows 12 *-* Address SDSF ISFACT ST TOKEN('token.i') , 'PARM(NP ?)' ISFACT ST TOKEN('6jkSNicbJpKic/D1esLEQNp38PrbwuNA67SCN30gRrDmEzI1o1LFTisSNjQ6IReE4 tDw6OPAUEDj+XPw4kpGQOP4c/DhUsT K4vH1c+PDVMPi8fh849MUliAAAQYbNapb/Q768OPGPQ==') PARM(NP ?) 14 *-* Trace N 0 INVALID COMMAND ISF754I Command 'PREFIX S000TBE5' generated from associated variable ISFPREFIX. S000TBE.S000TBE5.JOB01687.D002.JESMSGLG S000TBE.S000TBE5.JOB01687.D003.JESJCL S000TBE.S000TBE5.JOB01687.D004.JESYSMSG S000TBE.S000TBE5.JOB01687.D104.? S000TBE.S000TBE5.JOB01687.D108.? S000TBE.S000TBE5.JOB01687.D111.? 27 *-* End 11 *-* Do i = 1 To isfrows 29 *-* x = Isfcalls('OFF') 0 30 *-* Exit 0 0 *** TIA Thomas Berg __ Thomas Berg Specialist IT-U SWEDBANK -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DFSMSRMM Server/Client setup
Hugo, We have shared the RMM environment across muliple releases of the operating system. Our SYSPROG, Test, and Production Sysplexes share RMM. Toleration maintenance allows this to operate fine. Contact me off list if you would like more info. Jimmy -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: action in UK33496
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Shmuel Metz (Seymour J.) Sent: Tuesday, April 29, 2008 1:28 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: action in UK33496 snip However, I had a friend at another shop do this. He got a royal dressing down by the lead sysprog because he (the sysprog) had decided that the S0C3 abend was his alone and had placed a SLIP in COMMNDnn to take SVC dumps on every S0C3 to debug __his__ programs. And didn't document it because? He was a donkey's rear-end? -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Call XMIT from batch program
We actually build the Xmit jcl dynamically via Rexx and then submit the Process. Scott Ford Senior Host Developer | Forging Enterprise Identity | IdentityForge.com (Main) 678.266.3399 x304 | (Cell) 609.346.0399 | (Fax) 678.266.3399 [EMAIL PROTECTED] This message is for the designated recipient only and may contain priviledged, proprietary, or otherwise private information. If you have received it in error, please notify the sender immediately and then delete the original. Any other use of the email by you is prohibited. -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Martin Packer Sent: Wednesday, April 30, 2008 4:42 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Call XMIT from batch program I'd do it from a TSO step. At least that works for XMIT. Probably RECEIVE as well - though you'd have to know WHEN to RECEIVE. Martin Martin Packer Performance Consultant IBM United Kingdom Ltd +44-20-8832-5167 +44-7802-245-584 [EMAIL PROTECTED] Unless stated otherwise above: IBM United Kingdom Limited - Registered in England and Wales with number 741598. Registered office: PO Box 41, North Harbour, Portsmouth, Hampshire PO6 3AU -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Floating Point Definitions
Thanks, But can you give me an example of how one would code the instruction, showing a difference between GPR and the floating point register. If you could use an EQU it would clear up the confusion to anyone reading the program. Thanks. --- Binyamin Dissen [EMAIL PROTECTED] wrote: On Sun, 27 Apr 2008 11:28:00 -0700 Howard Rifkind [EMAIL PROTECTED] wrote: :I want to use some of the floating point registers for :general register purposes. I was told I could do this :but I don't understand how to define them in the :assembler language program. Only for some purposes. :For instance, I would define a general register with :an equate such as: :R10 EQ 2 Equate Register 2 to R10 :However I would I do this for Floating point register :3. :Hope my questions is clear. :And do I have to normalize the floating point register :to use it for normal addresses? You can't use them to address data. You can save a GPR in an FPR with the appropriate hardware, but it would lead to most confusing code (IMHO). You can use them for fixed point operations. -- Binyamin Dissen [EMAIL PROTECTED] http://www.dissensoftware.com Director, Dissen Software, Bar Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html Be a better friend, newshound, and know-it-all with Yahoo! Mobile. Try it now. http://mobile.yahoo.com/;_ylt=Ahu06i62sR8HDtDypao8Wcj9tAcJ -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Where to find classes for VTAM
John Hamman wrote: Yeah, but... Neither course is scheduled, and both have been priced out of range for our purposes. FWIW - Individual Onsite Training is the only option... I'm curious about that choice of words. It could mean: 1. One-on-one mentoring 2. Self-study (books, media, internet) But does Individual rule out classrooms with 8-16 students in them, on your site? Whose site? Does it mean only your location, or can you send students to other company locations' sites? Obviously not to IBM training sites, judging by the context. Finally, what kind of prices are in range for your purposes? Just kinda' curious, ya' know. John Hamman Senior Systems Programmer BlueCross BlueShield of Mississippi 601.664.4410 [EMAIL PROTECTED] Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-393-8716 http://www.trainersfriend.com z/OS Application development made easier * Our classes include + How things work + Programming examples with realistic applications + Starter / skeleton code + Complete working programs + Useful utilities and subroutines + Tips and techniques == call or email to receive a free sample student handout == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: DFSMSRMM Server/Client setup [EMAIL PROTECTED]
I don't see any conflict in those statements. As I understand it, client/server doesn't share the control dataset, only the server accesses the CDS - the client makes requests through the server. Crispin Hugo [EMAIL PROTECTED] 4/30/2008 4:38 AM Hi There, Anybody out there using DFSMSRMM server/Client on systems that are using different levels of z/OS? The DFSMSRMM Implementation and Customization Guide has confusing statement in it. Which of these two are true ? 'All client and server systems must be at least at this release level. You can share the control data set with other systems that run any supported level of DFSMSrmm with any supported level of DFSMSrmm that has appropriate toleration maintenance installed. Crispin Hugo Systems Programmer Macro 4 Direct Line: +44 (0)1293 872121, Switchboard: +44 (0)1293 872000, Fax: +44 (0)1293 872001 This email has been scanned for all known viruses by the MessageLabs Email Security Service and the Macro 4 plc internal virus protection system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html Note that my email domain has changed from jo-annstores.com to joann.com. Please update your address book and other records to reflect this change. CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains confidential and privileged information intended only for the addressee. If you are not the intended recipient, please be advised that you have received this material in error and that any forwarding, copying, printing, distribution, use or disclosure of the material is strictly prohibited. If you have received this material in error, please (i) do not read it, (ii) reply to the sender that you received the message in error, and (iii) erase or destroy the material. Emails are not secure and can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by email. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Call XMIT from batch program
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Martin Packer Sent: Wednesday, April 30, 2008 4:42 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Call XMIT from batch program I'd do it from a TSO step. At least that works for XMIT. Probably RECEIVE as well - though you'd have to know WHEN to RECEIVE. The TSO PDS command calls XMIT via the TSO/E Service Facility Routine, IKJEFTSR, which can be run in batch. xmit : node.userid outda(dsn) Regards, John K -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS PUZZLE
You need to continue this discussion in IBM-MAIN. Within a SELECT statement, only the first WHEN clause that evaluates TRUE will be executed. Your SELECT statement starts with test against POOL_GDAPP. Five WHENs later is the first test (against VALUNIT) that might result in assigning a non-SMS volume. However, you claim that that the allocation specified 3390 units so this test should fail. The next test checks the VOLSER. You didn't tell us what the allocation specified, if anything. If the allocation specified one of the volumes that matches VOL_NONSMS, then the dataset will not be SMS managed. The same point is true for the next test against VOL_BANQ. Ten tests later you test against DSN_MISNT. This test checks for a subset of datasets whose HLQ is TEST. If it is true, the dataset will not be SMS managed. Finally you test against GDVX_DSN. This test will catch any remaining datasets whose HLQ is TEST. If it is true, the dataset will be assigned to an SMS volume. You need to look at the allocation request (probably in the JCL) and determine which WHEN is the first to evaluate TRUE. That will tell you why the dataset is or is not SMS managed. It would also be worth checking if the ACS routine you posted is the one in actual use. If you still cannot resolve the problem, post the complete DD statement or other source of the allocation. From: willie bunter [mailto:snip] Sent: Tuesday, April 29, 2008 11:28 AM To: Schwarz, Barry A Subject: Re: SMS PUZZLE Barry, I didn't realise that the alloction for TEST.** is overriden with the TEST.MISNT. I noticed that several of the dsns which are being written out to non-SMS disks start with the HLQ TEST.CNSA, TEST.XD008A5 etc. Just for my understanding that even though TEST.MISNT is hard coded, anything following e.g. TEST.** will be allocated on a non-sms vol? Would this occur only if a volser is coded or not coded on the jcl? I noticed that when I executed my tests if I coded the volser of the dasd, the dataset was allocted on the given non-SMS pack. However, if I did not code the volser, the dsn TEST.TESTING for example was allocated on a SMS managed volume. Can you please help me understand this? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Floating Point Definitions
On Wed, 30 Apr 2008 17:48:05 +0300, Binyamin Dissen wrote: You can do FP2 EQU 2 R2EQU 2 and if you LRR3,FP2 GR2 will be copied, not FPR2. And with the current release of HLASM you can also do this: R2 EQU 2GR R3 EQU 3GR ... FP2 EQU 2FPR and HLASM will then flag the above LR statement with a warning: ** ASMA323W Symbol FP2 has incompatible type with general register field Regards, Roger Bowler -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Call XMIT from batch program
John P Kalinich wrote: -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Martin Packer Sent: Wednesday, April 30, 2008 4:42 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Call XMIT from batch program I'd do it from a TSO step. At least that works for XMIT. Probably RECEIVE as well - though you'd have to know WHEN to RECEIVE. The TSO PDS command calls XMIT via the TSO/E Service Facility Routine, IKJEFTSR, which can be run in batch. xmit : node.userid outda(dsn) Regards, John K ad And, we teach how to call IKJEFTSR from programs written in Assembler, COBOL, PL/I, and C in our two-day course Introuction to TSO and REXX APIs. Details at: http://www.trainersfriend.com/TSO_Clist_REXX_Dialog_Mgr/a780descrpt.htm /ad Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-393-8716 http://www.trainersfriend.com z/OS Application development made easier * Our classes include + How things work + Programming examples with realistic applications + Starter / skeleton code + Complete working programs + Useful utilities and subroutines + Tips and techniques == call or email to receive a free sample student handout == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Call XMIT from batch program
On Wed, 30 Apr 2008 09:26:51 -0400, Scott Ford wrote: We actually build the Xmit jcl dynamically via Rexx and then submit the Process. Are you running Rexx under TSO TMP? If so, why not just issue XMIT from Rexx? From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Martin Packer Sent: Wednesday, April 30, 2008 4:42 AM I'd do it from a TSO step. At least that works for XMIT. Probably RECEIVE as well - though you'd have to know WHEN to RECEIVE. If the RECEIVE is from INDD or INDSN, that's probably not a problem. Now, a harder question: Has anyone running a Rexx EXEC under Unix System Services succeeded in doing either address TSO TRANSMIT or address TSO RECEIVE (with or without INDD or INDSN)? In batch, I can do this by queuing the reply to the RECEIVE prompt. How can I get it to work under Unix Sustem Services. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS PUZZLE
Barry, To confirm, the ACS that I posted is the current version. I am still unable to figure out which WHEN condition is kicking in. When I coded the unit volser, the dsn was allocated on the non-SMS pack. When I coded the only unit=3390, SMS directed the dsn to a SMS managed dasd. Below is my jcl that I used to test the allocation : //STEP1EXEC PGM=IEBGENER //SYSPRINT DD SYSOUT=* //SYSINDD DUMMY //SYSUT1 DD DUMMY //SYSUT2 DD DSN=TEST.TESTING.UNI3390.VOLSER,UNIT=3390, //VOL=SER=SIPLAB, //DISP=(,CATLG,DELETE),SPACE=(TRK,(1,1)) //SYSPRINT DD SYSOUT=* //STEP1EXEC PGM=IEBGENER //SYSPRINT DD SYSOUT=* //SYSINDD DUMMY //SYSUT1 DD DUMMY //SYSUT2 DD DSN=TEST.TESTING.UNI3390,UNIT=3390, //DISP=(,CATLG,DELETE),SPACE=(TRK,(1,1)) //SYSPRINT DD SYSOUT=* //* If you can think of something that I should try, please let me know. Thanks again. Schwarz, Barry A [EMAIL PROTECTED] wrote: ...You need to look at the allocation request (probably in the JCL) and determine which WHEN is the first to evaluate TRUE. That will tell you why the dataset is or is not SMS managed. It would also be worth checking if the ACS routine you posted is the one in actual use. If you still cannot resolve the problem, post the complete DD statement or other source of the allocation. - Be a better friend, newshound, and know-it-all with Yahoo! Mobile. Try it now. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS PUZZLE
For your first IEBGENER: WHEN (ANYVOL = VOL_NONSMS OR HLQ = HLQ_NONSMS) SET STORCLAS = '' For your second IEBGENER: WHEN (HLQ = POOL_GDVX OR DSN = GDVX_DSN) SET STORCLAS = 'SCDEV' -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of willie bunter Sent: Wednesday, April 30, 2008 12:15 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: SMS PUZZLE Barry, To confirm, the ACS that I posted is the current version. I am still unable to figure out which WHEN condition is kicking in. When I coded the unit volser, the dsn was allocated on the non-SMS pack. When I coded the only unit=3390, SMS directed the dsn to a SMS managed dasd. Below is my jcl that I used to test the allocation : //STEP1EXEC PGM=IEBGENER //SYSPRINT DD SYSOUT=* //SYSINDD DUMMY //SYSUT1 DD DUMMY //SYSUT2 DD DSN=TEST.TESTING.UNI3390.VOLSER,UNIT=3390, //VOL=SER=SIPLAB, //DISP=(,CATLG,DELETE),SPACE=(TRK,(1,1)) //SYSPRINT DD SYSOUT=* //STEP1EXEC PGM=IEBGENER //SYSPRINT DD SYSOUT=* //SYSINDD DUMMY //SYSUT1 DD DUMMY //SYSUT2 DD DSN=TEST.TESTING.UNI3390,UNIT=3390, //DISP=(,CATLG,DELETE),SPACE=(TRK,(1,1)) //SYSPRINT DD SYSOUT=* //* If you can think of something that I should try, please let me know. Thanks again. Schwarz, Barry A [EMAIL PROTECTED] wrote: ...You need to look at the allocation request (probably in the JCL) and determine which WHEN is the first to evaluate TRUE. That will tell you why the dataset is or is not SMS managed. It would also be worth checking if the ACS routine you posted is the one in actual use. If you still cannot resolve the problem, post the complete DD statement or other source of the allocation. - Be a better friend, newshound, and know-it-all with Yahoo! Mobile. Try it now. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS PUZZLE
Bob, I really try to avoid the DO-SET-EXIT-END loops you speak of, I find them cumbersome and hard to read. I find that one large SELECT-WHEN-OTHERWISE-END provides a better structure for this, and since it avoids the numerous EXITs, it allow for such things as WRITE statements after the end of the SELECT group. I have seen many sites that use the style you refer to, and I have always wondered why people prefer that over the SELECT layout, I would be interested in hearing what issues you see in SELECT? Scott Richards, Robert B. [EMAIL PROTECTED] 4/30/2008 10:10 AM Willie, Sorry for the delay in responding. Had several doctor appointments yesterday. Scott and Tom identified your immediate problem, but your routine still could use some improvement. As was pointed out, be consistent and use DO-SET-EXIT-END loops for *ALL* storage class assignments. Document your logic choices and decisions with better comments. There is an ELSE statement that is hanging out there by itself before the SELECT statement should not be there and is poor coding. The only reason it works is because the ACSENVIR test satisfies the ELSE condition more often than the IF condition, enabling the SELECT logic below it to execute. Remove the ELSE statement. Hope this helps. Bob Note that my email domain has changed from jo-annstores.com to joann.com. Please update your address book and other records to reflect this change. CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains confidential and privileged information intended only for the addressee. If you are not the intended recipient, please be advised that you have received this material in error and that any forwarding, copying, printing, distribution, use or disclosure of the material is strictly prohibited. If you have received this material in error, please (i) do not read it, (ii) reply to the sender that you received the message in error, and (iii) erase or destroy the material. Emails are not secure and can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by email. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Simple newbie file tailoring question
Anyone, I'm working with a skeleton that generates an EXEC statement that looks like this: //STEP1 EXEC PGM=MYPROG,REGION=4M,PARM='ZUSER' I wish to pass the value in ZUSER to MYPROG, but I see that if the TSO userid is 8 characters long, the trailing blanks from the ZUSER variable are truncated, and are not being passed to my assembler application. I.e., if the userid is USER1, I get a 5-byte parm string instead of an 8-byte parm string padded with blanks (or nulls, or anything). Is there a way to prevent the truncation, so that my application always receives a full eight-byte value, preferably blank-padded? Thank you! David -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS PUZZLE
Scott, I do not find them cumbersome or hard to read. Quite the opposite. I also indent two spaces, line up Dos and ENDs (and they are on lines by themselves), and line up WHENs and OTHERWISEs. Almost 20 years ago, when I started writing ACS routines, I employed these stylistic tricks because they enabled *ME* to read and understand my coding better. Now, I do it out of habit, I'm sure. Still...I find the style very useful. See below (I hope it comes out readable): /**/ /* CHECK TO SEE WHETHER THE STORCLAS PASSED TO THE ROUTINE IS A */ /* RESTRICTED STORCLAS AND IF THE USER IS AUTHORIZED TO SET IT. IF*/ /* NOT, EXIT THE ROUTINE WITH A CONDITION CODE OF 8. */ /**/ /* LOGIC SEQUENCE - 2*/ /**/ WHEN (STORCLAS ¬='' STORCLAS = RESTRICT USER ¬= SPECUSR) DO WRITE 'THE STORAGE CLASS (' STORCLAS ') THAT YOU' WRITE 'SPECIFIED IS RESTRICTED' EXIT CODE(8) END I have absolutely no issues with SELECT WHEN logic and try and avoid IF THEN ELSE statements in favor of SELECT WHEN in most cases. Bob -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Scott Rowe Sent: Wednesday, April 30, 2008 12:33 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: SMS PUZZLE Bob, I really try to avoid the DO-SET-EXIT-END loops you speak of, I find them cumbersome and hard to read. I find that one large SELECT-WHEN-OTHERWISE-END provides a better structure for this, and since it avoids the numerous EXITs, it allow for such things as WRITE statements after the end of the SELECT group. I have seen many sites that use the style you refer to, and I have always wondered why people prefer that over the SELECT layout, I would be interested in hearing what issues you see in SELECT? Scott Richards, Robert B. [EMAIL PROTECTED] 4/30/2008 10:10 AM Willie, Sorry for the delay in responding. Had several doctor appointments yesterday. Scott and Tom identified your immediate problem, but your routine still could use some improvement. As was pointed out, be consistent and use DO-SET-EXIT-END loops for *ALL* storage class assignments. Document your logic choices and decisions with better comments. There is an ELSE statement that is hanging out there by itself before the SELECT statement should not be there and is poor coding. The only reason it works is because the ACSENVIR test satisfies the ELSE condition more often than the IF condition, enabling the SELECT logic below it to execute. Remove the ELSE statement. Hope this helps. Bob Note that my email domain has changed from jo-annstores.com to joann.com. Please update your address book and other records to reflect this change. CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains confidential and privileged information intended only for the addressee. If you are not the intended recipient, please be advised that you have received this material in error and that any forwarding, copying, printing, distribution, use or disclosure of the material is strictly prohibited. If you have received this material in error, please (i) do not read it, (ii) reply to the sender that you received the message in error, and (iii) erase or destroy the material. Emails are not secure and can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by email. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Simple newbie file tailoring question
David: When you pick up the length of the parm field, make sure it's not zero and if not, decrement it by one and execute the MVC to save it in your initialized area: LR1,0(,R1) LH R2, 0(,r1) LTRR2,R2 BZ NOPARM BCTR R2,R0 EX R2,SAVEPRM B ... SAVEPRM MVC MYPARM(0),2(r1) MPARM DCcl8' ' Initially 8 bytes of blanks Bill Date: Wed, 30 Apr 2008 11:54:37 -0500 From: [EMAIL PROTECTED] Subject: Simple newbie file tailoring question To: IBM-MAIN@BAMA.UA.EDU Anyone, I'm working with a skeleton that generates an EXEC statement that looks like this: //STEP1 EXEC PGM=MYPROG,REGION=4M,PARM='ZUSER' I wish to pass the value in ZUSER to MYPROG, but I see that if the TSO userid is 8 characters long, the trailing blanks from the ZUSER variable are truncated, and are not being passed to my assembler application. I.e., if the userid is USER1, I get a 5-byte parm string instead of an 8-byte parm string padded with blanks (or nulls, or anything). Is there a way to prevent the truncation, so that my application always receives a full eight-byte value, preferably blank-padded? Thank you! David -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Simple newbie file tailoring question
David Eisenberg wrote: Anyone, I'm working with a skeleton that generates an EXEC statement that looks like this: //STEP1 EXEC PGM=MYPROG,REGION=4M,PARM='ZUSER' I wish to pass the value in ZUSER to MYPROG, but I see that if the TSO userid is 8 characters long, the trailing blanks from the ZUSER variable are truncated, and are not being passed to my assembler application. I.e., if the userid is USER1, I get a 5-byte parm string instead of an 8-byte parm string padded with blanks (or nulls, or anything). Is there a way to prevent the truncation, so that my application always receives a full eight-byte value, preferably blank-padded? Thank you! David If you are z/OS 1.8 or later, you can use the extended built-in function LEFT, like: )SEL MYUSER=LEFT(ZUSER,8) then use MYUSER in your skeleton Might be simpler just to do the work in your Assembler program, though. ad We offer a robust, full, rich course in Dialog Manager: five fun-filled, thrill-packed days. Details here: http://www.trainersfriend.com/TSO_Clist_REXX_Dialog_Mgr/a810descrpt.htm /ad Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-393-8716 http://www.trainersfriend.com z/OS Application development made easier * Our classes include + How things work + Programming examples with realistic applications + Starter / skeleton code + Complete working programs + Useful utilities and subroutines + Tips and techniques == Check out the Trainer's Friend Store to purchase z/OS == == application developer toolkits. Sample code in four== == programming languages, JCL to Assemble or compile, == == bind and test. == == http://www.trainersfriend.com/TTFStore/index.html== -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Simple newbie file tailoring question
If you are z/OS 1.8 or later Naturally, we are at z/OS 1.7. This is the sort of thing I was looking for, however. For the time being, I'll just accept the truncated PARM= and deal with it in the application (as per Bill Wilkie's earlier post). Thanks, gentlemen. David -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS PUZZLE
I once worked in a shop where all the SMS routines were written with nested IF-THEN-ELSE Logic - the person who'd worked there before I came on board didn't believe in using SELECT-WHEN's. Talk about a nightmare to maintain! I finally re-wrote it all using SELECT-WHEN's which I personally find to be much more modular and much easier to maintain modify. I find carefully placed WRITE statements to be essential in eliminating the kind of confusion demonstrated in the problem which generated this thread. ddk Remember that NAVIQUEST is your friend. /// Scott, I do not find them cumbersome or hard to read. Quite the opposite. I also indent two spaces, line up Dos and ENDs (and they are on lines by themselves), and line up WHENs and OTHERWISEs. Almost 20 years ago, when I started writing ACS routines, I employed these stylistic tricks because they enabled *ME* to read and understand my coding better. Now, I do it out of habit, I'm sure. Still...I find the style very useful. See below (I hope it comes out readable): /**/ /* CHECK TO SEE WHETHER THE STORCLAS PASSED TO THE ROUTINE IS A */ /* RESTRICTED STORCLAS AND IF THE USER IS AUTHORIZED TO SET IT. IF*/ /* NOT, EXIT THE ROUTINE WITH A CONDITION CODE OF 8. */ /**/ /* LOGIC SEQUENCE - 2*/ /**/ WHEN (STORCLAS ¬='' STORCLAS = RESTRICT USER ¬= SPECUSR) DO WRITE 'THE STORAGE CLASS (' STORCLAS ') THAT YOU' WRITE 'SPECIFIED IS RESTRICTED' EXIT CODE(8) END I have absolutely no issues with SELECT WHEN logic and try and avoid IF THEN ELSE statements in favor of SELECT WHEN in most cases. Bob ** This e-mail message and all attachments transmitted with it may contain legally privileged and/or confidential information intended solely for the use of the addressee(s). If the reader of this message is not the intended recipient, you are hereby notified that any reading, dissemination, distribution, copying, forwarding or other use of this message or its attachments is strictly prohibited. If you have received this message in error, please notify the sender immediately and delete this message and all copies and backups thereof. Thank you. ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS PUZZLE
Ahh, OK, that is not what I was envisioning. I don't have much problem with that at all, though I would question why you would need to use EXIT in cases where the return code is 0 (unlike the example you posted, which is understandable). The nightmare I was thinking of goes more like this: IF ((DD = DFSORTDD) (DSTYPE = 'TEMP')) THEN DO SET STORCLAS = 'NONVIO' WRITE 'SC ('STORCLAS') ' EXIT CODE(0) END IF ((DD = DFSORTDD) (DSTYPE NE 'TEMP')) THEN DO SET STORCLAS = DEF_STORCLAS WRITE 'SC ('STORCLAS') ' EXIT CODE(0) END IF ((USER = 'MMCDONA') (DSTYPE = 'TEMP')) THEN DO SET STORCLAS = 'STD' WRITE 'SC ('STORCLAS') ' EXIT CODE(0) END IF ((DD NE DFSORTDD) (DSTYPE = 'TEMP')) THEN DO SET STORCLAS = 'SORT' WRITE 'SC ('STORCLAS') ' EXIT CODE(0) END Richards, Robert B. [EMAIL PROTECTED] 4/30/2008 12:59 PM Scott, I do not find them cumbersome or hard to read. Quite the opposite. I also indent two spaces, line up Dos and ENDs (and they are on lines by themselves), and line up WHENs and OTHERWISEs. Almost 20 years ago, when I started writing ACS routines, I employed these stylistic tricks because they enabled *ME* to read and understand my coding better. Now, I do it out of habit, I'm sure. Still...I find the style very useful. See below (I hope it comes out readable): /**/ /* CHECK TO SEE WHETHER THE STORCLAS PASSED TO THE ROUTINE IS A */ /* RESTRICTED STORCLAS AND IF THE USER IS AUTHORIZED TO SET IT. IF */ /* NOT, EXIT THE ROUTINE WITH A CONDITION CODE OF 8. */ /* */ /* LOGIC SEQUENCE - 2 */ /**/ WHEN (STORCLAS ¬='' STORCLAS = RESTRICT USER ¬= SPECUSR) DO WRITE 'THE STORAGE CLASS (' STORCLAS ') THAT YOU' WRITE 'SPECIFIED IS RESTRICTED' EXIT CODE(8) END I have absolutely no issues with SELECT WHEN logic and try and avoid IF THEN ELSE statements in favor of SELECT WHEN in most cases. Bob -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Scott Rowe Sent: Wednesday, April 30, 2008 12:33 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: SMS PUZZLE Bob, I really try to avoid the DO-SET-EXIT-END loops you speak of, I find them cumbersome and hard to read. I find that one large SELECT-WHEN-OTHERWISE-END provides a better structure for this, and since it avoids the numerous EXITs, it allow for such things as WRITE statements after the end of the SELECT group. I have seen many sites that use the style you refer to, and I have always wondered why people prefer that over the SELECT layout, I would be interested in hearing what issues you see in SELECT? Scott Richards, Robert B. [EMAIL PROTECTED] 4/30/2008 10:10 AM Willie, Sorry for the delay in responding. Had several doctor appointments yesterday. Scott and Tom identified your immediate problem, but your routine still could use some improvement. As was pointed out, be consistent and use DO-SET-EXIT-END loops for *ALL* storage class assignments. Document your logic choices and decisions with better comments. There is an ELSE statement that is hanging out there by itself before the SELECT statement should not be there and is poor coding. The only reason it works is because the ACSENVIR test satisfies the ELSE condition more often than the IF condition, enabling the SELECT logic below it to execute. Remove the ELSE statement. Hope this helps. Bob Note that my email domain has changed from jo-annstores.com to joann.com. Please update your address book and other records to reflect this change. CONFIDENTIALITY/EMAIL
Re: Simple newbie file tailoring question
-Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of David Eisenberg Sent: Wednesday, April 30, 2008 12:29 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Simple newbie file tailoring question If you are z/OS 1.8 or later Naturally, we are at z/OS 1.7. This is the sort of thing I was looking for, however. For the time being, I'll just accept the truncated PARM= and deal with it in the application (as per Bill Wilkie's earlier post). Thanks, gentlemen. David Why not just append blanks to the end of the PARM yourself? //STEP1 EXEC PGM=MYPROG,REGION=4M,PARM='ZUSER' You can then just ignore the extras. This only works if you are only interested in the ZUSER as your example showed. If you have other parms at fixed offsets, then this won't work. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Simple newbie file tailoring question
If you have other parms at fixed offsets, then this won't work. I don't have other parms right now, but I would like to reserve the right to do so going forward. That's why I was hoping to force the length of the PARM string to 8. David -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: PCOM and trailing blanks in copy paste
I don't know if this is simpler or not. I think that if you save this txt file as somename.HTA and open it using MS IE: http://members.tripod.com/billlalonde/misc/clip.txt then, the imbedded script removes trailing blanks from lines in the clipboard when you click the button. Bill On Fri, 25 Apr 2008 10:51:48 -0500, Mark Zelden [EMAIL PROTECTED] wrote: On Fri, 25 Apr 2008 08:45:55 -0500, Zaromil Tisler [EMAIL PROTECTED] wrote: Does any user of IBM PCOM know a way to change the cut and paste behaviour so that trailing blanks are (automatically) stripped off? I have found no parameter to do that. So, if I want to paste something from the screen into a mail, the easiest way I found is to copy the data into a variable dataset with preserve trailing blanks = no and the ftp the dataset to my pc. Anyone having a simpler solution (whatever simpler means)? I don't. But you can skip the copy into the VB data set with QUOTE SITE NOTRAIL or SITE NOTRAIL. One more question: is there a possibility to disable truncate the trailing blanks prompt every time I save a dataset that already has preserve trailing blanks = no in the profile? See the EDSET command. Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - ZFUS G-ITO mailto:[EMAIL PROTECTED] z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Simple newbie file tailoring question
you could possibly use alternate tabbing (note the exclamation point) in your skeleton: )TBA 49 //STEP1 EXEC PGM=MYPROG,REGION=4M,PARM='ZUSER!' Thanks, Frank Merlenbach [EMAIL PROTECTED] IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU wrote on 04/30/2008 11:54:37 AM: Anyone, I'm working with a skeleton that generates an EXEC statement that looks like this: //STEP1 EXEC PGM=MYPROG,REGION=4M,PARM='ZUSER' I wish to pass the value in ZUSER to MYPROG, but I see that if the TSO userid is 8 characters long, the trailing blanks from the ZUSER variable are truncated, and are not being passed to my assembler application. I.e., if the userid is USER1, I get a 5-byte parm string instead of an 8-byte parm string padded with blanks (or nulls, or anything). Is there a way to prevent the truncation, so that my application always receives a full eight-byte value, preferably blank-padded? Thank you! David -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS PUZZLE
This is your FILTLIST statement: FILTLIST VOL_NONSMS INCLUDE(%IPL*,%RES*,%PGE*,%PGL*,%CE*,%LI*, SPL*,GMAIL%,'REF=NS',%L1*,%L2*,%M1*,%M2*,GPROV%,VEB4*,VEB5*) Notice the first entry. Now look at the VOLSER you specified in the JCL. Does that VOLSER match? The % matches the S; the IPL matches the IPL; the * matches the AB. So the VOLSER does match the FILTLIST. Here is your WHEN clause: WHEN (ANYVOL = VOL_NONSMS OR HLQ = HLQ_NONSMS) SET STORCLAS = '' YOU TOLD THE SYSTEM TO MAKE THE DATASET NON-MANAGED. The system did exactly what you told it. What were you expecting? What part of evaluating this caused you confusion? -Original Message- From: willie bunter [mailto:snip] Sent: Wednesday, April 30, 2008 9:15 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: SMS PUZZLE Barry, To confirm, the ACS that I posted is the current version. I am still unable to figure out which WHEN condition is kicking in. When I coded the unit volser, the dsn was allocated on the non-SMS pack. When I coded the only unit=3390, SMS directed the dsn to a SMS managed dasd. Below is my jcl that I used to test the allocation : //STEP1EXEC PGM=IEBGENER //SYSPRINT DD SYSOUT=* //SYSINDD DUMMY //SYSUT1 DD DUMMY //SYSUT2 DD DSN=TEST.TESTING.UNI3390.VOLSER,UNIT=3390, //VOL=SER=SIPLAB, //DISP=(,CATLG,DELETE),SPACE=(TRK,(1,1)) //SYSPRINT DD SYSOUT=* //STEP1EXEC PGM=IEBGENER //SYSPRINT DD SYSOUT=* //SYSINDD DUMMY //SYSUT1 DD DUMMY //SYSUT2 DD DSN=TEST.TESTING.UNI3390,UNIT=3390, //DISP=(,CATLG,DELETE),SPACE=(TRK,(1,1)) //SYSPRINT DD SYSOUT=* //* If you can think of something that I should try, please let me know. Thanks again. Schwarz, Barry A ...You need to look at the allocation request (probably in the JCL) and determine which WHEN is the first to evaluate TRUE. That will tell you why the dataset is or is not SMS managed. It would also be worth checking if the ACS routine you posted is the one in actual use. If you still cannot resolve the problem, post the complete DD statement or other source of the allocation. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Secure TN3270
On Wed, 30 Apr 2008 17:49:57 +0900, Timothy Sipples [EMAIL PROTECTED] wrote: The following comments probably apply only to parnoid shops like mine, but I want to point out some possible stumbling blocks to implementing Timothy's suggestion. ... And the key -- no pun intended -- is to communicate well with users and explain the benefits to *them*. ... Except, of course, this may be being done because of a dictate (a very reasonable dictate, but a dictate nonetheless) of a corporate security department which doesn't give a rat's tush how this effects the end user (where end user in this case is internal, not an external customer). And those end users know it. Sympathy rather than a sales pitch may be more appropriate. ... I think end users find it easier to figure out how to switch IP addresses instead of ports ... Unless the end user's PC is a locked down configuration pushed down by a corporate software distribution system. IP addr or port - it's all the same. They click on the little icon and get connected (or not). You would also start to insert a warning message on the unencrypted address/port which gets progressively more urgent. ... message is an extra line or two on the first screen (GREAT NEWS! We are enhancing our company's security. ... ... and you are one of the initial victims. I guess this could be inmplemented using the Tn3270 server's MSG10, but, this would break company-approved screen-scraper applications like those using HATS. then there might be an interstitial screen that everybody sees and must acknowledge (and which breaks those logon macros with hardcoded clear text user passwords -- a feature, not a bug :-)), ... Just as fatal to screen-scrapers as the previous step, but much harder to implement. A default Tn3270 application that then has to simulate the Tn3270 server's USS processing. (No! Not Unix System Services!) That would be a seriously royal pain to implement cleanly. then some particularly sensitive application functions removed (like displaying somebody's Social Security number over an unencrypted connection), And now the USS simulator and possibly a session manager has to be sensitive to the port and/or IP address used to reach the Tn3270 server? Not bloody likely, I'm afraid. It can be done, of course, if the LU name used can be mapped to the port/addr. but this is starting to be a real kludge. and finally retiring the connection completely with only a single screen presented announcing the end of that access and how to reestablish access. ... That, at least, is fairly simple. ... But whatever path you choose, I want to reiterate that it's critical to work very closely with the users, understand their needs, and clearly articulate why this move is good for them. I find that we IT people too often forget to do that. ... In preparation for a very trivial change to our session manager configuration we thought it would be good warn our Tn3270 end users, but were concerned about the logistics of notifying somewhere between 40,000 and 50,000 (some of which are likely silicon-based, rather than carbon-based life forms). We discovered are not allowed to contact them. We get to notify our friends in our off-shore call-centers; they will helpfully explain everything to the end users that run into trouble. Sometimes reallity gets in the way of simple plans. Pat O'Keefe -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Supported Documentation
Walt Farrell said: A DOC APAR would help in the interim, imho, but the OP doesn't seem to agree. I absolutely disagree. There's no seem to it. How often do you research DOC APARS for your manuals? Here's an example: Suppose you can't remember which register holds the remainder on a divide instruction. You'd look it up, right? Would you also check for any applicable DOC APARS? Sounds ridiculous. You assume the documentation is probably correct. My latest example is this: You have a licensed product on only one system in a MAS. The product runs as a subsystem. JCL references the subsystem using the SUBSYS parameter. You want to know if this could be an issue at JCL conversion time if the JCL were converted on one of the systems without the licensed product. The documentation says the subsystem only has to be defined to pass conversion. You define it. You submit the JCL. It fails during conversion, saying the subsystem is not available. A SCHENV parameter would have forced the job to run on the right system had it been converted successfully. What's the problem? Affinity would circumvent the problem, but the documentation says it was not required. The Support Center says the doc is incorrect, and the code is working as designed. Should I have looked for a DOC APAR before this occurred? Why? Do I have to assume every document is probably incorrect and peruse all the DOC APARS before opening the document? Ok - Ranted enough. The publications folks at IBM want to have a conference call next week. Hopefully not just so they can explain how prohibitively expensive it would be to provide accurate documentation. After all, receiving a few extra customer calls for misleading documentation has to be cheaper, doesn't it? Sarcasm aside, I'd be interested is any other constructive input before I present my case. IMHO electronic revisions could be maintained on an IBM site, and downloaded by customers as often as the customer felt was useful. Or, just use the IBM copy and don't keep your own. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Supported Documentation
Or, just use the IBM copy and don't keep your own. There is an old joke regarding the circular arguments about documentation: Caller: The example on page 666 is incorrect. IBM: So what? It's only an example. Caller: How do I ... ? IBM: Use the example on page 666. Bad documentation hurts us all. And, IBM should be more pro-active and less defensive. - Too busy driving to stop for gas! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ACS and External Drives
Actually, that does make a little more sense. You say that at the 25th file, a change was put in to have subsequent files go to another tape volume. But how is that done? Do you then call for a specific volser (which is NOT inside the robot)? How do you force the 25th file to stop stacking and go to another volume. That is where the problem seems to be. Russell Witt CA 1 L2 Support Manager -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] Behalf Of Daniel McLaughlin Sent: Wednesday, April 30, 2008 7:28 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: ACS and External Drives OK, it seems that the weirdness happens on one of the jobs when the stacked file count hits 25. At the 25th file a change was put in to have subsequent files go to another tape volulme. Strange in any case! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
OS/390 V2R10 on z9/BC
Is anyone out there running OS/390 V2R10 native (without zVM) on a z9BC processor? With/without compatibility/exploitation ptf's? Robert Rankin MVS Systems Programmer [EMAIL PROTECTED] 503-823-6913 ; 503-984-1384(mobile) 1120 SW 5th Ave Room 450 Portland, Oregon 97204 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Procedure to verify OFFLOAD process
Hi everyone, The challenge is change spool dasd type with offload process. We have been draining volumes and replacing them as they draining, but this takes too much time and we want to speed up the process. Other condition is that I can't add new volumes to spool because there is no room to new volumes I reach the limit (255). Some details of the environment: - It is a z/OS 1.8 monoplex. I did the offload process and I have next questions: 1.- The process followed to release a dasd was: 1) Offload a specific dasd, 2) drain the volume. After that the volume was 1% of the spool and never release all the spool that it had. What do I have to do to release all the spool of a volume? 2.- Is there any command to display how many units (jobs, started tasks, sysouts, etc.) were offloaded and any command to display how many units (jobs, started tasks, sysouts, etc.) reloaded ? or any other command or procedure to compare before and after of the process in order to verify it. I did the offload-reload process but until now I don't know how can I confirm that all offloaded was reloaded. Other details of the process: - The offload dataset was defined on a dasd, but I'm planning try it over a tape. - Also I'm planning to try drainning the volume first then offload. Any help will very appreciated Thanks in advance -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
ftp - syslogd - rotate
HI , We have Z/OS 1.7 . If I want to break the output of syslogd can I use the parameter rotate in the syslogd.conf or other open source syslog-rotate programs Regards Franco Oberto -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html