Re: Maintaining two identical ICF Catalogs

2009-04-01 Thread Schwarz, Barry A
Dump/Restore using DFDSS

Copy to tape/Copy from tape using DFDSS

Export/Import/Import using IDCAMS

-Original Message-
From: Martin, Mike 
Sent: Wednesday, April 01, 2009 2:16 PM
To: IBM-MAIN@bama.ua.edu
Subject: Maintaining two identical ICF Catalogs

We have two systems that need to have identical ICF Catalogs (we are
implementing a tape grid and this catalog will contain tape entries).
These systems are in different SYSPLEXes and we can't share DASD between
them (partly because of GDPS) so a shared ICF Catalog isn't possible.

Is there a way to keep two ICF Catalogs on two different systems --
identical?  (a small delay for being out-of-sync is ok)  Of course,
integrity is critical.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 3270 Session to movie for presentation?

2009-04-01 Thread Kirk Wolf
This is exactly what we did (vnc2swf and x3270) for an old demo that is on
our website, if you want to see how one looks.

http://dovetail.com/demos/coz/demo1.html

(Look ma', no Windoze!)

Kirk Wolf


On Sat, Mar 28, 2009 at 3:37 PM, Philippe Seveur wrote:

> A free solution: vnc2swf tool allows you to record a x3270 session and
> transfer it to a Flash video into an online presentation.
>
> See 
> http://www.unixuser.org/~euske/vnc2swf/
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: secure file transfer FROM z/OS

2009-04-01 Thread Tony Harminc
2009/4/1 Timothy Sipples :

> As Kirk alluded to, there are also numerous private protocol file transfer
> products, and they do have advantages in many missions.

And it's important to choose a vendor who understands the subtleties
of mainframe datasets in a mostly non-mainframe world.

> By the way, "secure file transfer" is a misnomer when used as we're using
> it here. To be more accurate for the (business-oriented/risk-analyzing)
> boss I would call this "encrypted transfer of raw files without custodial
> controls." (That name is unwieldy, but it's much closer to the truth.
> Perhaps someone has a shorter name that still gets the point across.)

I'm not sure "secure file transfer" is so inaccurate. It covers only
security on the wire, and of course there is much more that's often
needed in the real world. I think "managed file transfer" is the
common industry term for solutions that include not just encryption,
but controls over who can send what and to whom and when,
logging/auditing, retry and failover, delivery guarantees, bandwidth
management, and so on and so on.

Tony H.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Maintaining two identical ICF Catalogs

2009-04-01 Thread Martin, Mike
 

 

All,

 

We have two systems that need to have identical ICF Catalogs (we are
implementing a tape grid and this catalog will contain tape entries).
These systems are in different SYSPLEXes and we can't share DASD between
them (partly because of GDPS) so a shared ICF Catalog isn't possible.

 

Is there a way to keep two ICF Catalogs on two different systems --
identical?  (a small delay for being out-of-sync is ok)  Of course,
integrity is critical.

 

Mike Martin

This email may contain confidential and privileged material for the sole 
use of the intended recipient. If you are not the intended recipient, please 
contact the sender and delete all copies. Any review or distribution by others 
is strictly prohibited. Personal emails are restricted by policy of the State 
Employees' Credit Union (SECU).  Therefore SECU specifically disclaims any 
responsibility or liability for any personal information or opinions of the 
author expressed in this email.



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ListServ Help

2009-04-01 Thread Roach, Dennis (N-GHG)
Once they delete your old email account at work, the emails will bounce
back to the list server. After a few days, it will remove you as a bad
email address.

Dennis Roach
GHG Corporation
Lockheed Martin Mission Services
Flight Design and Operations Contract
NASA/JSC
Address:
   2100 Space Park Drive 
   LM-15-4BH
   Houston, Texas 77058
Mail:
   P.O. Box 58487
   Mail Code H4C
   Houston, Texas 77258
Phone:
   Voice:  (281)336-5027
   Cell:   (713)591-1059
   Fax:(281)336-5410
E-Mail:  dennis.ro...@lmco.com

All opinions expressed by me are mine and may not agree with my employer
or any person, company, or thing, living or dead, on or near this or any
other planet, moon, asteroid, or other spatial object, natural or
manufactured, since the beginning of time.


> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Jousma, David
> Sent: Wednesday, April 01, 2009 2:32 PM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: ListServ Help
> 
> In reality, why do you care?  It is email going to prior employers
> email
> servers.  Just subscribe under the new email address.  I had this
> before, and the only way to fix was to have Darren fix it.  Not sure
he
> can anymore.
> 
> The only way that may work is to use the web interface and sign-on
with
> your old email address.
> 
> _
> Dave Jousma
> Assistant Vice President, Mainframe Services
> david.jou...@53.com
> 1830 East Paris, Grand Rapids, MI  49546 MD RSCB1G
> p 616.653.8429
> f 616.653.8497
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Eric Bielefeld
> Sent: Wednesday, April 01, 2009 3:25 PM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: ListServ Help
> 
> Using the very last line that is automatically appended to each post,
> you
> can unsubscribe from that web site.
> 
> Eric
> 
> Eric Bielefeld
> Sr. Systems Programmer
> Milwaukee, Wisconsin
> 414-475-7434
> 
> 
> - Original Message -
> From: "Scott T. Harder" 
> Newsgroups: bit.listserv.ibm-main
> To: 
> Sent: Wednesday, April 01, 2009 1:59 PM
> Subject: ListServ Help
> 
> 
> > Hi List,
> >
> > After 10 years with ASPG, Inc., I must report that I am no longer
> > affiliated
> > with that company.  I have now subscribed to this list using my
> personal
> > email address (below) and will do so for the other lists I belong to
> > (RACF-L, ISPF-L, DB2-L, etc.).  I have a question, however, about my
> > subscriptions that are under my "old" work email address.
> Specifically,
> > what is the easiest way for me to unsubscribe my ASPG work email
> > subscriptions?  I have referenced the ListServ RefCard and I don't
> even
> > see
> > "unsubscribe" anymore (at least in the copy of the RefCard that I
> have).
> > I
> > see SIGNOFF (syntax below), but have never used that before.  If
> someone
> > could, perhaps, throw me a bone on this subject, I sure would
> appreciate
> > it.
> > I need to unsubscribe from all off the ListServ lists I belong to as
> my
> > old
> > work email address and then I'll subscribe using my personal email
> address
> > to all those same lists.
> >
> > And. that is the good news for me.  I will be able to take an ACTIVE
> role
> > in
> > this and other lists - usually having to hit the manuals to look
> things up
> > and I'll usually be behind a response of 10 or more people who knew
> the
> > answer off the top of their heads - but I will be able to give the
> lists
> > my
> > undivided attention and they will certainly help keep me sharp until
> I
> get
> > back in the game in terms of a real job.  ;-)
> >
> > That's the plan, anyway.  Thanks, folks!
> >
> > Scott T. Harder
> >
> >
> >
> >
> > SIGNOFFRemove yourself:
> > listname  - From the specified
> list
> > * - From all lists on
> that
> > server
> > * (NETWIDE- From all lists in
the
> > network
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
> 
> This e-mail transmission contains information that is confidential and
> may be privileged.   It is intended only for the addressee(s) named
> above. If you receive this e-mail in error, please do not read, copy
or
> disseminate it in any manner. If you are not the intended recipient,
> any disclosure, copying, distribution or use of the contents of this
> information is prohibited. Please reply to the message immediately by
> informing the sender that the message was misdirected. After replying,
> please erase it from your computer system. Your assistance in
> correcting this error is appreciated.
> 
> 

Re: "A foolish consistancy" or "3390 cyl/track architecture"

2009-04-01 Thread John Ticic
Eric,

the SUN/STK Virtual Tape system (VSM) uses this kind of DASD as their 
internal buffer (SVA).

John

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: StandAlone DSS restore, is FILE(xxx) tape mark ?

2009-04-01 Thread Roach, Dennis (N-GHG)
The first physical file on a standard labeled tape is the label. It is
lrecl=blksize=80. The first record is the VOL1 header. The second record
is the HDR1, which describes file 2 on the tape. 
The second physical file on the tape is the first user file.

Dennis Roach
GHG Corporation
Lockheed Martin Mission Services
Flight Design and Operations Contract
NASA/JSC
Address:
   2100 Space Park Drive 
   LM-15-4BH
   Houston, Texas 77058
Mail:
   P.O. Box 58487
   Mail Code H4C
   Houston, Texas 77258
Phone:
   Voice:  (281)336-5027
   Cell:   (713)591-1059
   Fax:(281)336-5410
E-Mail:  dennis.ro...@lmco.com

All opinions expressed by me are mine and may not agree with my employer
or any person, company, or thing, living or dead, on or near this or any
other planet, moon, asteroid, or other spatial object, natural or
manufactured, since the beginning of time.


> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Rafa Pereira
> Sent: Wednesday, April 01, 2009 12:20 PM
> 
> John Kelly  wrote:
> 
> >Been a while since I did stand alone DSS restores. I see that DSS now
has
> >a FILE parameter which can specify the file number from the beginning
of
> >the tape. I would assume the number is tape marks, ie with standard
label
> >tape file 1 would be FILE(2). Does anyone know, rather than guess
like I
> >did?
> 
> IIRC, with standard label tapes, the value in the FILE parameter
corresponds
> to the file sequence number of the dataset within the tape. So, the
first
> dataset in the tape would be FILE(1), which is the default.
> 
> Regards.
> 
> Rafa.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ListServ Help

2009-04-01 Thread Jousma, David
In reality, why do you care?  It is email going to prior employers email
servers.  Just subscribe under the new email address.  I had this
before, and the only way to fix was to have Darren fix it.  Not sure he
can anymore.  

The only way that may work is to use the web interface and sign-on with
your old email address.

_
Dave Jousma
Assistant Vice President, Mainframe Services
david.jou...@53.com
1830 East Paris, Grand Rapids, MI  49546 MD RSCB1G
p 616.653.8429
f 616.653.8497


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Eric Bielefeld
Sent: Wednesday, April 01, 2009 3:25 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: ListServ Help

Using the very last line that is automatically appended to each post,
you 
can unsubscribe from that web site.

Eric

Eric Bielefeld
Sr. Systems Programmer
Milwaukee, Wisconsin
414-475-7434


- Original Message - 
From: "Scott T. Harder" 
Newsgroups: bit.listserv.ibm-main
To: 
Sent: Wednesday, April 01, 2009 1:59 PM
Subject: ListServ Help


> Hi List,
>
> After 10 years with ASPG, Inc., I must report that I am no longer 
> affiliated
> with that company.  I have now subscribed to this list using my
personal
> email address (below) and will do so for the other lists I belong to
> (RACF-L, ISPF-L, DB2-L, etc.).  I have a question, however, about my
> subscriptions that are under my "old" work email address.
Specifically,
> what is the easiest way for me to unsubscribe my ASPG work email
> subscriptions?  I have referenced the ListServ RefCard and I don't
even 
> see
> "unsubscribe" anymore (at least in the copy of the RefCard that I
have). 
> I
> see SIGNOFF (syntax below), but have never used that before.  If
someone
> could, perhaps, throw me a bone on this subject, I sure would
appreciate 
> it.
> I need to unsubscribe from all off the ListServ lists I belong to as
my 
> old
> work email address and then I'll subscribe using my personal email
address
> to all those same lists.
>
> And. that is the good news for me.  I will be able to take an ACTIVE
role 
> in
> this and other lists - usually having to hit the manuals to look
things up
> and I'll usually be behind a response of 10 or more people who knew
the
> answer off the top of their heads - but I will be able to give the
lists 
> my
> undivided attention and they will certainly help keep me sharp until I
get
> back in the game in terms of a real job.  ;-)
>
> That's the plan, anyway.  Thanks, folks!
>
> Scott T. Harder
>
>
>
>
> SIGNOFFRemove yourself:
> listname  - From the specified
list
> * - From all lists on that
> server
> * (NETWIDE- From all lists in the
> network 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

This e-mail transmission contains information that is confidential and may be 
privileged.   It is intended only for the addressee(s) named above. If you 
receive this e-mail in error, please do not read, copy or disseminate it in any 
manner. If you are not the intended recipient, any disclosure, copying, 
distribution or use of the contents of this information is prohibited. Please 
reply to the message immediately by informing the sender that the message was 
misdirected. After replying, please erase it from your computer system. Your 
assistance in correcting this error is appreciated.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: "A foolish consistancy" or "3390 cyl/track architecture"

2009-04-01 Thread Farley, Peter x23353
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Gibney, Dave
> Sent: Wednesday, April 01, 2009 2:40 PM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: "A foolish consistancy" or "3390 cyl/track architecture"
 
> I don't see the problem with coding over generous space estimates. For
> most of allocations I don't require a space parameter at all. The
> default DATACLAS allows a big extended striped dataset. And with SMS
> compression.  We only see x37 abends when the JCL explicitly calls for
> too small an allocation, and extended/striping/compression isn't
> selected by DFSMSdfp. Usually due to fragmentation.
> 
> Yes, I have  sizable pools with and generous free space threshold, but
> DASD is cheap. I've probably spent more writing this note than being
> stingy on disk space would buy me.
> 
> From a user prospective, and even from a z/OS Sysprog perspective, I
> don't care about the underlying FBA or CKD or QED of the architecture.
> 
> We still have many outdated parsimonious attitudes from the days when
> bytes were expensive. DASD is cheap, so is memory. z/OS CPU is also
> cheap, too bad the software (mostly ISV) is still priced by old time
> thinking.

Indeed, many storage administrators still hold such parsimonious
attitudes, because disk isn't "cheap" in the multi-terabyte quantities
that large companies have to buy it.  Six figures per "box" acquisition
is not unusual for a large organization.  Those kinds of numbers get the
attention of bean counters, who tell the executive suite, who tell the
CIO to tell the storage administrators to figure out a way make do with
what they've already got.  Most programmers (of any kind) have no say in
the matter.

Yes, disk is *relatively* cheap for what you get, and getting more so
every day.  That doesn't make any particular acquisition "cheap" by
financial measurements.

You are very lucky to be where you are, and to have the management
blessing to do as you have described.

Peter
This message and any attachments are intended only for the use of the addressee 
and
may contain information that is privileged and confidential. If the reader of 
the 
message is not the intended recipient or an authorized representative of the
intended recipient, you are hereby notified that any dissemination of this
communication is strictly prohibited. If you have received this communication in
error, please notify us immediately by e-mail and delete the message and any
attachments from your system.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: secure file transfer FROM z/OS

2009-04-01 Thread Kirk Wolf
Walt,

On Wed, Apr 1, 2009 at 11:54 AM, Walt Farrell  wrote:

>
> SSH private/public keys do not have appropriate management controls,
> however.  The Security Administrator can not expire them, nor control their
> strength, for example.
>
> I take your point, but I don't completely agree -

- With ACLs you can prohibit all but the Security Administrator the right to
add and remove keys from the ~.ssh/authorized_keys file.   This is the
approach that most *nix security audits recommend (not the abolishment of
public-private keys).

- The SSH public key *protocol* should not be confused with the Ported Tools
*implementation*.   Many *nix SSH users have pam modules, and/or have
implemented patches to the OpenSSH code that implement alternative keystores
such as hw and LDAP, smartcards, etc.   There's even a patch to OpenSSH (the
Roman Petrov patch) that adds X.509 support via OpenSSL, although it doesn't
comply over the wire with the RFC.

Kirk Wolf
Dovetailed Technologies
http://dovetail.com

PS> A user can't patch the Ported Tools port of OpenSSH since source is not
available.   We have a restaurant in the Midwest where the chefs work behind
the counter, and their slogan is "In sight it must be right".
Closed-source security software should be considered an oxymoron, but this
is the wrong forum for that view :-)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: ListServ Help

2009-04-01 Thread Eric Bielefeld
Using the very last line that is automatically appended to each post, you 
can unsubscribe from that web site.


Eric

Eric Bielefeld
Sr. Systems Programmer
Milwaukee, Wisconsin
414-475-7434


- Original Message - 
From: "Scott T. Harder" 

Newsgroups: bit.listserv.ibm-main
To: 
Sent: Wednesday, April 01, 2009 1:59 PM
Subject: ListServ Help



Hi List,

After 10 years with ASPG, Inc., I must report that I am no longer 
affiliated

with that company.  I have now subscribed to this list using my personal
email address (below) and will do so for the other lists I belong to
(RACF-L, ISPF-L, DB2-L, etc.).  I have a question, however, about my
subscriptions that are under my "old" work email address.  Specifically,
what is the easiest way for me to unsubscribe my ASPG work email
subscriptions?  I have referenced the ListServ RefCard and I don't even 
see
"unsubscribe" anymore (at least in the copy of the RefCard that I have). 
I

see SIGNOFF (syntax below), but have never used that before.  If someone
could, perhaps, throw me a bone on this subject, I sure would appreciate 
it.
I need to unsubscribe from all off the ListServ lists I belong to as my 
old

work email address and then I'll subscribe using my personal email address
to all those same lists.

And. that is the good news for me.  I will be able to take an ACTIVE role 
in

this and other lists - usually having to hit the manuals to look things up
and I'll usually be behind a response of 10 or more people who knew the
answer off the top of their heads - but I will be able to give the lists 
my

undivided attention and they will certainly help keep me sharp until I get
back in the game in terms of a real job.  ;-)

That's the plan, anyway.  Thanks, folks!

Scott T. Harder




SIGNOFFRemove yourself:
listname  - From the specified list
* - From all lists on that
server
* (NETWIDE- From all lists in the
network 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


ListServ Help

2009-04-01 Thread Scott T. Harder
Hi List,

After 10 years with ASPG, Inc., I must report that I am no longer affiliated
with that company.  I have now subscribed to this list using my personal
email address (below) and will do so for the other lists I belong to
(RACF-L, ISPF-L, DB2-L, etc.).  I have a question, however, about my
subscriptions that are under my “old” work email address.  Specifically,
what is the easiest way for me to unsubscribe my ASPG work email
subscriptions?  I have referenced the ListServ RefCard and I don’t even see
“unsubscribe” anymore (at least in the copy of the RefCard that I have).  I
see SIGNOFF (syntax below), but have never used that before.  If someone
could, perhaps, throw me a bone on this subject, I sure would appreciate it.
I need to unsubscribe from all off the ListServ lists I belong to as my old
work email address and then I’ll subscribe using my personal email address
to all those same lists.

And… that is the good news for me.  I will be able to take an ACTIVE role in
this and other lists – usually having to hit the manuals to look things up
and I’ll usually be behind a response of 10 or more people who knew the
answer off the top of their heads – but I will be able to give the lists my
undivided attention and they will certainly help keep me sharp until I get
back in the game in terms of a real job.  ;-)

That’s the plan, anyway.  Thanks, folks!

Scott T. Harder




SIGNOFFRemove yourself:
 listname  - From the specified list
 * - From all lists on that
server
 * (NETWIDE- From all lists in the
network


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SAP, mainframes, and multinationals

2009-04-01 Thread Tony Harminc
2009/4/1 john gilmore :
> For those of you who read German readily, there is a new book:

> Siegele, Ludwig, & Joseph Zepelin.  Matrix der Welt.  SAP und der neue 
> globale Kapitalizmus.  Frankfurt und New York: Campus-Verlag, 2009.
>
> available that describes---publicly and in very much greater detail than I 
> have seen anywhere else---the uses that some multinationals are making of 
> SAP, chiefly and crucially on mainframes, to integrate and "optimize" their 
> operations across national boundaries.
>
> Some of these new uses are, I think, problematic.  Tax avoidance and 
> displacement are not of course new or even unethical; but their optimization 
> means that some multinationals are or will shortly be in a position to decide 
> where to pay taxes.
>
> The book is not, however, chiefly a muckraking one.  The information it 
> provides about these new uses of SAP and how they are being implemented is of 
> great technical interest.

There was book "And Tomorrow the World" published around 1980,
purporting to tell the story of IBM up to that point. Its British
author claimed that IBM was even then a past master at this sort of
thing, with computer-optimized payment of taxes, allocation of income
and expenses to countries to (quite legally) avoid the then-common
exchange controls, and even a system to issue payments that ensured
the longest possible clearing time within the US banking system.

Tony H.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: "A foolish consistancy" or "3390 cyl/track architecture"

2009-04-01 Thread Gibney, Dave
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Farley, Peter x23353
> Sent: Wednesday, April 01, 2009 7:49 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: "A foolish consistancy" or "3390 cyl/track architecture"
> 
> 
> The biggest problem is that estimating file size for many production
> batch applications is mostly or totally dependent on input (perhaps
> client-supplied) file sizes.  And there is no way in JCL to say "this
> new output file will be about x(percent) or x(times) the size of the
> input file(s) named A (B, C, ...).  Today I may have 1M records and
> tomorrow I may have 10M records, depending on how active the day's
> business has been.  The only alternative we have today is to allocate
> for the maximum possible size, which is often a very poor estimate of
> the actual size.  It doesn't really matter that much if one uses
> records
> or megabytes or cylinders (though I agree that records/megabytes are
> probably more application-friendly methods).  When the business grows,
> the original estimates hard-coded into the JCL become too small.

I don't see the problem with coding over generous space estimates. For
most of allocations I don't require a space parameter at all. The
default DATACLAS allows a big extended striped dataset. And with SMS
compression.
We only see x37 abends when the JCL explicitly calls for too small an
allocation, and extended/striping/compression isn't selected by
DFSMSdfp. Usually due to fragmentation.

Yes, I have  sizable pools with and generous free space threshold, but
DASD is cheap. I've probably spent more writing this note than being
stingy on disk space would buy me. 

>From a user prospective, and even from a z/OS Sysprog perspective, I
don't care about the underlying FBA or CKD or QED of the architecture.

We still have many outdated parsimonious attitudes from the days when
bytes were expensive. DASD is cheap, so is memory. z/OS CPU is also
cheap, too bad the software (mostly ISV) is still priced by old time
thinking.



Dave Gibney
Information Technology Services
Washington State University

> 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: VTAM - Network Node to Border Node

2009-04-01 Thread Rabbe, Luke
Thank you, Chris.
Luke

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Chris Mason
Sent: Wednesday, April 01, 2009 12:58 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: VTAM - Network Node to Border Node

Luke

You must already have "APPN functionality" since you have a Network Node

and 7 End Nodes.

In addition, you are already participating in border node behaviour. The

adjacent topology subnetworks to which you are connected must already be

performing border node functions. You participle in that, when you
initiate a 
session with an LU in one of the adjacent topology subnetworks, you
search 
each of the adjacent Network Nodes which appear as End Nodes - which
have 
allowed themselves to be searched - to your Network Node. Also, when an
LU 
in one of the adjacent topology subnetworks initiates a session with an
LU in 
your topology subnetwork, the search emerges from one of the Network
Nodes 
adjacent to your Network Node although the search appears to be coming 
from an End Node.

When you change your Network Node also to appear to be a border node,
and 
with BNDYN=FULL, processing in your network won't change at all. The
main 
reason is that your have only one Network Node and so the logic
affecting 
searches hasn't any chance to be any different.

There may be some effects in the adjacent topology subnetworks so you 
should inform all your partners that you are making the change so they
can 
look out for changes - although there shouldn't be any problems.

The more you add Network Nodes to your topology subnetwork and the more 
these Network Nodes also become border nodes, the more you will need to
get 
to grips with the implementation of border node architecture in VTAM.

If you'd like to have some reading to give you greater confidence in
what you 
are already doing and how this is changed when you "come clean" and
admit 
your Network Node really is a border node, you can check out Chapter 6. 
Border Node Support in Subarea to APPN Migration: VTAM and APPN 
Implementation, SG24-4656-01:

http://www.redbooks.ibm.com/abstracts/sg244656.html

Chris Mason

On Wed, 1 Apr 2009 11:47:28 -0500, Rabbe, Luke 
 wrote:

>We currently have a VTAM network that includes 1 network node and 7 end
>nodes that use the same NETID.  We also have a few connections between
>the network node and outside networks (different NETIDs). 
>
> 
>
>The network node is not currently a border node.  I want to make the
>network node a border node.  
>
> 
>
>If I code the following, will the network node continue to function the
>same?
>
> 
>
>BN=YES
>
>BNDYN=FULL
>
> 
>
>I want to add the APPN functionality but not mess with the way the
>current configuration works.
>
> 
>
>Are there any other things I should be on the lookout for when changing
>to a border node?
>
> 
>
>Thank you,
>
>Luke Rabbe

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: JES2 exit?

2009-04-01 Thread Staller, Allan

I don't like doing the above, but management basically wants a rule of
"any
job which will execute more than ... minutes must be scheduled by
Production
Control via CA-7." Of course, a rule without enforcement is not a rule.
It is a request.


This can certainly be coded up. However, wall clock time can vary based
on many factors.
1) Human response to a mount request.
2) Virtual tape and/or HSM recalls
3) comparative load on the machine
4) allocation recovery loops if mountable devices get over committed.
.
.
.

IMO, a lousy way to run a railroad, but it's their railroad.

My suggestion would be to "Force' $ESTIME to the value desired, and
terminate after a fudge factor
e.g. $HASP308 pops up after 1 hr. check to see if 1hr, 15 minutes have
elapsed and then cancel.
If < 1 hr, 15 min go back to sleep until the next time.
When the fudge factor is finally exceeded, boom!

I predict this will last until the 1st user gets burned and cry's to
their management. A fitting topic for April 1st.



-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Thompson, Steve
Sent: Wednesday, April 01, 2009 1:01 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: JES2 exit?

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of John McKown
Sent: Wednesday, April 01, 2009 12:35 PM
To: IBM-MAIN@bama.ua.edu
Subject: JES2 exit?


I don't like doing the above, but management basically wants a rule of
"any
job which will execute more than ... minutes must be scheduled by
Production
Control via CA-7." Of course, a rule without enforcement is not a rule.
It
is a request.


So any and all jobs that execute 1 second beyond get cancelled, right? I
can think of two system issues that can cause heartburn. Should the
system have an enque hang, or allocation (as in it being single threaded
for ALL address spaces) get stuck for some reason, all batch jobs
subject to this rule could get "executed."

Now for the busy situation that causes this problem: What happens when
the tape system you have has all its tape heads tied up when a large
data set is needed has been migrated off to tape? Do all the jobs that
are waiting for restores get charged with the wall time it takes to get
their files restored?

Just a few items that management, who may know nothing about how real
processing takes place, may need a small bit of education about.

Regards,
Steve Thompson

-- Opinions expressed by this poster may not be those of poster's
employer. --

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


NFS--z/OS--VM/Linux

2009-04-01 Thread Ron Wells
Anyone having problems with VM/Linus using NFS to z/OS 1.9...
Only seems to work if I turn security off on z/OS... the Linux mvslogin 
hangs

--
Email Disclaimer
This  E-mail  contains  confidential  information  belonging to the sender, 
which  may be legally privileged information.  This information is intended 
only  for  the use of the individual or entity addressed above.  If you are not 
 the  intended  recipient, or  an  employee  or  agent responsible for 
delivering it to the intended recipient, you are hereby notified that any 
disclosure,  copying, distribution, or the taking of any action in reliance on 
the contents of the E-mail or attached files is strictly prohibited.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: "A foolish consistancy" or "3390 cyl/track architecture"

2009-04-01 Thread Schwarz, Barry A
I'm using an STK (now Sun, soon to be IBM?)SVA 9500 attached to a z9.

-Original Message-
From: Eric Bielefeld 
Sent: Wednesday, April 01, 2009 10:42 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: "A foolish consistancy" or "3390 cyl/track architecture"

snip

I have a couple of questions.  Does anyone have an RVA still?  Is there
any 
current DASD that still works this way?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: JES2 exit?

2009-04-01 Thread Ted MacNEIL
>is there any way, using normal JES2 facilities, which could include an EXIT in 
>JES2 to limit the wall-clock time that a job is permitted?

IIRC, /*JOBPARM T=nn does that/did that, unless it's exit/parm enforced.
The first shop I worked at (1981) had that in place.

BTW, where is the productivity in that.
If I have to compile/test and processor usage causes a test job to slow down, 
the resources consumed are wasted, if I have to re-submit!

-
Too busy driving to stop for gas!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Documentation Delivered as ISO files

2009-04-01 Thread Natarajan Mohan
For windows boxes you can use a software called "virtual clone drive". With 
this software you do not have to burn the ISO in to DVD or CD. You just mount 
them and use. Do a search using google or yahoo to find the same.

Micorsoft also has a tool called "virtualcd control panel" which you can use to 
mount cd's.

http://download.microsoft.com/download/7/b/6/7b6abd84-7841-4978-96f5-bd58df02efa2/winxpvirtualcdcontrolpanel_21.exe

HTH,
Natarajan

>>> John McKown  4/1/2009 9:47 AM >>>
On Wed, 1 Apr 2009 09:32:13 -0700, Craig Bakken  wrote:

>Now that we are using electronic delivery for all of our maintenance a lot of 
>documentation is coming on files with a ISO file extension.  I am wondering
how 
>other sites are handling these files?

Personally, since I use Linux, I simply do a "loop" mount of the ISO file.
Something like:

sudo mount file.with.doc.iso /mnt -oro,loop

I can then look in the /mnt subdirectory for the documentation. If I need to
get this on a Windows platform, then I use "zip" to zip the /mnt
subdirectory to a file and ftp it to my mainframe, then back down to the
Windows server (my Linux box is not use any Windows shares to do a direct
transfer).

Otherwise, get a DVD burner and software, and burn the ISO to a physical CD
or DVD and use that on your Windows machine. I don't know of any way to
mount an ISO file as a subdirectory in Windows.

-- 
John

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

NOTICE OF CONFIDENTIALITY 

The information contained in this communication, including but not limited to 
any accompanying document(s) and/or attachment(s), is privileged and 
confidential and is intended solely for the above-named individual(s). If you 
are not the intended recipient, please be advised that any distribution, 
copying, disclosure, and/or use of the information contained herein is strictly 
prohibited. If you received this communication in error, please destroy all 
copies of the communication, whether in electronic or hard copy format, and 
immediately contact the Security Office at EDFUND at (916) 526-7539 or 
securityoff...@edfund.org. Thank you.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: JES2 exit?

2009-04-01 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of John McKown
Sent: Wednesday, April 01, 2009 12:35 PM
To: IBM-MAIN@bama.ua.edu
Subject: JES2 exit?


I don't like doing the above, but management basically wants a rule of
"any
job which will execute more than ... minutes must be scheduled by
Production
Control via CA-7." Of course, a rule without enforcement is not a rule.
It
is a request.


So any and all jobs that execute 1 second beyond get cancelled, right? I
can think of two system issues that can cause heartburn. Should the
system have an enque hang, or allocation (as in it being single threaded
for ALL address spaces) get stuck for some reason, all batch jobs
subject to this rule could get "executed."

Now for the busy situation that causes this problem: What happens when
the tape system you have has all its tape heads tied up when a large
data set is needed has been migrated off to tape? Do all the jobs that
are waiting for restores get charged with the wall time it takes to get
their files restored?

Just a few items that management, who may know nothing about how real
processing takes place, may need a small bit of education about.

Regards,
Steve Thompson

-- Opinions expressed by this poster may not be those of poster's
employer. --

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: VTAM - Network Node to Border Node

2009-04-01 Thread Chris Mason
Luke

You must already have "APPN functionality" since you have a Network Node 
and 7 End Nodes.

In addition, you are already participating in border node behaviour. The 
adjacent topology subnetworks to which you are connected must already be 
performing border node functions. You participle in that, when you initiate a 
session with an LU in one of the adjacent topology subnetworks, you search 
each of the adjacent Network Nodes which appear as End Nodes - which have 
allowed themselves to be searched - to your Network Node. Also, when an LU 
in one of the adjacent topology subnetworks initiates a session with an LU in 
your topology subnetwork, the search emerges from one of the Network Nodes 
adjacent to your Network Node although the search appears to be coming 
from an End Node.

When you change your Network Node also to appear to be a border node, and 
with BNDYN=FULL, processing in your network won't change at all. The main 
reason is that your have only one Network Node and so the logic affecting 
searches hasn't any chance to be any different.

There may be some effects in the adjacent topology subnetworks so you 
should inform all your partners that you are making the change so they can 
look out for changes - although there shouldn't be any problems.

The more you add Network Nodes to your topology subnetwork and the more 
these Network Nodes also become border nodes, the more you will need to get 
to grips with the implementation of border node architecture in VTAM.

If you'd like to have some reading to give you greater confidence in what you 
are already doing and how this is changed when you "come clean" and admit 
your Network Node really is a border node, you can check out Chapter 6. 
Border Node Support in Subarea to APPN Migration: VTAM and APPN 
Implementation, SG24-4656-01:

http://www.redbooks.ibm.com/abstracts/sg244656.html

Chris Mason

On Wed, 1 Apr 2009 11:47:28 -0500, Rabbe, Luke 
 wrote:

>We currently have a VTAM network that includes 1 network node and 7 end
>nodes that use the same NETID.  We also have a few connections between
>the network node and outside networks (different NETIDs). 
>
> 
>
>The network node is not currently a border node.  I want to make the
>network node a border node.  
>
> 
>
>If I code the following, will the network node continue to function the
>same?
>
> 
>
>BN=YES
>
>BNDYN=FULL
>
> 
>
>I want to add the APPN functionality but not mess with the way the
>current configuration works.
>
> 
>
>Are there any other things I should be on the lookout for when changing
>to a border node?
>
> 
>
>Thank you,
>
>Luke Rabbe

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: JES2 exit?

2009-04-01 Thread Mary Anne Matyaz
John, I think the Hasp308 won't come out until  minutes have passed
If you meant changing that to 30 or 60 or whatever you wanted, then
proceed...
Mary Anne

On Wed, Apr 1, 2009 at 1:35 PM, John McKown  wrote:

> This is a question from management. I don't like the question. But I will
> ask anyway. is there any way, using normal JES2 facilities, which could
> include an EXIT in JES2 to limit the wall-clock time that a job is
> permitted? I am thinking that I could put the ESTIME parameter in the JES2
> parms with NUM= and OPT=YES so that a $HASP308 message is issued. I
> would use EXIT(20) to set the JCTETIME value to what I actually want for
> the
> job (it will vary). I could then use CA-OPS/MVS to trap the $HASP308
> message
> and, if desired, issue a $CJ command for the job.
>
> I don't like doing the above, but management basically wants a rule of "any
> job which will execute more than ... minutes must be scheduled by
> Production
> Control via CA-7." Of course, a rule without enforcement is not a rule. It
> is a request.
>
> --
> John
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: "A foolish consistancy" or "3390 cyl/track architecture"

2009-04-01 Thread Eric Bielefeld
You've refreshed more of my memory.  So you really could have more or less 
volumes at different times, depending on how much data, blocksizes, etc. 
that you have on them.  But, I would think you need to define a static set 
of volumes for normal processing, although I could see that at times such as 
month end you might need more volumes.


I have a couple of questions.  Does anyone have an RVA still?  Is there any 
current DASD that still works this way?


Eric

Eric Bielefeld
Sr. Systems Programmer
Milwaukee, Wisconsin
414-475-7434


- Original Message - 
From: "Tom Marchant" 

Newsgroups: bit.listserv.ibm-main
To: 
Sent: Wednesday, April 01, 2009 9:28 AM
Subject: Re: "A foolish consistancy" or "3390 cyl/track architecture"



On Tue, 31 Mar 2009 17:50:08 -0500, Eric Bielefeld wrote:


...  I read a lot about it the time, but in the end we didn't get
one.  What you wrote below I remember, especially the compression, and
writing all new and updated data in a new location.  BUT, you define so 
many

volumes.  Once you have them defined, and all of the space is allocated...


When you define volumes on an RVA, space is not allocated except for a 
track

index.  (I don't remember if that's what they called it, but that was its
function.)  The track index has a pointer to the physical location of the
track and some flags.  All mainframe access to data is through cache, and
cache is managed in full tracks.  When a track is destaged from cache, the
entire track is written to a new location and the space required for that
track is allocated.

When Snapshot is used to copy a volume or a data set, the only thing that 
is

copied is the relevant entries in the track index.  At that moment, the
copied volume doesn't take up any space.  As tracks are updated, the track
indexes diverge and space is used for the new volume or data set.
Somewhere, it also records the number of track indexes that point to each
track and when that count reaches zero, the space that the track occupied
becomes available for reuse.

We made extensive use of snapshot copy of full volumes when we were
upgrading from MVS 3.1.3 to OS/390 2.4.  It is a big unsupported jump and 
we

maintained a completely isolated copy of our entire DASD farm for the test
system.  When a test was finished, we discarded the snapshot copies,
performed whatever maintenance was necessary and created new copies.

There is software on the mainframe that tells the RVA that tracks are no
longer needed.  For example, when a data set is deleted.  The tracks are
discarded and made available for reuse.  When this is done, the NCL drops.

--
Tom Marchant 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


JES2 exit?

2009-04-01 Thread John McKown
This is a question from management. I don't like the question. But I will
ask anyway. is there any way, using normal JES2 facilities, which could
include an EXIT in JES2 to limit the wall-clock time that a job is
permitted? I am thinking that I could put the ESTIME parameter in the JES2
parms with NUM= and OPT=YES so that a $HASP308 message is issued. I
would use EXIT(20) to set the JCTETIME value to what I actually want for the
job (it will vary). I could then use CA-OPS/MVS to trap the $HASP308 message
and, if desired, issue a $CJ command for the job.

I don't like doing the above, but management basically wants a rule of "any
job which will execute more than ... minutes must be scheduled by Production
Control via CA-7." Of course, a rule without enforcement is not a rule. It
is a request.

-- 
John

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: StandAlone DSS restore, is FILE(xxx) tape mark ?

2009-04-01 Thread Rafa Pereira
John Kelly  wrote:

>Been a while since I did stand alone DSS restores. I see that DSS now has
>a FILE parameter which can specify the file number from the beginning of
>the tape. I would assume the number is tape marks, ie with standard label
>tape file 1 would be FILE(2). Does anyone know, rather than guess like I
>did?

IIRC, with standard label tapes, the value in the FILE parameter corresponds
to the file sequence number of the dataset within the tape. So, the first
dataset in the tape would be FILE(1), which is the default.

Regards.

Rafa.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Documentation Delivered as ISO files

2009-04-01 Thread Barkow, Eileen
i have Daemon Tools Lite, also free and works very well with iso files.

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Farley, Peter x23353
Sent: Wednesday, April 01, 2009 1:07 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Documentation Delivered as ISO files

> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of John McKown
> Sent: Wednesday, April 01, 2009 12:55 PM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: Documentation Delivered as ISO files
> 
> On Wed, 1 Apr 2009 09:32:13 -0700, Craig Bakken 
> wrote:
> 
> >Now that we are using electronic delivery for all of our maintenance a
> >lot of documentation is coming on files with a ISO file extension.  I 
> >am wondering how other sites are handling these files?
> 
> Google is your friend.
> 
> http://blog.godshell.com/blog/index.php?/archives/26-Windows-XP-ISO-Mount-
> Utility.html
> 
> http://www.google.com/search?q=windows+iso+mount

Indeed, I have used the MS virtual CD mount software successfully to read ISO 
images from many sources.  Works like a charm, free and reliable.

Peter

This message and any attachments are intended only for the use of the addressee 
and
may contain information that is privileged and confidential. If the reader of 
the 
message is not the intended recipient or an authorized representative of the
intended recipient, you are hereby notified that any dissemination of this
communication is strictly prohibited. If you have received this communication in
error, please notify us immediately by e-mail and delete the message and any
attachments from your system.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Documentation Delivered as ISO files

2009-04-01 Thread Farley, Peter x23353
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of John McKown
> Sent: Wednesday, April 01, 2009 12:55 PM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: Documentation Delivered as ISO files
> 
> On Wed, 1 Apr 2009 09:32:13 -0700, Craig Bakken 
> wrote:
> 
> >Now that we are using electronic delivery for all of our maintenance a
> >lot of documentation is coming on files with a ISO file extension.  I 
> >am wondering how other sites are handling these files?
> 
> Google is your friend.
> 
> http://blog.godshell.com/blog/index.php?/archives/26-Windows-XP-ISO-Mount-
> Utility.html
> 
> http://www.google.com/search?q=windows+iso+mount

Indeed, I have used the MS virtual CD mount software successfully to read ISO 
images from many sources.  Works like a charm, free and reliable.

Peter

This message and any attachments are intended only for the use of the addressee 
and
may contain information that is privileged and confidential. If the reader of 
the 
message is not the intended recipient or an authorized representative of the
intended recipient, you are hereby notified that any dissemination of this
communication is strictly prohibited. If you have received this communication in
error, please notify us immediately by e-mail and delete the message and any
attachments from your system.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: 3270 Session to movie for presentation?

2009-04-01 Thread Natarajan Mohan
Gil,

If you are using a windows xp and above; you have a program called Movie Maker. 
You could use this to make video using screen capture.

http://www.microsoft.com/windows/windowsmedia/howto/articles/screencap.aspx 

HTH,
Natarajan

>>> Paul Gilmartin  3/28/2009 10:14 AM >>>
How to convert a 3270 session to a movie or
slideshow without a lot of tedious screen captures?
Minimizing file size would be a plus.

My subject would be a tn3270 X session or equivalent;
the objective is training, so there would be more slides
than a meeting-oriented presentation.

I can capture a Terminal session with script(1).
There's no way to control playback rate or pause.

Thanks,
gil


NOTICE OF CONFIDENTIALITY 

The information contained in this communication, including but not limited to 
any accompanying document(s) and/or attachment(s), is privileged and 
confidential and is intended solely for the above-named individual(s). If you 
are not the intended recipient, please be advised that any distribution, 
copying, disclosure, and/or use of the information contained herein is strictly 
prohibited. If you received this communication in error, please destroy all 
copies of the communication, whether in electronic or hard copy format, and 
immediately contact the Security Office at EDFUND at (916) 526-7539 or 
securityoff...@edfund.org. Thank you.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Documentation Delivered as ISO files

2009-04-01 Thread Roach, Dennis (N-GHG)
Look at Virtual Clone Drive at http://www.slysoft.com/en/download.html. 

Dennis Roach
GHG Corporation
Lockheed Martin Mission Services
Flight Design and Operations Contract
NASA/JSC
Address:
   2100 Space Park Drive 
   LM-15-4BH
   Houston, Texas 77058
Mail:
   P.O. Box 58487
   Mail Code H4C
   Houston, Texas 77258
Phone:
   Voice:  (281)336-5027
   Cell:   (713)591-1059
   Fax:(281)336-5410
E-Mail:  dennis.ro...@lmco.com

All opinions expressed by me are mine and may not agree with my employer or any 
person, company, or thing, living or dead, on or near this or any other planet, 
moon, asteroid, or other spatial object, natural or manufactured, since the 
beginning of time.


> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of John McKown
> Sent: Wednesday, April 01, 2009 11:47 AM
>  wrote:
> 
> >Now that we are using electronic delivery for all of our maintenance a
> lot of
> >documentation is coming on files with a ISO file extension.  I am
> wondering
> how
> >other sites are handling these files?
> 
> Personally, since I use Linux, I simply do a "loop" mount of the ISO
> file.
> Something like:
> 
> sudo mount file.with.doc.iso /mnt -oro,loop
> 
> I can then look in the /mnt subdirectory for the documentation. If I
> need to
> get this on a Windows platform, then I use "zip" to zip the /mnt
> subdirectory to a file and ftp it to my mainframe, then back down to
> the
> Windows server (my Linux box is not use any Windows shares to do a
> direct
> transfer).
> 
> Otherwise, get a DVD burner and software, and burn the ISO to a
> physical CD
> or DVD and use that on your Windows machine. I don't know of any way to
> mount an ISO file as a subdirectory in Windows.
> 
> --
> John

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Documentation Delivered as ISO files

2009-04-01 Thread John McKown
On Wed, 1 Apr 2009 09:32:13 -0700, Craig Bakken  wrote:

>Now that we are using electronic delivery for all of our maintenance a lot of 
>documentation is coming on files with a ISO file extension.  I am wondering
how 
>other sites are handling these files?

Google is your friend.

http://blog.godshell.com/blog/index.php?/archives/26-Windows-XP-ISO-Mount-Utility.html

http://www.google.com/search?q=windows+iso+mount

-- 
John

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: secure file transfer FROM z/OS

2009-04-01 Thread Walt Farrell
On Wed, 1 Apr 2009 11:16:48 -0500, Kirk Wolf  wrote:

>
>I guess its cool now for IBM security audits to prefer passwords to
>certificates, now that z/OS 1.10 TSO supports >8 character passwords ;-)

We don't prefer passwords to certificates.  Our Common Criteria security
evaluation is perfectly happy with using digital certificates, or passwords,
or PassTickets, or password phrases.  They all have appropriate managment
controls built in, via RACF.  

SSH private/public keys do not have appropriate management controls,
however.  The Security Administrator can not expire them, nor control their
strength, for example.

>
>Its a pity that RACF (and hw keystores) can't store SSH-style public/private
>keys (DSA, RSA) and support sign/check functions, to be exploited by z/OS
>SSH.  X.509 isn't the only game in town, and the SSH RFC group has some good
>rationale against adopting it.

I haven't investigated their rationale for not going with X.509, but I would
like to see us provide better management of SSH-style public/private keys
someday, when that has a high enough priority with both the RACF and Ported
Tools SSH teams.

>
>But z/OS Ported Tools OpenSSH has several weaknesses wrt security - where's
>kerberos? where's PAM?

Also good questions.  I can only assume it's merely a matter of priorities
and resources available for development.

-- 
  Walt Farrell, CISSP
  IBM STSM, z/OS Security Design

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Documentation Delivered as ISO files

2009-04-01 Thread Kevin Mckenzie
I'm not sure about mounting an ISO as a subdirectory, but there are a 
variety of programs that will allow you to mount ISO files as virtual 
drives on a Windows machine.  And if I'm remembering properly, Mac OS will 
automatically mount an ISO file as a virtual drive.
---
Kevin McKenzie

External Phone: 845-435-8282, Tie-line: 8-295-8282
z/OS BCP SVT, Dept FXKA, Bldg 706/2D38 



John McKown  
Sent by: IBM Mainframe Discussion List 
04/01/2009 12:47 PM
Please respond to
IBM Mainframe Discussion List 


To
IBM-MAIN@bama.ua.edu
cc

Subject
Re: Documentation Delivered as ISO files






On Wed, 1 Apr 2009 09:32:13 -0700, Craig Bakken  
wrote:

>Now that we are using electronic delivery for all of our maintenance a 
lot of 
>documentation is coming on files with a ISO file extension.  I am 
wondering
how 
>other sites are handling these files?

Personally, since I use Linux, I simply do a "loop" mount of the ISO file.
Something like:

sudo mount file.with.doc.iso /mnt -oro,loop

I can then look in the /mnt subdirectory for the documentation. If I need 
to
get this on a Windows platform, then I use "zip" to zip the /mnt
subdirectory to a file and ftp it to my mainframe, then back down to the
Windows server (my Linux box is not use any Windows shares to do a direct
transfer).

Otherwise, get a DVD burner and software, and burn the ISO to a physical 
CD
or DVD and use that on your Windows machine. I don't know of any way to
mount an ISO file as a subdirectory in Windows.

-- 
John

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


VTAM - Network Node to Border Node

2009-04-01 Thread Rabbe, Luke
We currently have a VTAM network that includes 1 network node and 7 end
nodes that use the same NETID.  We also have a few connections between
the network node and outside networks (different NETIDs). 

 

The network node is not currently a border node.  I want to make the
network node a border node.  

 

If I code the following, will the network node continue to function the
same?

 

BN=YES

BNDYN=FULL

 

I want to add the APPN functionality but not mess with the way the
current configuration works.

 

Are there any other things I should be on the lookout for when changing
to a border node?

 

Thank you,

Luke Rabbe



 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Documentation Delivered as ISO files

2009-04-01 Thread John McKown
On Wed, 1 Apr 2009 09:32:13 -0700, Craig Bakken  wrote:

>Now that we are using electronic delivery for all of our maintenance a lot of 
>documentation is coming on files with a ISO file extension.  I am wondering
how 
>other sites are handling these files?

Personally, since I use Linux, I simply do a "loop" mount of the ISO file.
Something like:

sudo mount file.with.doc.iso /mnt -oro,loop

I can then look in the /mnt subdirectory for the documentation. If I need to
get this on a Windows platform, then I use "zip" to zip the /mnt
subdirectory to a file and ftp it to my mainframe, then back down to the
Windows server (my Linux box is not use any Windows shares to do a direct
transfer).

Otherwise, get a DVD burner and software, and burn the ISO to a physical CD
or DVD and use that on your Windows machine. I don't know of any way to
mount an ISO file as a subdirectory in Windows.

-- 
John

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Documentation Delivered as ISO files

2009-04-01 Thread Craig Bakken
Now that we are using electronic delivery for all of our maintenance a lot of 
documentation is coming on files with a ISO file extension.  I am wondering how 
other sites are handling these files?




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: secure file transfer FROM z/OS

2009-04-01 Thread Kirk Wolf
Walt,

I guess its cool now for IBM security audits to prefer passwords to
certificates, now that z/OS 1.10 TSO supports >8 character passwords ;-)

Its a pity that RACF (and hw keystores) can't store SSH-style public/private
keys (DSA, RSA) and support sign/check functions, to be exploited by z/OS
SSH.  X.509 isn't the only game in town, and the SSH RFC group has some good
rationale against adopting it.

But z/OS Ported Tools OpenSSH has several weaknesses wrt security - where's
kerberos? where's PAM?

Kirk Wolf
Dovetailed Technologies
http://dovetail.com

On Wed, Apr 1, 2009 at 10:48 AM, Walt Farrell  wrote:

> On Wed, 1 Apr 2009 09:37:26 -0500, Kirk Wolf  wrote:
>
> >I'm not sure exactly what this statement means wrt "passing clear-text
> >passwords".  Can you supply more details?
>
> Excellent question, Kirk.
>
> >
> >With FTPS or SSH/SFTP, clear-text passwords are NOT sent over the network.
> >(Note: FTPS needs to be configured properly to encrypt the control
> >connection)
> >
> >To use a password from a batch client (FTPS or SSH), it is possible to put
> >the password in a dataset or file that is protected by your z/OS security
> >package so that only the client job can read it.  The FTPS or SSH client
> job
> >reads this password and uses it on the connection command.
> >
> >FTPS also supports X5.09 certificates instead of passwords; these can be
> >stored in RACF (ACF2, etc) so that only authorized users can use them for
> >signing a login request.
>
> FTPS (to the z/OS FTP server or the i5os FTP server, at least) also allows
> bypassing the prompt for the client to enter a user ID and password, when
> the client has supplied a digital certificate for authentication.  That
> woud
> eliminate the need for having the password in a secured data set, as you
> wouldn't need it at all.
>
> However, I'm not aware of any non-IBM FTP servers that have this capabiity.
>
> >
> >SSH (both Ported Tools and Tectia versions) supports a public/private DSA
> or
> >RSA keypairs as an alternative to using a password.  The private key is
> >stored in a file that is protected so that only the client job userid can
> >access it (using standard Unix security bits or ACLs and your security
> >package).  There is not an option to store the private key in RACF (ACF2,
> >etc).
>
> And storing a private key or a password in a protected data set are about
> the same, from a security risk perspective.  So if someone will accept
> storing a private key they should accept storing a password.  The only
> practical difference may be that they may not require private keys to
> change
> as often as they require passwords to change, making use of the SSH
> private/public key technology a bit simpler.
>
> Of course, one might argue that that makes using SSH private/public key
> implementation weaker, in some ways, than using passwords.  It's certainly
> a
> major factor in why we don't allow SSH authentication via private/public
> key
> in our z/OS Common Criteria security evaluations.
>
> --
>  Walt Farrell, CISSP
>  IBM STSM, z/OS Security Design
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: TCP/IP Load balancnig

2009-04-01 Thread Wolfgang Fritz
Yes I do it a BMW Munic,
we build a real SYSPLEX CS environment, with 24x7 availability, and
workloads for DB2-Connect TELNET-Server and IMS and MQ-Series including
SSL-Connections.
Do you have special questions about the concept? 
please sent me an email.

regards

Wolfgang 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: secure file transfer FROM z/OS

2009-04-01 Thread Walt Farrell
On Wed, 1 Apr 2009 09:37:26 -0500, Kirk Wolf  wrote:

>I'm not sure exactly what this statement means wrt "passing clear-text
>passwords".  Can you supply more details?

Excellent question, Kirk.

>
>With FTPS or SSH/SFTP, clear-text passwords are NOT sent over the network.
>(Note: FTPS needs to be configured properly to encrypt the control
>connection)
>
>To use a password from a batch client (FTPS or SSH), it is possible to put
>the password in a dataset or file that is protected by your z/OS security
>package so that only the client job can read it.  The FTPS or SSH client job
>reads this password and uses it on the connection command.
>
>FTPS also supports X5.09 certificates instead of passwords; these can be
>stored in RACF (ACF2, etc) so that only authorized users can use them for
>signing a login request.

FTPS (to the z/OS FTP server or the i5os FTP server, at least) also allows
bypassing the prompt for the client to enter a user ID and password, when
the client has supplied a digital certificate for authentication.  That woud
eliminate the need for having the password in a secured data set, as you
wouldn't need it at all. 

However, I'm not aware of any non-IBM FTP servers that have this capabiity.

>
>SSH (both Ported Tools and Tectia versions) supports a public/private DSA or
>RSA keypairs as an alternative to using a password.  The private key is
>stored in a file that is protected so that only the client job userid can
>access it (using standard Unix security bits or ACLs and your security
>package).  There is not an option to store the private key in RACF (ACF2,
>etc).

And storing a private key or a password in a protected data set are about
the same, from a security risk perspective.  So if someone will accept
storing a private key they should accept storing a password.  The only
practical difference may be that they may not require private keys to change
as often as they require passwords to change, making use of the SSH
private/public key technology a bit simpler.

Of course, one might argue that that makes using SSH private/public key
implementation weaker, in some ways, than using passwords.  It's certainly a
major factor in why we don't allow SSH authentication via private/public key
in our z/OS Common Criteria security evaluations.

-- 
  Walt Farrell, CISSP
  IBM STSM, z/OS Security Design

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: secure file transfer FROM z/OS

2009-04-01 Thread Chase, John
> -Original Message-
> From: IBM Mainframe Discussion List On Behalf Of Cebell, David
> 
> The person who supports file transfer in our shop reports this.
> 
> "Further, we concluded that FTPS does not satisfy PCI encryption
> requirements because there is no alternative to passing clear-text
> passwords for authentication during batch processing.  The sftp
protocol
> provided in ssh-Tectia addresses this requirement."
> 
> Is this true od is there a workaround?

Passwords are not passed until after the encrypted session is
established.

To avoid using passwords entirely, you can use digital certificates for
authentication.

-jc-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: secure file transfer FROM z/OS

2009-04-01 Thread Walt Farrell
On Wed, 1 Apr 2009 09:56:20 -0500, Cebell, David  wrote:

>Kirk,
>
>Thank You for that explanation.
>
>An example would be
>
>anonymous
> cebe...@aafes.com
> cd /toibm/mvs/
> binary
>
>I must not be current on this but what you are suggesting is the
>password, In this case "anonymous" can be stored in a protected dataset and
then
>included in my input statements?
>
>Perhaps we should be looking at FTPS and X5.09 certificates instead of
>passwords.

In your example, "anonymous" is the user ID.  The password is
"cebe...@aafes.com".  Both can be in a protected data set.

-- 
  Walt Farrell, CISSP
  IBM STSM, z/OS Security Design

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: "A foolish consistancy" or "3390 cyl/track architecture"

2009-04-01 Thread Tom Marchant
On Wed, 1 Apr 2009 15:15:45 +, Ted MacNEIL wrote:
>
>I DO NOT want to see a conversion to FBA, or anything else, until well
after we see conversion of all allocations to an SMS-based device
independent scheme.

It has been available since at least DFP 3.2, with MVS version 3.  If
conversion is so important to you, why haven't you done it?

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: TCP/IP Load balancnig

2009-04-01 Thread Mark T. Regan, K8MTR
You might want to check out this IBM Redbook:
IBM Communications Server for z/OS V1R10 TCP/IP Implementation Volume 3: High 
Availability, Scalability, and Performance 

It's available at http://www.redbooks.ibm.com/redpieces/pdfs/sg247698.pdf

Table of contents:

Chapter 1. Introduction to CS for z/OS high availability technologies
Chapter 2. Virtual IP addressing
Chapter 3. VIPA without dynamic routing
Chapter 4. VIPA with dynamic routing
Chapter 5. Internal application workload balancing
Chapter 6. External application workload balancing
Chapter 7. Intra-sysplex workload balancing
Chapter 8. Performance and tuning
Appendix A. Hipersocket Multiple Write
 Mark T. Regan, K8MTR
CTO1 USNR-Retired (1969-1991) 



- Original Message 
From: Hal Merritt 
To: IBM-MAIN@bama.ua.edu
Sent: Wednesday, April 1, 2009 11:00:11 AM
Subject: TCP/IP Load balancnig

Two questions:


1.      Has anyone actually done this?  If so, how did you do it?

2.      There was an excellent article in the 'Hot Topics' newsletter on this; 
can someone point me to a copy?

Thanks!!
NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


SAP, mainframes, and multinationals

2009-04-01 Thread john gilmore
For those of you who read German readily, there is a new book:

 

Siegele, Ludwig, & Joseph Zepelin.  Matrix der Welt.  SAP und der neue globale 
Kapitalizmus.  Frankfurt und New York: Campus-Verlag, 2009.


available that describes---publicly and in very much greater detail than I have 
seen anywhere else---the uses that some multinationals are making of SAP, 
chiefly and crucially on mainframes, to integrate and "optimize" their 
operations across national boundaries.

 

Some of these new uses are, I think, problematic.  Tax avoidance and 
displacement are not of course new or even unethical; but their optimization 
means that some multinationals are or will shortly be in a position to decide 
where to pay taxes. 

 

The book is not, however, chiefly a muckraking one.  The information it 
provides about these new uses of SAP and how they are being implemented is of 
great technical interest. 

 

John Gilmore Ashland, MA 01721-1817 USA



_
Rediscover Hotmail®: Get quick friend updates right in your inbox. 
http://windowslive.com/RediscoverHotmail?ocid=TXT_TAGLM_WL_HM_Rediscover_Updates1_042009
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: "A foolish consistancy" or "3390 cyl/track architecture"

2009-04-01 Thread Ted MacNEIL
>I understand that changing the track and cylinder architecture would involve 
>lots of changes, and that it would also involve a lot of vendor changes to 
>their software too.

That's why IBM promised to not change the geometry again.
I've lived through 3330-3350-3380-3390(compat)-3390 conversions.
They were expensive and time consuming, and error-prone.
Complaining about the archaic architecture is NOT a solution!

I DO NOT want to see a conversion to FBA, or anything else, until well after we 
see conversion of all allocations to an SMS-based device independent scheme.
-
Too busy driving to stop for gas!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: secure file transfer FROM z/OS

2009-04-01 Thread Kirk Wolf
David,

Correct - you can use REXX or a shell script to read the password from a
file or dataset.  You could do this for either FTPS or SSH.

For FTPS, there are pros and cons to using X.509 certificates vs
passwords.   Certificates are more "protected", but both partners have to
manage them and ideally they should be signed by a common CA and not
self-signed.   And if they are not stored in secure keystores on both sides,
then they aren't much more secure than passwords.

Kirk Wolf
Dovetailed Technologies

On Wed, Apr 1, 2009 at 9:56 AM, Cebell, David  wrote:

> Kirk,
>
> Thank You for that explanation.
>
> An example would be
>
> anonymous
>  cebe...@aafes.com
>  cd /toibm/mvs/
>  binary
>
> I must not be current on this but what you are suggesting is the
> password,
> In this case "anonymous" can be stored in a protected dataset and then
> included in my input statements?
>
> Perhaps we should be looking at FTPS and X5.09 certificates instead of
> passwords.
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Kirk Wolf
> Sent: Wednesday, April 01, 2009 9:37 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: secure file transfer FROM z/OS
>
> David,
>
> I'm not sure exactly what this statement means wrt "passing clear-text
> passwords".  Can you supply more details?
>
> With FTPS or SSH/SFTP, clear-text passwords are NOT sent over the
> network.
> (Note: FTPS needs to be configured properly to encrypt the control
> connection)
>
> To use a password from a batch client (FTPS or SSH), it is possible to
> put
> the password in a dataset or file that is protected by your z/OS
> security
> package so that only the client job can read it.  The FTPS or SSH client
> job
> reads this password and uses it on the connection command.
>
> FTPS also supports X5.09 certificates instead of passwords; these can be
> stored in RACF (ACF2, etc) so that only authorized users can use them
> for
> signing a login request.
>
> SSH (both Ported Tools and Tectia versions) supports a public/private
> DSA or
> RSA keypairs as an alternative to using a password.  The private key is
> stored in a file that is protected so that only the client job userid
> can
> access it (using standard Unix security bits or ACLs and your security
> package).  There is not an option to store the private key in RACF
> (ACF2,
> etc).
>
> SSH Tectia also supports X5.09 certificates just like FTPS, but this is
> a
> non-standard extension to the SSH protocol and will only be supported
> when
> talking to another Tectia SSH implementation.
>
> Kirk Wolf
> Dovetailed Technologies
> http://dovetail.com
>
> On Wed, Apr 1, 2009 at 8:54 AM, Cebell, David  wrote:
>
> > The person who supports file transfer in our shop reports this.
> >
> > "Further, we concluded that FTPS does not satisfy PCI encryption
> > requirements because there is no alternative to passing clear-text
> > passwords for authentication during batch processing.  The sftp
> protocol
> > provided in ssh-Tectia addresses this requirement."
> >
> > Is this true od is there a workaround?
> >
> > -Original Message-
> > From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> > Behalf Of Timothy Sipples
> > Sent: Wednesday, April 01, 2009 12:37 AM
> > To: IBM-MAIN@bama.ua.edu
> > Subject: Re: secure file transfer FROM z/OS
> >
> > Kirk has some good information on file transfer options using common
> > protocols. I've got some more nominees which may be appropriate if you
> > have
> > long running, targeted file transfer needs -- such as a small number
> of
> > particular servers that need to stay more-or-less permanently attached
> > and
> > transfer a lot of files.
> >
> > Basically the other options would all be file sharing (NFS, CIFS/SMB,
> > etc.)
> > over an IPSec connection (encrypted connection). z/OS supports IPSec
> and
> > also supports common network file systems like NFS, CIFS/SMB, etc.
> >
> > As Kirk alluded to, there are also numerous private protocol file
> > transfer
> > products, and they do have advantages in many missions.
> >
> > By the way, "secure file transfer" is a misnomer when used as we're
> > using
> > it here. To be more accurate for the
> (business-oriented/risk-analyzing)
> > boss I would call this "encrypted transfer of raw files without
> > custodial
> > controls." (That name is unwieldy, but it's much closer to the truth.
> > Perhaps someone has a shorter name that still gets the point across.)
> > The
> > file itself could (and usually does) contain extremely sensitive
> > information -- things like customer records, credit card numbers, etc.
> > Once
> > each record is transmitted it leaves the security zone of its parent.
> >
> > To use an analogy, if you have the launch codes for nuclear missiles,
> > yes,
> > it's a good idea if you have to communicate that information to use an
> > encrypted pipe. That's necessary but not sufficient. (The only thing
> > encryption does is prevent

TCP/IP Load balancnig

2009-04-01 Thread Hal Merritt
Two questions:


1.   Has anyone actually done this?  If so, how did you do it?

2.   There was an excellent article in the 'Hot Topics' newsletter on this; 
can someone point me to a copy?

Thanks!!
NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: secure file transfer FROM z/OS

2009-04-01 Thread Cebell, David
Kirk,

Thank You for that explanation.

An example would be

anonymous
 cebe...@aafes.com
 cd /toibm/mvs/   
 binary  

I must not be current on this but what you are suggesting is the
password,
In this case "anonymous" can be stored in a protected dataset and then
included in my input statements?

Perhaps we should be looking at FTPS and X5.09 certificates instead of
passwords.

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Kirk Wolf
Sent: Wednesday, April 01, 2009 9:37 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: secure file transfer FROM z/OS

David,

I'm not sure exactly what this statement means wrt "passing clear-text
passwords".  Can you supply more details?

With FTPS or SSH/SFTP, clear-text passwords are NOT sent over the
network.
(Note: FTPS needs to be configured properly to encrypt the control
connection)

To use a password from a batch client (FTPS or SSH), it is possible to
put
the password in a dataset or file that is protected by your z/OS
security
package so that only the client job can read it.  The FTPS or SSH client
job
reads this password and uses it on the connection command.

FTPS also supports X5.09 certificates instead of passwords; these can be
stored in RACF (ACF2, etc) so that only authorized users can use them
for
signing a login request.

SSH (both Ported Tools and Tectia versions) supports a public/private
DSA or
RSA keypairs as an alternative to using a password.  The private key is
stored in a file that is protected so that only the client job userid
can
access it (using standard Unix security bits or ACLs and your security
package).  There is not an option to store the private key in RACF
(ACF2,
etc).

SSH Tectia also supports X5.09 certificates just like FTPS, but this is
a
non-standard extension to the SSH protocol and will only be supported
when
talking to another Tectia SSH implementation.

Kirk Wolf
Dovetailed Technologies
http://dovetail.com

On Wed, Apr 1, 2009 at 8:54 AM, Cebell, David  wrote:

> The person who supports file transfer in our shop reports this.
>
> "Further, we concluded that FTPS does not satisfy PCI encryption
> requirements because there is no alternative to passing clear-text
> passwords for authentication during batch processing.  The sftp
protocol
> provided in ssh-Tectia addresses this requirement."
>
> Is this true od is there a workaround?
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Timothy Sipples
> Sent: Wednesday, April 01, 2009 12:37 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: secure file transfer FROM z/OS
>
> Kirk has some good information on file transfer options using common
> protocols. I've got some more nominees which may be appropriate if you
> have
> long running, targeted file transfer needs -- such as a small number
of
> particular servers that need to stay more-or-less permanently attached
> and
> transfer a lot of files.
>
> Basically the other options would all be file sharing (NFS, CIFS/SMB,
> etc.)
> over an IPSec connection (encrypted connection). z/OS supports IPSec
and
> also supports common network file systems like NFS, CIFS/SMB, etc.
>
> As Kirk alluded to, there are also numerous private protocol file
> transfer
> products, and they do have advantages in many missions.
>
> By the way, "secure file transfer" is a misnomer when used as we're
> using
> it here. To be more accurate for the
(business-oriented/risk-analyzing)
> boss I would call this "encrypted transfer of raw files without
> custodial
> controls." (That name is unwieldy, but it's much closer to the truth.
> Perhaps someone has a shorter name that still gets the point across.)
> The
> file itself could (and usually does) contain extremely sensitive
> information -- things like customer records, credit card numbers, etc.
> Once
> each record is transmitted it leaves the security zone of its parent.
>
> To use an analogy, if you have the launch codes for nuclear missiles,
> yes,
> it's a good idea if you have to communicate that information to use an
> encrypted pipe. That's necessary but not sufficient. (The only thing
> encryption does is prevent somebody from intercepting the file data
> "over
> the wire.") You better be completely sure both sender and receiver
apply
> appropriate security protocols to such sensitive information. Which is
> why
> launch codes don't get spread around a lot, nor should credit card
> numbers
> and much other financial information, medical patient records,
corporate
> accounting (in any business), product design secrets, etc.
>
> - - - - -
> Timothy Sipples
> IBM Consulting Enterprise Software Architect
> Based in Tokyo, Serving IBM Japan / Asia-Pacific
> E-Mail: timothy.sipp...@us.ibm.com
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with 

Re: "A foolish consistancy" or "3390 cyl/track architecture"

2009-04-01 Thread Farley, Peter x23353
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Walt Farrell
> Sent: Wednesday, April 01, 2009 6:42 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: "A foolish consistancy" or "3390 cyl/track architecture"
> 
> On Tue, 31 Mar 2009 12:50:16 -0500, Eric Bielefeld  ibmm...@wi.rr.com>
> wrote:
> >Thanks for clearing up how the current drives actually work.  It just
> >seems like IBM could get away from the track and cylinder stuff,
which
> >artificially restricts the amount of storage you use.  If you use
short
> >blocksizes, or long ones that just go over 1/2 track, you waste an
awful
> >lot of space.  Of course, well written SMS routines can correct that,
but
> >it still makes things a lot more complicated than it should be.
> 
> Perhaps I don't understand your point, Eric, but from the user
perspective
> aren't things simple already? Just let the system pick the block size,
and
> while you're at it allocate the space in terms meaningful to the
> user/application: megabytes or records.
> 
> Thus, the only things that -should- be affected by the cylinder/head
> architecture are programs, and it's a lot simpler to leave them alone
than
> it is to have to change them.  Remember it's not just IBM code that
would
> have to change.  Many vendors and customers have written code that
knows
> and depends on the cylinder/head architecture.

The biggest problem is that estimating file size for many production
batch applications is mostly or totally dependent on input (perhaps
client-supplied) file sizes.  And there is no way in JCL to say "this
new output file will be about x(percent) or x(times) the size of the
input file(s) named A (B, C, ...).  Today I may have 1M records and
tomorrow I may have 10M records, depending on how active the day's
business has been.  The only alternative we have today is to allocate
for the maximum possible size, which is often a very poor estimate of
the actual size.  It doesn't really matter that much if one uses records
or megabytes or cylinders (though I agree that records/megabytes are
probably more application-friendly methods).  When the business grows,
the original estimates hard-coded into the JCL become too small.

This is not, of course, a problem of ECKD vs FBA or some entirely
different virtual architecture for storage, but a problem of how poor
JCL is as a file specification and control-flow language.  REXX or bash
scripts are far more flexible for that purpose, but each of those
languages has far more onerous problems than JCL (TSO and the bash
shell, respectively), not to mention poor to non-existent connection
with scheduling software, which is (IMHO, of course) part of why JCL is
still almost exclusively used for production batch processing.

Burroughs' WFL (Work Flow Language) was always my ideal of a
well-integrated and flexible control language.  If REXX could be as well
integrated as WFL was in the Burroughs MCP system as to become the
replacement for JCL, that would be a step in the right direction, IMHO.

Not that I ever expect it to happen.

Peter


This message and any attachments are intended only for the use of the addressee 
and
may contain information that is privileged and confidential. If the reader of 
the 
message is not the intended recipient or an authorized representative of the
intended recipient, you are hereby notified that any dissemination of this
communication is strictly prohibited. If you have received this communication in
error, please notify us immediately by e-mail and delete the message and any
attachments from your system.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe Charge Back Software

2009-04-01 Thread Hal Merritt
Good point. 

An observation of mine is that the costs of setting up and running a charge 
back infrastructure are not trivial. Indeed, some might argue that they may not 
be cost effective. 

More, pragmatic costs per unit of work on most MF's are so small as to be 
difficult to accurately capture. 

That said, it might be a very worthy undertaking to give management a better 
understanding as to the cost effectiveness of a given platform. But, as Jim and 
Timothy point out, it should not be limited to MF simply because the MF is easy 
to measure.   

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Timothy Sipples
Sent: Wednesday, April 01, 2009 12:17 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Mainframe Charge Back Software

Jim Marshall brings up a good point. If you were going to implement
chargebacks -- insert long discussion here about the perils of bad
chargeback regimes -- why would you only charge for mainframes? Aren't
there at least clients (PCs, Macs, handhelds, etc.) and networks, for
example? Those certainly aren't free.

Shouldn't the title of this thread be "Enterprise Charge Back Software" or
"Enterprise-Integrated Mainframe Charge Back Software"?

- - - - -
Timothy Sipples
IBM Consulting Enterprise Software Architect
Based in Tokyo, Serving IBM Japan / Asia-Pacific
E-Mail: timothy.sipp...@us.ibm.com
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IBM Red Alert APAR OA28159 VSAM Key Sequence Data Sets with IMBED Attribute that are DUMP'd using Logical Data set DUMP are not RESTORE'd properly using z/OS 1.10

2009-04-01 Thread Marna WALLE
I'd like to mention some reminders, concerning IMBED, REPLICATE, and
KEYRANGE and z/OS. (There's no new news here.  We've been saying for a long
time that VSAM data sets with these attributes have been involved in
unplanned outages, and now there's a Red Alert on a problem in this area...)

a) Today, data sets that were migrated by DFSMShsm or backed up by DFSMSdss
continue to retain their IMBED, REPLICATE, and KEYRANGE attributes when
recalled or restored.   In some future release, these IMBED and REPLICATE
attributes will be removed during the recall or restore of data sets.  
(Note that today, these attributes will not be "cleaned up
automatically"!...which means you need to take some action today to make
this better or at least be aware of where your risks are.)

b) To help you with identifying which VSAM data sets have IMBED, REPLICATE,
or KEYRANGE, use the IMBDSHIP tool (for VSAM data sets, or catalogs), the
"as is" IBM Migration Checker program OLDVSAM (for catalogs) prior to z/OS
R11, or coming in z/OS R11 a new health check to verify catalogs don't have
these attributes.

Bottom line recommendation:  find out how exposed you are to this problem,
and redefine any VSAM data sets or catalog that have these attributes *now*.  

-Marna WALLE
z/OS System Build and Install
IBM Poughkeepsie

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: secure file transfer FROM z/OS

2009-04-01 Thread Kirk Wolf
David,

I'm not sure exactly what this statement means wrt "passing clear-text
passwords".  Can you supply more details?

With FTPS or SSH/SFTP, clear-text passwords are NOT sent over the network.
(Note: FTPS needs to be configured properly to encrypt the control
connection)

To use a password from a batch client (FTPS or SSH), it is possible to put
the password in a dataset or file that is protected by your z/OS security
package so that only the client job can read it.  The FTPS or SSH client job
reads this password and uses it on the connection command.

FTPS also supports X5.09 certificates instead of passwords; these can be
stored in RACF (ACF2, etc) so that only authorized users can use them for
signing a login request.

SSH (both Ported Tools and Tectia versions) supports a public/private DSA or
RSA keypairs as an alternative to using a password.  The private key is
stored in a file that is protected so that only the client job userid can
access it (using standard Unix security bits or ACLs and your security
package).  There is not an option to store the private key in RACF (ACF2,
etc).

SSH Tectia also supports X5.09 certificates just like FTPS, but this is a
non-standard extension to the SSH protocol and will only be supported when
talking to another Tectia SSH implementation.

Kirk Wolf
Dovetailed Technologies
http://dovetail.com

On Wed, Apr 1, 2009 at 8:54 AM, Cebell, David  wrote:

> The person who supports file transfer in our shop reports this.
>
> "Further, we concluded that FTPS does not satisfy PCI encryption
> requirements because there is no alternative to passing clear-text
> passwords for authentication during batch processing.  The sftp protocol
> provided in ssh-Tectia addresses this requirement."
>
> Is this true od is there a workaround?
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Timothy Sipples
> Sent: Wednesday, April 01, 2009 12:37 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: secure file transfer FROM z/OS
>
> Kirk has some good information on file transfer options using common
> protocols. I've got some more nominees which may be appropriate if you
> have
> long running, targeted file transfer needs -- such as a small number of
> particular servers that need to stay more-or-less permanently attached
> and
> transfer a lot of files.
>
> Basically the other options would all be file sharing (NFS, CIFS/SMB,
> etc.)
> over an IPSec connection (encrypted connection). z/OS supports IPSec and
> also supports common network file systems like NFS, CIFS/SMB, etc.
>
> As Kirk alluded to, there are also numerous private protocol file
> transfer
> products, and they do have advantages in many missions.
>
> By the way, "secure file transfer" is a misnomer when used as we're
> using
> it here. To be more accurate for the (business-oriented/risk-analyzing)
> boss I would call this "encrypted transfer of raw files without
> custodial
> controls." (That name is unwieldy, but it's much closer to the truth.
> Perhaps someone has a shorter name that still gets the point across.)
> The
> file itself could (and usually does) contain extremely sensitive
> information -- things like customer records, credit card numbers, etc.
> Once
> each record is transmitted it leaves the security zone of its parent.
>
> To use an analogy, if you have the launch codes for nuclear missiles,
> yes,
> it's a good idea if you have to communicate that information to use an
> encrypted pipe. That's necessary but not sufficient. (The only thing
> encryption does is prevent somebody from intercepting the file data
> "over
> the wire.") You better be completely sure both sender and receiver apply
> appropriate security protocols to such sensitive information. Which is
> why
> launch codes don't get spread around a lot, nor should credit card
> numbers
> and much other financial information, medical patient records, corporate
> accounting (in any business), product design secrets, etc.
>
> - - - - -
> Timothy Sipples
> IBM Consulting Enterprise Software Architect
> Based in Tokyo, Serving IBM Japan / Asia-Pacific
> E-Mail: timothy.sipp...@us.ibm.com
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ib

Re: secure file transfer FROM z/OS

2009-04-01 Thread Hal Merritt
What, exactly, is 'FTPS'? As Timothy alluded, there are a large number of 
solutions out there. 

For example, TLS FTP is certificate based and does not pass log on credentials 
in the clear. It's free on z/os and easy to automate. The downside is 
certificate management. 

SSH seems to be PCI acceptable, but may have issues in that it may store its 
keys in the clear. There is a SSH port for z/os, also free. 

 

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Cebell, David
Sent: Wednesday, April 01, 2009 8:54 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: secure file transfer FROM z/OS

The person who supports file transfer in our shop reports this.

"Further, we concluded that FTPS does not satisfy PCI encryption
requirements because there is no alternative to passing clear-text
passwords for authentication during batch processing.  The sftp protocol
provided in ssh-Tectia addresses this requirement."

Is this true od is there a workaround? 

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Timothy Sipples
Sent: Wednesday, April 01, 2009 12:37 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: secure file transfer FROM z/OS

Kirk has some good information on file transfer options using common
protocols. I've got some more nominees which may be appropriate if you
have
long running, targeted file transfer needs -- such as a small number of
particular servers that need to stay more-or-less permanently attached
and
transfer a lot of files.

Basically the other options would all be file sharing (NFS, CIFS/SMB,
etc.)
over an IPSec connection (encrypted connection). z/OS supports IPSec and
also supports common network file systems like NFS, CIFS/SMB, etc.

As Kirk alluded to, there are also numerous private protocol file
transfer
products, and they do have advantages in many missions.

By the way, "secure file transfer" is a misnomer when used as we're
using
it here. To be more accurate for the (business-oriented/risk-analyzing)
boss I would call this "encrypted transfer of raw files without
custodial
controls." (That name is unwieldy, but it's much closer to the truth.
Perhaps someone has a shorter name that still gets the point across.)
The
file itself could (and usually does) contain extremely sensitive
information -- things like customer records, credit card numbers, etc.
Once
each record is transmitted it leaves the security zone of its parent.

To use an analogy, if you have the launch codes for nuclear missiles,
yes,
it's a good idea if you have to communicate that information to use an
encrypted pipe. That's necessary but not sufficient. (The only thing
encryption does is prevent somebody from intercepting the file data
"over
the wire.") You better be completely sure both sender and receiver apply
appropriate security protocols to such sensitive information. Which is
why
launch codes don't get spread around a lot, nor should credit card
numbers
and much other financial information, medical patient records, corporate
accounting (in any business), product design secrets, etc.

- - - - -
Timothy Sipples
IBM Consulting Enterprise Software Architect
Based in Tokyo, Serving IBM Japan / Asia-Pacific
E-Mail: timothy.sipp...@us.ibm.com
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: "A foolish consistancy" or "3390 cyl/track architecture"

2009-04-01 Thread Tom Marchant
On Tue, 31 Mar 2009 17:50:08 -0500, Eric Bielefeld wrote:
>
>...  I read a lot about it the time, but in the end we didn't get
>one.  What you wrote below I remember, especially the compression, and
>writing all new and updated data in a new location.  BUT, you define so many
>volumes.  Once you have them defined, and all of the space is allocated...

When you define volumes on an RVA, space is not allocated except for a track
index.  (I don't remember if that's what they called it, but that was its
function.)  The track index has a pointer to the physical location of the
track and some flags.  All mainframe access to data is through cache, and
cache is managed in full tracks.  When a track is destaged from cache, the
entire track is written to a new location and the space required for that
track is allocated.

When Snapshot is used to copy a volume or a data set, the only thing that is
copied is the relevant entries in the track index.  At that moment, the
copied volume doesn't take up any space.  As tracks are updated, the track
indexes diverge and space is used for the new volume or data set. 
Somewhere, it also records the number of track indexes that point to each
track and when that count reaches zero, the space that the track occupied
becomes available for reuse.

We made extensive use of snapshot copy of full volumes when we were
upgrading from MVS 3.1.3 to OS/390 2.4.  It is a big unsupported jump and we
maintained a completely isolated copy of our entire DASD farm for the test
system.  When a test was finished, we discarded the snapshot copies,
performed whatever maintenance was necessary and created new copies.

There is software on the mainframe that tells the RVA that tracks are no
longer needed.  For example, when a data set is deleted.  The tracks are
discarded and made available for reuse.  When this is done, the NCL drops.

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Mainframe Charge Back Software

2009-04-01 Thread Kelman, Tom
We use a product that used to be called CIMS by CIMS Labs.  A couple of
years ago CIMS was bought by IBM and the product is now IBM Tivoli Usage
and Accounting Manager (ITUAM).

Tom Kelman
Enterprise Capacity Planner
Commerce Bank of Kansas City
(816) 760-7632

> -Original Message-
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Tom Eden
> Sent: Monday, March 30, 2009 4:55 PM
> To: IBM-MAIN@bama.ua.edu
> Subject: Mainframe Charge Back Software
> 
> What software are people using for mainframe chageback?  Is there
anything
> besides JARS or MICS out there.
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html


*
If you wish to communicate securely with Commerce Bank and its
affiliates, you must log into your account under Online Services at 
http://www.commercebank.com or use the Commerce Bank Secure
Email Message Center at https://securemail.commercebank.com

NOTICE: This electronic mail message and any attached files are
confidential. The information is exclusively for the use of the
individual or entity intended as the recipient. If you are not
the intended recipient, any use, copying, printing, reviewing,
retention, disclosure, distribution or forwarding of the message
or any attached file is not authorized and is strictly prohibited.
If you have received this electronic mail message in error, please
advise the sender by reply electronic mail immediately and
permanently delete the original transmission, any attachments
and any copies of this message from your computer system.
*

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: "A foolish consistancy" or "3390 cyl/track architecture"

2009-04-01 Thread Eric Bielefeld

Walt,

I understand that changing the track and cylinder architecture would involve 
lots of changes, and that it would also involve a lot of vendor changes to 
their software too.  I'm not saying IBM should change it - it just seems 
overly complicated.  I have no idea how IBM could change it, although 
several have mentioned FBA architecture, where everything is written out in 
4K blocks.  I have mixed feelings about this subject.  To me it seems 
complicated, but that's also one of the things that gives z/OS the power it 
has.


Eric Bielefeld
Sr. Systems Programmer
Milwaukee, Wisconsin
414-475-7434


- Original Message - 
From: "Walt Farrell" 

Newsgroups: bit.listserv.ibm-main
To: 
Sent: Wednesday, April 01, 2009 5:42 AM
Subject: Re: "A foolish consistancy" or "3390 cyl/track architecture"


On Tue, 31 Mar 2009 12:50:16 -0500, Eric Bielefeld 


wrote:
Thanks for clearing up how the current drives actually work.  It just 
seems

like IBM could get away from the track and cylinder stuff, which
artificially restricts the amount of storage you use.  If you use short
blocksizes, or long ones that just go over 1/2 track, you waste an awfull
lot of space.  Of course, well written SMS routines can correct that, but 
it

still makes things a lot more complicated than it should be.


Perhaps I don't understand your point, Eric, but from the user perspective
aren't things simple already? Just let the system pick the block size, and
while you're at it allocate the space in terms meaningful to the
user/application: megabytes or records.

Thus, the only things that -should- be affected by the cylinder/head
architecture are programs, and it's a lot simpler to leave them alone than
it is to have to change them.  Remember it's not just IBM code that would
have to change.  Many vendors and customers have written code that knows 
and

depends on the cylinder/head architecture.

--
 Walt 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: secure file transfer FROM z/OS

2009-04-01 Thread Cebell, David
The person who supports file transfer in our shop reports this.

"Further, we concluded that FTPS does not satisfy PCI encryption
requirements because there is no alternative to passing clear-text
passwords for authentication during batch processing.  The sftp protocol
provided in ssh-Tectia addresses this requirement."

Is this true od is there a workaround? 

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Timothy Sipples
Sent: Wednesday, April 01, 2009 12:37 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: secure file transfer FROM z/OS

Kirk has some good information on file transfer options using common
protocols. I've got some more nominees which may be appropriate if you
have
long running, targeted file transfer needs -- such as a small number of
particular servers that need to stay more-or-less permanently attached
and
transfer a lot of files.

Basically the other options would all be file sharing (NFS, CIFS/SMB,
etc.)
over an IPSec connection (encrypted connection). z/OS supports IPSec and
also supports common network file systems like NFS, CIFS/SMB, etc.

As Kirk alluded to, there are also numerous private protocol file
transfer
products, and they do have advantages in many missions.

By the way, "secure file transfer" is a misnomer when used as we're
using
it here. To be more accurate for the (business-oriented/risk-analyzing)
boss I would call this "encrypted transfer of raw files without
custodial
controls." (That name is unwieldy, but it's much closer to the truth.
Perhaps someone has a shorter name that still gets the point across.)
The
file itself could (and usually does) contain extremely sensitive
information -- things like customer records, credit card numbers, etc.
Once
each record is transmitted it leaves the security zone of its parent.

To use an analogy, if you have the launch codes for nuclear missiles,
yes,
it's a good idea if you have to communicate that information to use an
encrypted pipe. That's necessary but not sufficient. (The only thing
encryption does is prevent somebody from intercepting the file data
"over
the wire.") You better be completely sure both sender and receiver apply
appropriate security protocols to such sensitive information. Which is
why
launch codes don't get spread around a lot, nor should credit card
numbers
and much other financial information, medical patient records, corporate
accounting (in any business), product design secrets, etc.

- - - - -
Timothy Sipples
IBM Consulting Enterprise Software Architect
Based in Tokyo, Serving IBM Japan / Asia-Pacific
E-Mail: timothy.sipp...@us.ibm.com
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: How to identify the maximum size of VSAM LDS

2009-04-01 Thread Sivakumar, Manikandan
R.S Thanks for your information. 

Also referred z/OS V1R7.0 DFSMS Using Data Sets as follows

1.3.2.3 Maximum VSAM Data Size

A VSAM data set is limited to 4 GB across all volumes unless Extended 
Addressability is specified in the SMS data class definition. System 
requirements restrict the number of volumes that can be used for one data set 
to 59. 


Using extended addressability, the size limit for a VSAM data set is determined 
by either: 

Control interval size multiplied by 4 GB 

The volume size multiplied by 59. 

A control interval size of 4 KB yields a maximum data set size of 16 TB, while 
a control interval size of 32 KB yields a maximum data set size of 128 TB. A 
control interval size of 4 KB is preferred by many applications for performance 
reasons. No increase in processing time is expected for extended format data 
sets that grow beyond 4 GB. To use extended  addressability, the data set must 
be: 

1.SMS-managed 
2.Defined as extended format. 

2.1.3 Extended Format VSAM Datasets  

VSAM extended format data sets might have any combination of the following 
optional attributes: 

1. Data striping. This is called a striped data set. 
2. Data compression. This is called a compressed format data set. 
3. Extended addressability. 

For example, a data set might be a striped compressed format data set with 
extended addressability. Striping can reduce sequential access time. 
Compression can reduce the disk space. Extended addressability increases the 
maximum size of the data set. VSAM data sets must also be in extended-format to 
be eligible for the following advanced functions: 

* Partial space release (PARTREL) 
* Candidate volume space 
* System-managed buffering (SMB) 

An extended-format data set for VSAM can be allocated for key-sequenced data 
sets, entry-sequenced data sets, variable-length or fixed-length 
relative-record data sets, and linear data sets. Certain types of key-sequenced 
data set types are excluded. The following data sets cannot have an extended 
format: 

* Catalogs 
* Other system data sets 
* Temporary data sets 

When a data set is allocated as an extended format data set, the data and index 
are extended format. Any alternate indexes related to an extended format 
cluster are also extended format. If a data set is allocated as an extended 
format data set, 32 bytes (X'20') are added to each physical block. 
Consequently, when the control interval size is calculated or explicitly 
specified, this physical block overhead may increase the amount of space 
actually needed for the data set. Figure 23 shows the percentage increase in 
space as indicated. Other control intervals do not result in an increase in 
needed space 

   - 3390 Direct Access Device

  Control Interval SizeAdditional Space Required
5122.1%
   15364.5%
  18432   12.5%
   - 3380 Direct Access Device

  Control Interval SizeAdditional Space Required
5122.2%
   10243.2%

2.1.3.1 Restrictions on Defining Extended-Format Data Sets

The following restrictions apply to defining extended-format data sets: 

An extended-format data set does not permit the indexes to be imbedded with the 
data (IMBED parameter) or the data to be split into key ranges (KEYRANGES 
parameter). 

Extended-format data sets must be SMS managed. These are the mechanisms for 
requesting extended format for VSAM data sets: 

Using a data class that has a DSNTYPE value of EXT and the subparameter R or P 
to indicate required or preferred. 

Coding DSNTYPE=EXTREQ (extended format is required) or DSNTYPE=EXTPREF 
(extended format is preferred) on the DD statement. 

Coding the LIKE= parameter on the DD statement to refer to an existing extended 
format data set. 


Note: An open for improved control interval (ICI) processing is not permitted 
for extended format data sets.


More topics...

VSAM Data Striping:
http://publibfp.boulder.ibm.com/cgi-bin/bookmgr/BOOKS/DGT2D440/2.1.3.2?SHELF=&DT=20050602124524&CASE=


Compressed Data
http://publibfp.boulder.ibm.com/cgi-bin/bookmgr/BOOKS/DGT2D440/2.1.3.3?SHELF=&DT=20050602124524&CASE=


Regards, Mani

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
R.S.
Sent: Tuesday, March 24, 2009 9:21 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: How to identify the maximum size of VSAM LDS

Sivakumar, Manikandan pisze:
> Folks,
> 
>  
> 
> I have a requirement to identify what is the maximum size allowed for
> VSAM LDS dataset. Is there any way to calculate or perform analysis on
> this.

LDS can grow up to 4GiB. Regular LDS, non-EA.
Extended Format LDS with Extended Addressability can grow up to 2^32 
CI's *and* is limited to 59 volumes. For typical CI=4096B that gives 
16TiB. Still 59 volumes limitation ap

CPMF

2009-04-01 Thread Miklos Szigetvari

Hi

Thank to Timothy Sipples to point to the IBM System Journal article 
about CPMF.
It is the Central Processor Measurement Facility but there is a Channel 
Path Measurement Facility  also or they are the same  ?


If you ever have tried to make some code performance evaluation, you 
would see , that it is a great great  feature.

For IBM internal use only ?

--
Miklos Szigetvari

Development Team
ISIS Information Systems Gmbh 
tel: (+43) 2236 27551 570
Fax: (+43) 2236 21081 

E-mail: miklos.szigetv...@isis-papyrus.com 

Info: i...@isis-papyrus.com 
Hotline: +43-2236-27551-111 

Visit our Website: http://www.isis-papyrus.com 
---

This e-mail is only intended for the recipient and not legally
binding. Unauthorised use, publication, reproduction or
disclosure of the content of this e-mail is not permitted.
This email has been checked for known viruses, but ISIS accepts
no responsibility for malicious or inappropriate content.
--- 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IBM Red Alert APAR OA28159 VSAM Key Sequence Data Sets with IMBED Attribute that are DUMP'd using Logical Data set DUMP are not RESTORE'd properly using z/OS 1.10

2009-04-01 Thread Mark Jacobs
Jousma, David wrote:
> Good news is that IBM does have an APARFIX available if you ask.
>
>   
I just received it this morning.

++APAR is available for OA28159.  It has been placed on the testcase
server (testcase.boulder.ibm.com) in the fromibm/mvs directory as   
AA28159.HDZ1A10.TR.  Please download in binary format to a data set 
with DCB attributes of LRECL=1024,BLKSIZE=6144,RECFM=FB 
and untersed using TRSMAIN. 
.   
After an SMP/e apply, issue F LLA,REFRESH and when the refresh finishes 
then issue F CATALOG,RESTART to bring in the changed code.  
.   
It is important to note, due to the urgency of this fix, it has not been
through regression testing.  However, it has been tested in the field by
an IBM customer and was able to resolve the issue. Please let us know if
you have any further questions.



> _
> Dave Jousma
> Assistant Vice President, Mainframe Services
> david.jou...@53.com
> 1830 East Paris, Grand Rapids, MI  49546 MD RSCB1G
> p 616.653.8429
> f 616.653.8497
>
>
> This e-mail transmission contains information that is confidential and may be 
> privileged.   It is intended only for the addressee(s) named above. If you 
> receive this e-mail in error, please do not read, copy or disseminate it in 
> any manner. If you are not the intended recipient, any disclosure, copying, 
> distribution or use of the contents of this information is prohibited. Please 
> reply to the message immediately by informing the sender that the message was 
> misdirected. After replying, please erase it from your computer system. Your 
> assistance in correcting this error is appreciated.
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>
>   


-- 
Mark Jacobs
Time Customer Service
Tampa, FL


Everyone remotely interesting is mad in one way or another.

--Doctor Who "Greatest Show In The Galaxy"

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IBM Red Alert APAR OA28159 VSAM Key Sequence Data Sets with IMBED Attribute that are DUMP'd using Logical Data set DUMP are not RESTORE'd properly using z/OS 1.10

2009-04-01 Thread Jousma, David
Good news is that IBM does have an APARFIX available if you ask.

_
Dave Jousma
Assistant Vice President, Mainframe Services
david.jou...@53.com
1830 East Paris, Grand Rapids, MI  49546 MD RSCB1G
p 616.653.8429
f 616.653.8497


This e-mail transmission contains information that is confidential and may be 
privileged.   It is intended only for the addressee(s) named above. If you 
receive this e-mail in error, please do not read, copy or disseminate it in any 
manner. If you are not the intended recipient, any disclosure, copying, 
distribution or use of the contents of this information is prohibited. Please 
reply to the message immediately by informing the sender that the message was 
misdirected. After replying, please erase it from your computer system. Your 
assistance in correcting this error is appreciated.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IBM Red Alert APAR OA28159 VSAM Key Sequence Data Sets with IMBED Attribute that are DUMP'd using Logical Data set DUMP are not RESTORE'd properly using z/OS 1.10

2009-04-01 Thread Jousma, David
Read the APAR.  HSM recalls are affected by this too.

_
Dave Jousma
Assistant Vice President, Mainframe Services
david.jou...@53.com
1830 East Paris, Grand Rapids, MI  49546 MD RSCB1G
p 616.653.8429
f 616.653.8497


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of O'Brien, David W. (NIH/CIT) [C]
Sent: Wednesday, April 01, 2009 8:45 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: IBM Red Alert APAR OA28159 VSAM Key Sequence Data Sets with
IMBED Attribute that are DUMP'd using Logical Data set DUMP are not
RESTORE'd properly using z/OS 1.10

Doesn't HSM use DSS  to restore datasets? I was assured that recalling
or recovering VSAM KSDS with Imbed would not be a problem. Now I'm not
so sure. 
If Marne Walle is monitoring perhaps she could give us an update.
 
Dave O'Brien
NIH Contractor

This e-mail transmission contains information that is confidential and may be 
privileged.   It is intended only for the addressee(s) named above. If you 
receive this e-mail in error, please do not read, copy or disseminate it in any 
manner. If you are not the intended recipient, any disclosure, copying, 
distribution or use of the contents of this information is prohibited. Please 
reply to the message immediately by informing the sender that the message was 
misdirected. After replying, please erase it from your computer system. Your 
assistance in correcting this error is appreciated.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IBM Red Alert APAR OA28159 VSAM Key Sequence Data Sets with IMBED Attribute that are DUMP'd using Logical Data set DUMP are not RESTORE'd properly using z/OS 1.10

2009-04-01 Thread O'Brien, David W. (NIH/CIT) [C]
Doesn't HSM use DSS  to restore datasets? I was assured that recalling or 
recovering VSAM KSDS with Imbed would not be a problem. Now I'm not so sure. 
If Marne Walle is monitoring perhaps she could give us an update.
 
Dave O'Brien
NIH Contractor

From: IBM Mainframe Discussion List [ibm-m...@bama.ua.edu] On Behalf Of 
Knutson, Sam [sknut...@geico.com]
Sent: Wednesday, April 01, 2009 8:33 AM
To: IBM-MAIN@bama.ua.edu
Subject: IBM Red Alert APAR OA28159 VSAM Key Sequence Data Sets with IMBED 
Attribute that are DUMP'd using Logical Data set DUMP are not RESTORE'd 
properly using z/OS 1.10

http://www14.software.ibm.com/webapp/set2/sas/f/redAlerts/20090331.html

Abstract:
VSAM Key Sequence Data Sets with IMBED Attribute that are DUMP'd using Logical 
Data set DUMP are not RESTORE'd properly using z/OS 1.10 and therefore are not 
accessible from any z/OS release.
Description:In z/OS 1.10. when RESTOREing a VSAM KSDS with the IMBED attribute 
that was DUMP'd using DFSMSdss Logical Dataset DUMP on any z/OS release, you 
may receive the following errors when accessing the data set:

IEC070I 032(001)-202,DSSREST,LISTC,SYS6,,,IBMUSER.KSDS.INDX,
IEC070I IBMUSER.KSDS.INDX,SYS1.MVSRES9.MASTCAT

or

IDC3302I  ACTION ERROR ON IBMUSER.KSDS
IDC3350I 09089,08533067,00010E00,I,USER00,IBMUSERA,COMMDS  ,0
 830,DA,INDD,06- OP,INCORR. LENGTH ,000401,VSAM
DFSMShsm uses DFSMSdss Logical Data Set Dump and RESTORE to MIGRATE/RECALL and 
BACKUP/RECOVER VSAM KSDS data sets.
Recommended Actions:APAR OA28159 has been created to resolve this issue. See 
the APAR text for additional details.

See Local Fix in APAR OA28159 for details on regaining access to the data sets.


Are you signed up for Red Alerts?


http://www14.software.ibm.com/webapp/set2/sas/f/redAlerts/home.html


Best Regards,

Sam Knutson, GEICO
System z Performance and Availability Management
mailto:sknut...@geico.com
(office)  301.986.3574

"Think big, act bold, start simple, grow fast..."



This email/fax message is for the sole use of the intended
recipient(s) and may contain confidential and privileged information.
Any unauthorized review, use, disclosure or distribution of this
email/fax is prohibited. If you are not the intended recipient, please
destroy all paper and electronic copies of the original message.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Flash devices

2009-04-01 Thread Shane
This is the best (recent) article I've seen on Flash issues -
http://www.anandtech.com/printarticle.aspx?i=3531

Ron, I'd be *REAL* interested to see any test results on "Enterprise
Flashdrives" - especially if you can fill a drive and see the same
degradation.
Anyone else having access to test environments, step forward as well  ;)

Shane ...

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IBM Red Alert APAR OA28159 VSAM Key Sequence Data Sets with IMBED Attribute that are DUMP'd using Logical Data set DUMP are not RESTORE'd properly using z/OS 1.10

2009-04-01 Thread Jousma, David
Just got that this morning too.  Good timing I guess.  We were to start
our 1.10 roll into our development LPAR's starting tomorrow..  Close
date on the APAR is July 14th.seems pretty long for a HIPER of this
sort.

_
Dave Jousma
Assistant Vice President, Mainframe Services
david.jou...@53.com
1830 East Paris, Grand Rapids, MI  49546 MD RSCB1G
p 616.653.8429
f 616.653.8497

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Knutson, Sam
Sent: Wednesday, April 01, 2009 8:34 AM
To: IBM-MAIN@bama.ua.edu
Subject: IBM Red Alert APAR OA28159 VSAM Key Sequence Data Sets with
IMBED Attribute that are DUMP'd using Logical Data set DUMP are not
RESTORE'd properly using z/OS 1.10

http://www14.software.ibm.com/webapp/set2/sas/f/redAlerts/20090331.html 

Abstract:
VSAM Key Sequence Data Sets with IMBED Attribute that are DUMP'd using
Logical Data set DUMP are not RESTORE'd properly using z/OS 1.10 and
therefore are not accessible from any z/OS release.
Description:In z/OS 1.10. when RESTOREing a VSAM KSDS with the IMBED
attribute that was DUMP'd using DFSMSdss Logical Dataset DUMP on any
z/OS release, you may receive the following errors when accessing the
data set: 

IEC070I 032(001)-202,DSSREST,LISTC,SYS6,,,IBMUSER.KSDS.INDX, 
IEC070I IBMUSER.KSDS.INDX,SYS1.MVSRES9.MASTCAT  

or 

IDC3302I  ACTION ERROR ON IBMUSER.KSDS 
IDC3350I 09089,08533067,00010E00,I,USER00,IBMUSERA,COMMDS  ,0 
 830,DA,INDD,06- OP,INCORR. LENGTH ,000401,VSAM   
DFSMShsm uses DFSMSdss Logical Data Set Dump and RESTORE to
MIGRATE/RECALL and BACKUP/RECOVER VSAM KSDS data sets. 
Recommended Actions:APAR OA28159 has been created to resolve this issue.
See the APAR text for additional details. 

See Local Fix in APAR OA28159 for details on regaining access to the
data sets.


Are you signed up for Red Alerts?


http://www14.software.ibm.com/webapp/set2/sas/f/redAlerts/home.html  



This e-mail transmission contains information that is confidential and may be 
privileged.   It is intended only for the addressee(s) named above. If you 
receive this e-mail in error, please do not read, copy or disseminate it in any 
manner. If you are not the intended recipient, any disclosure, copying, 
distribution or use of the contents of this information is prohibited. Please 
reply to the message immediately by informing the sender that the message was 
misdirected. After replying, please erase it from your computer system. Your 
assistance in correcting this error is appreciated.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IBM Red Alert APAR OA28159 VSAM Key Sequence Data Sets with IMBED Attribute that are DUMP'd using Logical Data set DUMP are not RESTORE'd properly using z/OS 1.10

2009-04-01 Thread Daniel McLaughlin
Sam,
  Thanks for the info. I signed up for the alerts and passed that along to 
our team as well.

  Regards to the gecko.

Daniel McLaughlin
Z-Series Systems Programmer
Information & Communications Technology
Crawford & Company
4680 N. Royal Atlanta
Tucker GA 30084 
phone: 770-621-3256 
fax: 770-621-3237
cell: 770-666-7969
email: daniel_mclaugh...@us.crawco.com
web: www.crawfordandcompany.com 



Consider the environment before printing this message.

This transmission is intended exclusively for the individual or entity to which 
it is addressed. This communication may contain information that is 
confidential, proprietary, privileged or otherwise exempt from disclosure. If 
you are not the named addressee, you are NOT authorized to read, print, retain, 
copy or disseminate this communication, its attachments or any part of them. If 
you have received this communication in error, please notify the sender 
immediately and delete this communication from all computers.  This 
communication does not form any contractual obligation on behalf of the sender, 
the sender's employer, or the employer's parent company, affiliates or 
subsidiaries.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


IBM Red Alert APAR OA28159 VSAM Key Sequence Data Sets with IMBED Attribute that are DUMP'd using Logical Data set DUMP are not RESTORE'd properly using z/OS 1.10

2009-04-01 Thread Knutson, Sam
http://www14.software.ibm.com/webapp/set2/sas/f/redAlerts/20090331.html 

Abstract:
VSAM Key Sequence Data Sets with IMBED Attribute that are DUMP'd using Logical 
Data set DUMP are not RESTORE'd properly using z/OS 1.10 and therefore are not 
accessible from any z/OS release.
Description:In z/OS 1.10. when RESTOREing a VSAM KSDS with the IMBED attribute 
that was DUMP'd using DFSMSdss Logical Dataset DUMP on any z/OS release, you 
may receive the following errors when accessing the data set: 

IEC070I 032(001)-202,DSSREST,LISTC,SYS6,,,IBMUSER.KSDS.INDX, 
IEC070I IBMUSER.KSDS.INDX,SYS1.MVSRES9.MASTCAT  

or 

IDC3302I  ACTION ERROR ON IBMUSER.KSDS 
IDC3350I 09089,08533067,00010E00,I,USER00,IBMUSERA,COMMDS  ,0 
 830,DA,INDD,06- OP,INCORR. LENGTH ,000401,VSAM   
DFSMShsm uses DFSMSdss Logical Data Set Dump and RESTORE to MIGRATE/RECALL and 
BACKUP/RECOVER VSAM KSDS data sets. 
Recommended Actions:APAR OA28159 has been created to resolve this issue. See 
the APAR text for additional details. 

See Local Fix in APAR OA28159 for details on regaining access to the data sets.


Are you signed up for Red Alerts?


http://www14.software.ibm.com/webapp/set2/sas/f/redAlerts/home.html  


Best Regards, 

Sam Knutson, GEICO 
System z Performance and Availability Management 
mailto:sknut...@geico.com 
(office)  301.986.3574 
 
"Think big, act bold, start simple, grow fast..."



This email/fax message is for the sole use of the intended
recipient(s) and may contain confidential and privileged information.
Any unauthorized review, use, disclosure or distribution of this
email/fax is prohibited. If you are not the intended recipient, please
destroy all paper and electronic copies of the original message.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SMF70PMU question

2009-04-01 Thread Horne, Jim - James S
Don,

Thanks.  I had already looked at VMAC7072 and multiplied them by NRSAMPLE to 
turn them back into totals.

Great minds think alike :).  I always check Barry's code so I know that what 
MXG is telling me is the same thing RMF uses in report generation.

Jim Horne
Systems Programmer
Large Systems Engineering & Messaging IS7-5
Lowe's Companies, Inc.
401 Elkin Highway
North Wilkesboro, NC 28659
336-658-4959
jim.ho...@lowes.com 
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Don Deese
Sent: Wednesday, April 01, 2009 8:35 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: SMF70PMU question

Hi Jim,

One more thing to keep in mind is that MXG converts the SMF70PMI, SMF70PMU, 
SMF70PMW variables to average per second values (Barry divides these 
variables by NRSAMPLE).  Barry often renames variables when he changes the 
raw SMF value by some algorithm, but he did not do so in this case.

MXG does describe the variables as AVG* in the LABEL for each variable, 
but you could easily miss that description unless you did a PROC 
CONTENTS.  Consequently, the "real" values are much larger than what you 
might expect when looking at these variables in the MXG TYPE70 file.

Best regards,

Don

**
Don Deese, Computer Management Sciences, Inc.
Voice: (804) 776-7109  Fax: (804) 776-7139
http://www.cpexpert.org
**



At 12:57 PM 3/31/2009, you wrote:
>Can anyone confirm if the SMF70PMU parameter in the RMF TYPE70 records is 
>in service units?  If not, what are the units?  Seconds, milliseconds, 
>widgets or what?
>
>Thanks,
>
>Jim Horne
>Systems Programmer
>Large Systems Engineering & Messaging IS7-5
>Lowe's Companies, Inc.
>401 Elkin Highway
>North Wilkesboro, NC 28659
>336-658-4959
>jim.ho...@lowes.com
>
>
>
>NOTICE:
>All information in and attached to the e-mail(s) below may be proprietary, 
>confidential, privileged and otherwise protected from improper or 
>erroneous disclosure.  If you are not the sender's intended recipient, you 
>are not authorized to intercept, read, print, retain, copy, forward, or 
>disseminate this message.  If you have erroneously received this 
>communication, please notify the sender immediately by phone
>(704-758-1000) or by e-mail and destroy all copies of this message 
>(electronic, paper, or otherwise).  Thank you.
>
>
>--
>For IBM-MAIN subscribe / signoff / archive access instructions,
>send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
>Search the archives at http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

NOTICE:
All information in and attached to the e-mail(s) below may be proprietary, 
confidential, privileged and otherwise protected from improper or erroneous 
disclosure.  If you are not the sender's intended recipient, you are not 
authorized to intercept, read, print, retain, copy, forward, or disseminate 
this message.  If you have erroneously received this communication, please 
notify the sender immediately by phone
(704-758-1000) or by e-mail and destroy all copies of this message (electronic, 
paper, or otherwise).  Thank you.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: "A foolish consistancy" or "3390 cyl/track architecture"

2009-04-01 Thread Bill Fairchild
At the SHARE in Austin last month, several IBM presentations on FlashDrives 
said that sequential access is still faster on controllers with devices that 
spin than with FlashDrive.  That was what I meant about lower access times.  

They also discussed the problem with rewriting into the same byte too many 
times.  That poor byte wears out.  FlashDrives are therefore really good for 
read-only data that is accessed randomly.

Bill Fairchild
Rocket Software



From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
Ron Hawkins
Sent: Wednesday, April 01, 2009 1:06 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: "A foolish consistancy" or "3390 cyl/track architecture"

Bill,

No moving parts doesn't mean they don't wear out. There's a lot of redundant
capacity in those babies to handle cell failures due to writes. This is why
you'll see Flashdrive articles talk about "wear leveling" algorithms, and
also one of the reasons why you won't see Enterprise Flashdrives on the
shelf at Frys.

I'm not sure about your access time comments. So far the performance I have
seen is very impressive. Can you elaborate?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Regarding using a variable as line number for updating a sequential file using EXECIO DISRU

2009-04-01 Thread sabarish kannan
Hi Gary

 Thanks. It works.

Sabarish

On Wed, Apr 1, 2009 at 2:01 PM, Gary Threadgold  wrote:

>  sabarish kannan  on 2009-04-01 at 09:53
> wrote:
> >Hi
> >
> > I have a situation in a TSO REXX pgm, where i will not be knowing the
> >linenum which is being updated, before hand.It will be known only at
> >runtime. So i have setup a counter which gets incremented and when the
> >condition gets satisfied for updating a row in a sequential file i try to
> >use a command like below
> >
> >"EXECIO 1 DISKRU INSEQ LCTR"
> >
> >Where LCTR is the line counter. But it gives a error saying the line can
> be
> >number or should not be provided. How can we try using a variable ? Any
> >tips.
> >
> >thanks
> >Sabarish
>
> Hi Sabarish,
> You'll need to move your counter variable outside the quotes:
>
> "EXECIO 1 DISKRU INSEQ" lctr
>
> Regards,
> Gary.
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Regarding problem of clearing of ISPF tables in a panel , getting multiple entries

2009-04-01 Thread sabarish kannan
Hi Itschak

 Thanks for the reply. But i am not using CONTROL ERRORS RETURN.I am only
using CONTROL NONDISPL for one more ISPF table XTB , as you can see from my
code.

Sabarish

On Wed, Apr 1, 2009 at 4:54 PM, Itschak Mugzach  wrote:

> Do U use Control Errors return? If so, you need to TBEND the table before
> trying to create it (Control errors return might cause that your TBCREATE
> failes, but the table is already in memory, thus TBADD will waork on the
> currently opened table:
>
> Control errors return
> TBEND tbl
> TBCREATE tbl
>
> TBADD
> TBDISPL
>
> On Wed, Apr 1, 2009 at 1:48 PM, sabarish kannan
> wrote:
>
> > Hi
> >
> >  I am having a problem of the entries being shown on a panel from a ISPF
> > table sometimes showing multiple entries wrt actual entries in a file
> > during
> > the first time of invoking the panel. I am reading from a file and
> > displaying in a panel using ISPF tables.If actually there are only 7
> > entries
> > sometime it displays around 16 entries or so.Some records get duplicated
> I
> > tried using TBVCLEAR etc to clear but still sometimes it shows duplicate
> > entries in the panel.Sometimes it is showing correctly.
> >
> > I am using the TBDISPL service to display the table entries .
> >
> > I am attaching the code for your reference.
> >
> > thanks in advance.
> >
> > Sabarish
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> > Search the archives at http://bama.ua.edu/archives/ibm-main.html
> >
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SMF70PMU question

2009-04-01 Thread Don Deese

Hi Jim,

One more thing to keep in mind is that MXG converts the SMF70PMI, SMF70PMU, 
SMF70PMW variables to average per second values (Barry divides these 
variables by NRSAMPLE).  Barry often renames variables when he changes the 
raw SMF value by some algorithm, but he did not do so in this case.


MXG does describe the variables as AVG* in the LABEL for each variable, 
but you could easily miss that description unless you did a PROC 
CONTENTS.  Consequently, the "real" values are much larger than what you 
might expect when looking at these variables in the MXG TYPE70 file.


Best regards,

Don

**
Don Deese, Computer Management Sciences, Inc.
Voice: (804) 776-7109  Fax: (804) 776-7139
http://www.cpexpert.org
**



At 12:57 PM 3/31/2009, you wrote:
Can anyone confirm if the SMF70PMU parameter in the RMF TYPE70 records is 
in service units?  If not, what are the units?  Seconds, milliseconds, 
widgets or what?


Thanks,

Jim Horne
Systems Programmer
Large Systems Engineering & Messaging IS7-5
Lowe's Companies, Inc.
401 Elkin Highway
North Wilkesboro, NC 28659
336-658-4959
jim.ho...@lowes.com



NOTICE:
All information in and attached to the e-mail(s) below may be proprietary, 
confidential, privileged and otherwise protected from improper or 
erroneous disclosure.  If you are not the sender's intended recipient, you 
are not authorized to intercept, read, print, retain, copy, forward, or 
disseminate this message.  If you have erroneously received this 
communication, please notify the sender immediately by phone
(704-758-1000) or by e-mail and destroy all copies of this message 
(electronic, paper, or otherwise).  Thank you.



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Regarding problem of clearing of ISPF tables in a panel , getting multiple entries

2009-04-01 Thread Itschak Mugzach
Do U use Control Errors return? If so, you need to TBEND the table before
trying to create it (Control errors return might cause that your TBCREATE
failes, but the table is already in memory, thus TBADD will waork on the
currently opened table:

Control errors return
TBEND tbl
TBCREATE tbl

TBADD
TBDISPL

On Wed, Apr 1, 2009 at 1:48 PM, sabarish kannan
wrote:

> Hi
>
>  I am having a problem of the entries being shown on a panel from a ISPF
> table sometimes showing multiple entries wrt actual entries in a file
> during
> the first time of invoking the panel. I am reading from a file and
> displaying in a panel using ISPF tables.If actually there are only 7
> entries
> sometime it displays around 16 entries or so.Some records get duplicated I
> tried using TBVCLEAR etc to clear but still sometimes it shows duplicate
> entries in the panel.Sometimes it is showing correctly.
>
> I am using the TBDISPL service to display the table entries .
>
> I am attaching the code for your reference.
>
> thanks in advance.
>
> Sabarish
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: SMF70PMU question

2009-04-01 Thread Patrick Falcone
Jeez Jim, sorry about that. 
 
Haste makes waste and in this case I hurriedly replied without confirming, hate 
when I do that...

--- On Tue, 3/31/09, Horne, Jim - James S  wrote:

From: Horne, Jim - James S 
Subject: Re: SMF70PMU question
To: IBM-MAIN@bama.ua.edu
Date: Tuesday, March 31, 2009, 6:51 PM

Patrick,

I appreciate the reply but I believe you have confused SMF70PMU with SMF70PMT.

Thanks, 
Jim
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of
Patrick Falcone
Sent: Tuesday, March 31, 2009 2:39 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: SMF70PMU question

No, its an arbitrary number that has a maximum of 200 units which would be 20%
of a general purpose CP. This would be in relation to blocked workloads and how
much CP to give them to get them dispatched and serviced to possibly release
resources being held by the blocker.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Regarding problem of clearing of ISPF tables in a panel , getting multiple entries

2009-04-01 Thread sabarish kannan
Hi

  I am having a problem of the entries being shown on a panel from a ISPF
table sometimes showing multiple entries wrt actual entries in a file during
the first time of invoking the panel. I am reading from a file and
displaying in a panel using ISPF tables.If actually there are only 7 entries
sometime it displays around 16 entries or so.Some records get duplicated I
tried using TBVCLEAR etc to clear but still sometimes it shows duplicate
entries in the panel.Sometimes it is showing correctly.

I am using the TBDISPL service to display the table entries .

I am attaching the code for your reference.

thanks in advance.

Sabarish

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
/**REXX***/
MEDSNHLQ='SKANNON.UT753SP'
MYEXEC=MEDSNHLQ||'.TEST.EXEC'
'ISPEXEC LIBDEF ISPPLIB DATASET ID('''MYEXEC''')'
ADDRESS TSO
"ISPEXEC TBCREATE MAXTB NAMES(T0 T1 T2 ) "|| ,
   ",NOWRITE, SHARE "

INSEQ  = "'"||SKANNON.NR.TEST.BLDLST||"'"
SEL = ''

CALL POP_TBL
SAY 'BEFORE TBTOP'
'ISPEXEC TBTOP MAXTB '

DO WHILE ENDRC <= 4

 ' ISPEXEC TBVCLEAR MAXTB'
  CALL TBDISPL_BLDDTL

/*'ISPEXEC TBEND MAXTB ' */
  SAY 'BEFORE ZTDSEL'
  IF ZTDSEL=0 | RC>4 THEN
DO
 ENDRC=RC
 say 'NO BUILD SELECTED'
 ' ISPEXEC TBVCLEAR MAXTB'
 'ISPEXEC TBEND MAXTB '
 'ISPEXEC DISPLAY PANEL(SBLBDSP)'
END
  ELSE IF T0 = 'S' THEN
DO
SEL = 'X'
 CALL BLD_MEMLIST
 IF ZTDSEL=0 | RC>4 THEN
   DO
ENDRC=RC
'ISPEXEC TBEND MAXTB '
   END
END
  ELSE IF T0 = 'A' THEN
   DO
SEL = 'X'
SAY 'BEFORE INSRT'
 CALL INSRT_REC
 ENDRC = 8
   END
  ELSE IF T0 = 'D' THEN
 DO
 "ISPEXEC TBCREATE XTB1 NAMES(T0 T1 T2),NOWRITE, SHARE"
 ROWCNT2=ZTDSELS
  DO IX1=1 TO ROWCNT2
   VTBA1.IX1.1=T0
   VTBA1.IX1.2=T1
   VTBA1.IX1.3=T2
   'ISPEXEC CONTROL NONDISPL'
 END
 DO IX1=1 TO ROWCNT2
   OPTTYPE=VTBA.IX1.1
   BUINAM1 =VTBA.IX1.2
 END
 CALL DLT_REC
 END
END
IF SEL = 'X' THEN
 DO
  SAY 'BEFORE POP'
  CALL POP_TBL
  SAY 'AFTER POP_TBL'
  CALL TBDISPL_BLDDTL
,  'ISPEXEC DISPLAY PANEL(SBLBDSP)'
, END
,RETURN
,
,TBDISPL_BLDDTL:
, SAY 'WITHIN DISPL'
,
, 'ISPEXEC TBDISPL MAXTB PANEL(SBLBDSP)'
,  SAY 'AFTER TBDISPL'
,
,RETURN
,
,
,TBADD_BLDDTL:
,
, "ISPEXEC TBADD MAXTB"
,
,RETURN
BLD_MEMLIST:

/*CALL THE REXX ROUTINE FOR COPYING THE SQLSCRIPT AND CHANGING TBLOWNER
  THEN CALL THE ROUTINE FOR BRINGING UP THE SQL JOB'
*/
SAY 'WITHIN BLD_MEMLIST'
SAY 'T0:' T0
SAY 'T1:' T1
SAY 'T2:' T2
 MYDSNHLQ = DSNHL
 TBOWNER = TBOWN
 SAY 'High level: ' MYDSNHLQ
 SAY 'TB Owner : ' TBOWNER
 IF MYDSNHLQ = '' | TBOWNER = '' THEN
 DO
   SAY 'DSNHLQ and TBOWNER cannot be empty'
   RETURN
 END
'ISPEXEC VPUT (MYDSNHLQ)'
'ISPEXEC VPUT (TBOWNER)'
IF ZTDSELS = 0 THEN
 DO
  SAY 'NO BUILD SELECTED'
  'ISPEXEC DISPLAY PANEL(SBLBDSP)'
 END
IF ZTDSELS > 1 THEN
DO
  SAY 'ONLY ONE CAN BE SELECTED'
  'ISPEXEC DISPLAY PANEL(SBLBDSP)'
END
 "ISPEXEC TBCREATE XTB NAMES(T0 T1 T2),NOWRITE, SHARE"
 ROWCNT=ZTDSELS
 DO IX=1 TO ROWCNT
   VTBA.IX.1=T0
   VTBA.IX.2=T1
   VTBA.IX.3=T2
   'ISPEXEC CONTROL NONDISPL'
   'ISPEXEC TBDISPL MAXTB'
 END
 DO IX=1 TO ROWCNT
   OPTTYPE=VTBA.IX.1
   BUINAM =VTBA.IX.2
 END
ADDRESS ISPEXEC
'ISPEXEC VPUT (BUINAM)'
CALL BDSQCOPY
CALL SBLJBBDS
RETURN
INSRT_REC:
  NBLD = SUBSTR(T1,1,6)||SUBSTR(T2,1,8)
  SAY 'NBLD' NBLD
"ALLOC FI(INSEQ)  DA("||INSEQ||") MOD"
push NBLD
 "EXECIO 1 DISKW INSEQ"
'EXECIO 0 DISKW INSEQ (FINIS '
'FREE FI(INSEQ)'
RETURN
DLT_REC:
SAY 'WITHIN DLT_REC'
"ALLOC FI(INSEQ)  DA("||INSEQ||") OLD"
LCTR=0
DO WHILE EOF=0
LCTR = LCTR + 1
"EXECIO 1 DISKR INSEQ "
EOF=RC
PULL LINE1
IF BUINAM1 = SUBSTR(LINE1,1,6) THEN
 LEAVE
ELSE
 ITERATE
END
"EXECIO 1 DISKRU INSEQ "
PULL LINE
NBLD1 = SUBSTR(T1,1,6)||SUBSTR(T2,1,8)||'D'
PUSH NBLD1
"EXECIO 1 DISKW INSEQ "
"EXECIO 1 DISKW INSEQ (FINIS "
"FREE F(INSEQ)"
RETURN
POP_TBL:
DROP X.
TRKLINE = ''
"ALLOC FI(INSEQ)  DA("||INSEQ||") SHR REUS"
'EXECIO 1 DISKR INSEQ(STEM X. '
EOF=RC
/*' ISPEXEC TBVCLEAR MAXTB'*/
DO WHILE EOF=0
  SAY 'WITHIN LOOP'
  PARSE VAR X.1 TRKLINE
  TRKLINE=STRIP(TRKLINE)
  T0='_'
  T1=SUBSTR(TRKLINE,1,6)
  T2=SUBSTR(TRKLINE,7,8)
  CALL TBADD_BLDDTL

"EXECIO 1 DISKR INSEQ (STEM X."
EOF=RC
END
'EXECIO 0 DISKW INSEQ (FINIS '
'FREE FI(INSEQ)'
RETURN


Re: "A foolish consistancy" or "3390 cyl/track architecture"

2009-04-01 Thread Walt Farrell
On Tue, 31 Mar 2009 12:50:16 -0500, Eric Bielefeld 
wrote:
>Thanks for clearing up how the current drives actually work.  It just seems
>like IBM could get away from the track and cylinder stuff, which
>artificially restricts the amount of storage you use.  If you use short
>blocksizes, or long ones that just go over 1/2 track, you waste an awfull
>lot of space.  Of course, well written SMS routines can correct that, but it
>still makes things a lot more complicated than it should be.

Perhaps I don't understand your point, Eric, but from the user perspective
aren't things simple already? Just let the system pick the block size, and
while you're at it allocate the space in terms meaningful to the
user/application: megabytes or records.

Thus, the only things that -should- be affected by the cylinder/head
architecture are programs, and it's a lot simpler to leave them alone than
it is to have to change them.  Remember it's not just IBM code that would
have to change.  Many vendors and customers have written code that knows and
depends on the cylinder/head architecture.

-- 
  Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: OSA-ICC Concerns

2009-04-01 Thread R.S.

Laine, Rogers pisze:

We are looking to install two OSA cards to support two ICC OSC ports to
handle our remote consoles.
We have a z890 installed and my concern is when the CE applies
maintenance to the OSC will this interrupt these active consoles?
Are these OCS ports handled any differently from the OSD's in regard to
maintenance by CE?
Since I will have two OSC I can plan for the outage (if it exists) on
one while running off the other.


You will have an outage.
However:
1. You can decide when it happens.
2. You want to have 2 OSC chpids. In this case you can define 2 sets of 
console/terminal sessions and simply change the consoles.

Short procedure:
on every LPAR console A is currently in use
on every LPAR start console B session (VARY ccuu,console is needed)
on every LPAR switch master console to B (VARY ccuu,mstcons) - things 
changed since zOS 1.9

on every LPAR switch A console offline (VARY ccuuA,OFFLINE)
...and vice versa.

--
Radoslaw Skorupka
Lodz, Poland


--
BRE Bank SA
ul. Senatorska 18
00-950 Warszawa
www.brebank.pl

Sd Rejonowy dla m. st. Warszawy 
XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, 
nr rejestru przedsibiorców KRS 025237

NIP: 526-021-50-88
Wedug stanu na dzie 01.01.2009 r. kapita zakadowy BRE Banku SA (w caoci 
wpacony) wynosi 118.763.528 zotych. W zwizku z realizacj warunkowego 
podwyszenia kapitau zakadowego, na podstawie uchway XXI WZ z dnia 16 marca 
2008r., oraz uchway XVI NWZ z dnia 27 padziernika 2008r., moe ulec 
podwyszeniu do kwoty 123.763.528 z. Akcje w podwyszonym kapitale zakadowym 
BRE Banku SA bd w caoci opacone.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


SAP on System z

2009-04-01 Thread Ceruti, Gerard G
Rather than hijack the thread

Hot off the Redbooks press

SAP on DB2 9 for z/OS: Implementing Application Servers on Linux for
System z

http://www.redbooks.ibm.com/Redbooks.nsf/RedbookAbstracts/sg246847.html?
Open



Regards
Gerard Ceruti
may the 'z' be with you

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Timothy Sipples
Sent: 01 April 2009 08:09
To: IBM-MAIN@bama.ua.edu
Subject: Re: Another One Bites the Dust

SAP runs extremely well on System z. (Highest QoS SAP implementation you
can get, as a matter of fact.) Something called the SAP Central Instance
runs on z/OS, and SAP application modules run on Linux on System z. SAP
exploits zIIPs and DB2 9.

Again, I don't know why people (not here, usually) confuse hardware
platforms with applications. Truly puzzling.

- - - - -
Timothy Sipples
IBM Consulting Enterprise Software Architect
Based in Tokyo, Serving IBM Japan / Asia-Pacific
E-Mail: timothy.sipp...@us.ibm.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html
_

Standard Bank email Disclaimer and confidentiality note

This e-mail, its attachments and any rights attaching hereto are, unless the 
content clearly indicates otherwise, the property of 
Standard Bank Group Limited and its subsidiaries. It is confidential, private 
and intended for only the addressee. 

Should you not be the addressee and receive this e-mail by mistake, kindly 
notify the sender, and delete this e-mail immediately.
Do not disclose or use it in any way. Views and opinions expressed in this 
e-mail are those of the sender unless clearly stated as 
those of Standard Bank Group. 

Standard Bank Group accepts no liability for any loss or damages howsoever 
incurred, or suffered, resulting, or arising, 
from the use of this email or its attachments. 

Standard Bank Group does not warrant the integrity of this e-mail nor that it 
is free of errors, viruses, interception or interference. 

Licensed divisions of the Standard Bank Group are authorised financial services 
providers in terms of the Financial Advisory and 
Intermediary Services Act, No 37 of 2002 (FAIS).

For information about the Standard Bank Group visit our website 
http://www.standardbank.com


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Regarding using a variable as line number for updating a sequential file using EXECIO DISRU

2009-04-01 Thread Gary Threadgold
sabarish kannan  on 2009-04-01 at 09:53 wrote:
>Hi
>
> I have a situation in a TSO REXX pgm, where i will not be knowing the
>linenum which is being updated, before hand.It will be known only at
>runtime. So i have setup a counter which gets incremented and when the
>condition gets satisfied for updating a row in a sequential file i try to
>use a command like below
>
>"EXECIO 1 DISKRU INSEQ LCTR"
>
>Where LCTR is the line counter. But it gives a error saying the line can be
>number or should not be provided. How can we try using a variable ? Any
>tips.
>
>thanks
>Sabarish

Hi Sabarish,
You'll need to move your counter variable outside the quotes:

"EXECIO 1 DISKRU INSEQ" lctr

Regards,
Gary.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Regarding using a variable as line number for updating a sequential file using EXECIO DISRU

2009-04-01 Thread sabarish kannan
Hi

 I have a situation in a TSO REXX pgm, where i will not be knowing the
linenum which is being updated, before hand.It will be known only at
runtime. So i have setup a counter which gets incremented and when the
condition gets satisfied for updating a row in a sequential file i try to
use a command like below

"EXECIO 1 DISKRU INSEQ LCTR"

Where LCTR is the line counter. But it gives a error saying the line can be
number or should not be provided. How can we try using a variable ? Any
tips.

thanks
Sabarish

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html