Re: Why are TSO IDs limited to 7 characters

2010-11-06 Thread Tony Harminc
On 5 November 2010 21:58, John McKown  wrote:

> I really wonder how hard this would be. But I don't know everywhere the
> TSO id is stored. In the few places that I have found, it seems that the
> ID field is defined as CL7, but there always seems to be a FL1 field
> next to it to store the length. Seems to me that the length field could
> be used to store the 8th character for 8 character IDs. Since a RACF id
> can only have A-Z 0-9 $...@# as a valid character. And the lowest hex value
> of these is the $ at x'5B', then if the "length" field is >x'07', it
> must be the last character of the ID and the length of the ID must be 8.
> If it is <= x'07', then the field still contains the ID length. Granted,
> clumsy to implement, but seems like it will fit in the number of bytes
> generally available.

Sure, but all existing software that trusts that length byte is going
to fail, quite possibly with Very Bad consequences.

Tony H.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


REDBOOKS Question

2010-11-06 Thread Ed Gould
I have forgotten the answer to this question long ago and I am not coming up 
with any answer to my question to myself.I will pose it to the group and see if 
anyone on here knows the answer.I am trying to remember how IBM handles it if 
there is an error (or poorly written or whatever error) happens with REDBOOKS.
Are they quietly updated (and if so) is there a new dash number or is there a 
completely new number assigned  or how does IBM handle updates to any REDBOOKS? 
I know there are errors as long time ago (30+ years) I used to see them with 
TNL's (we all remember those right?) but I do not remember how IBM handles them 
currently. Anyone?




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why are TSO IDs limited to 7 characters

2010-11-06 Thread Ed Gould
I am coming late into this thread and did not see the original post.So I will 
pipe up and then let others comment. Back in MVT days UADS (technically it 
still is) UADS was a PDS and the member name in UADS was limited to 8 
characters. In UADS there was a variable length section(s) in each section 
there was (IIRC) room for a 44(?) character accounting code also password and 
region size and procedure name. This was OK except sometimes when you added 
another accounting field, proc name and region size and password the entry 
would grow. UADS had a blocksize max of 800 (IIRC) so when the blocksize went 
over 800 the system would create another userid and add a "1" to the end.so if 
you id was 7 chracters the 8th character was reserved for the rest of the 
password/accounting etc info. It was clever (I thought).  We were lucky as all 
of our ID's at the time aere 3 or 5 caracters (with 1 exception IIRC).
Ed


--- On Sat, 11/6/10, J R  wrote:

From: J R 
Subject: Re: Why are TSO IDs limited to 7 characters
To: IBM-MAIN@bama.ua.edu
Date: Saturday, November 6, 2010, 1:29 PM

No.  I have no problem with TSO EDIT.  

 
> Date: Sat, 6 Nov 2010 14:23:01 -0400
> From: ibm...@woodsway.com
> Subject: Re: Why are TSO IDs limited to 7 characters
> To: IBM-MAIN@bama.ua.edu
> 
> On Friday 05 November 2010 16:46, Shmuel Metz (Seymour J.) wrote:
> > In ,
> > on 11/05/2010
> >
> > at 09:46 AM, "Roach, Dennis (N-GHG)"  said:
> >
> > >Try the TSO EDIT command from ready some time.
> >
> > I have.
> >
> > >Make you like vi.
> >
> > No.
> 
> Yes.
               
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html





--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IDCAMS ALTER and GDGs - From A(0) to B(+1) - Relative Generations

2010-11-06 Thread R.S.

Scott Barry pisze:

If a tape dataset name is 17 characters or longer (and the last 17
characters do not change), I believe that it can be renamed, using a DEFINE
NVSAM command (with DEVTYPE, VOLUMES and optionally FSEQN), along with the
requisite DELETE '' NOSCRATCH command.  At least with CA-1, there are
TMC update utilities TMSUPDTE and TMSUDSNB ("restricted use" though), as
well, to consider using with this activity, where any DSN length is a
candidate for change.


Well, in this case last 17 characters do contain GoooVoo.
All the commands above do change catalog and/or TMS entry, but not 
physical DSN recorded on tape in the HDR label. Inconsistence between 
label and JCL DD could lead to x13 abend (813 AFAIR). Maybe CA-1 could 
help here, but I'm not sure, guess that no.



IMHO the solution would be:
a) Leave it as it is.
b) Change the process. Eliminate the need. Maybe it's much simpler than 
tweaking with dsnames.



--
Radoslaw Skorupka
Lodz, Poland


--
BRE Bank SA
ul. Senatorska 18
00-950 Warszawa
www.brebank.pl

Sd Rejonowy dla m. st. Warszawy 
XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, 
nr rejestru przedsibiorców KRS 025237

NIP: 526-021-50-88
Wedug stanu na dzie 16.07.2010 r. kapita zakadowy BRE Banku SA (w caoci 
wpacony) wynosi 168.248.328 zotych.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Rexx question - Dynamic generation of variables?

2010-11-06 Thread John McKown
On Sat, 2010-11-06 at 18:26 -0500, Paul Gilmartin wrote:
> On Sat, 6 Nov 2010 16:58:47 -0500, John McKown wrote:
> >
> >I think of a REXX stem variable the same way that I do an Perl hash. Or
> >more like a value associated with a "key" where the key is an arbitrary
> >value. And a stem.var1.var2 is like a hash of a hash in Perl.
> >
> If I understand what you mean by "hash of a hash", I believe not.
> As I posted yesterday:
> 
> Beware the pitfall.  If:
> 
> W = 'a.b'
> X = 'c'
> Y = 'a'
> Z = 'b.c'
> 
> then Stem.W.X and Stem.Y.Z refer to the same member of the
> compound, regardless that none of the subscripts are equal.
> 
> Multiple subscripts are flattened, in a possibly degenerate manner.
> 
> -- gil
> 
> --

Ouch. I didn't realize that. I must have missed some of the previous
posts.

-- 
John McKown
Maranatha! <><

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IDCAMS ALTER and GDGs - From A(0) to B(+1) - Relative Generations

2010-11-06 Thread Robert A. Rosenberg
At 09:53 -0500 on 11/06/2010, Scott Barry wrote about Re: IDCAMS 
ALTER and GDGs - From A(0) to B(+1) - Relative G:



If a tape dataset name is 17 characters or longer (and the last 17
characters do not change), I believe that it can be renamed, using a DEFINE
NVSAM command (with DEVTYPE, VOLUMES and optionally FSEQN), along with the
requisite DELETE '' NOSCRATCH command.  At least with CA-1, there are
TMC update utilities TMSUPDTE and TMSUDSNB ("restricted use" though), as
well, to consider using with this activity, where any DSN length is a
candidate for change.

Scott Barry
SBBWorks, Inc.


Interestingly the fact that only the LAST 17 characters of a 18-44 
character dataset name are stored in a TAPE HDR1/EOF1/EOV1 label 
allows the dataset to be renamed and still be acceptable so long as 
the last 17 remain constant and the 1-27 character prefix is changed. 
For GDGs, the .GVyy is stored as the last 9 characters leaving 
only 8 characters of the actual name for comparing to the supplied 
18-44 character DSN. Since the Gxxx and Vyy are replicated as 
separate fields in the labels, IN THEORY, for 18-27 character GDG 
names the name could fully be stored in the labels by storing the 
1-17 character GDG Base Name in the DSN area and the G and Vyy 
values in their dedicated fields thus closing this loophole for under 
26 character long GDG Dataset Names stored on Tape.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why are TSO IDs limited to 7 characters

2010-11-06 Thread Edward Jaffe

On 11/6/2010 12:17 PM, Paul Gilmartin wrote:

On Sat, 6 Nov 2010 14:27:26 -0400, J R wrote:


Good point.  However, update-in-place really only *need* be done during the 
user's session to record profile changes, etc.

Extending the member should only be necessary when the ACCOUNT command is 
adding segments, in which case it shoul be opened for output and recreate the 
entire member.


... which leaves unused space in the PDS.  If you do this enough times
you run out.  Then what do you do?


This is exactly how ISPF profiles work. They place PAD records (the actual 
characters P-A-D) at the end of the member to leave room for expansion. They 
update the member in place whenever possible. When not possible, they write a 
new member with a new PAD area. Standard PDS processing applies. If the library 
gets full, it allocates new extents. When no more extents exist, a compress is 
necessary. In practice, with this design philosophy the compress is almost never 
necessary.


--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
310-338-0400 x318
edja...@phoenixsoftware.com
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Rexx question - Dynamic generation of variables?

2010-11-06 Thread Paul Gilmartin
On Sat, 6 Nov 2010 16:58:47 -0500, John McKown wrote:
>
>I think of a REXX stem variable the same way that I do an Perl hash. Or
>more like a value associated with a "key" where the key is an arbitrary
>value. And a stem.var1.var2 is like a hash of a hash in Perl.
>
If I understand what you mean by "hash of a hash", I believe not.
As I posted yesterday:

Beware the pitfall.  If:

W = 'a.b'
X = 'c'
Y = 'a'
Z = 'b.c'

then Stem.W.X and Stem.Y.Z refer to the same member of the
compound, regardless that none of the subscripts are equal.

Multiple subscripts are flattened, in a possibly degenerate manner.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Rexx question - Dynamic generation of variables?

2010-11-06 Thread John McKown
On Sat, 2010-11-06 at 16:04 -0500, Joel C. Ewing wrote:
> I believe that REXX only directly supports one of those two mechanisms, 
> namely the symbol table lookup and not true indexed arrays.  Although 
> one may use in a REXX program "symbol.ix", where ix in that particular 
> program is always a positive numeric integer, I would think this only 
> gives the illusion of an indexed array and not the reality, since an 
> interpreter like REXX cannot assume that later stem arguments will 
> continue to be numeric, and also "symbol.1" is distinct from "symbol.001".
> 
> The distinction that John draws is not really related to the number of 
> dimensions involved or to the concept that a multi-variate function may 
> be re-conceptualized as a single-variate function whose domain is a set 
> involving a product of the original domains.  The distinction made is 
> rather one of whether the original variable domains consist of 
> consecutive integer values or not.  If so, the process of locating and 
> retrieving values can be done much more cheaply by offset calculation.
> 
> Indexed lookup is definitely more efficient, and simpler techniques can 
> be used to implement it -- and this may affect the contexts in which 
> each approach is best used or even practical.  But, functionally, 
> indexed arrays are just a special subset of symbol table lookup:  where 
> the symbol values (consecutive integers) are so predictable they need 
> not be stored, the hashing function to locate an entry is the simple 
> offset calculation previously indicated, and collisions with conflicting 
> symbols are known to be impossible.
> Joel C Ewing

I think of a REXX stem variable the same way that I do an Perl hash. Or
more like a value associated with a "key" where the key is an arbitrary
value. And a stem.var1.var2 is like a hash of a hash in Perl.
-- 
John McKown
Maranatha! <><

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Rexx question - Dynamic generation of variables?

2010-11-06 Thread Joel C. Ewing
I believe that REXX only directly supports one of those two mechanisms, 
namely the symbol table lookup and not true indexed arrays.  Although 
one may use in a REXX program "symbol.ix", where ix in that particular 
program is always a positive numeric integer, I would think this only 
gives the illusion of an indexed array and not the reality, since an 
interpreter like REXX cannot assume that later stem arguments will 
continue to be numeric, and also "symbol.1" is distinct from "symbol.001".


The distinction that John draws is not really related to the number of 
dimensions involved or to the concept that a multi-variate function may 
be re-conceptualized as a single-variate function whose domain is a set 
involving a product of the original domains.  The distinction made is 
rather one of whether the original variable domains consist of 
consecutive integer values or not.  If so, the process of locating and 
retrieving values can be done much more cheaply by offset calculation.


Indexed lookup is definitely more efficient, and simpler techniques can 
be used to implement it -- and this may affect the contexts in which 
each approach is best used or even practical.  But, functionally, 
indexed arrays are just a special subset of symbol table lookup:  where 
the symbol values (consecutive integers) are so predictable they need 
not be stored, the hashing function to locate an entry is the simple 
offset calculation previously indicated, and collisions with conflicting 
symbols are known to be impossible.

   Joel C Ewing

On 11/06/2010 02:06 PM, john gilmore wrote:

Joel Ewing wrote:

| This technique in effect maps any number of dimensions to a single dimension.

and there is an important functional sense in which his statement is correct; 
but 1)
 it confounds two very different mechanisms, 2) it is not a scheme 
specific to REXX,

and 3) these two mechanisms have their own distinct, non-overlapping uses.


Let us look first at subscripting, specifically at a one-dimensional, 
eight-element single-byte

 array having what I shall call the identifier x,

|0|1|2|3|4|5|6|7|

Suppose now that we wish to access element i,  0<= i<= 7 of x.  If the address 
of

this array is addr(x) then the address of its i-th element is just>

addr(x) + i.

If  now we consider another, two-dimensional, 2 x 4, eight-element single-byte 
array having the identifier y,>
|0,0|0,1|0,2|0,3|1,0|1,1|1,2|1,3|>
the address of its element having the subscripts i, j is just

addr(y) + j + (i - 1)4

Here  eight bytes of storage can be viewed as a one-dimensional array, as a 
two-dimensional one,
or, on occasion, as both.  The location of an element of a one-, two-, 
or n-dimensional array
is determined arithmetically.  (For simplicity I have made these 
elements single-byte ones
that are stored in zero-origin, row-major sequence.  Some arrays are 
one-origin ones; most
have elements more than a single byte in length, and some FORTRAN 
dialects still store arrays
 in column-major order; but these differences are trivial.)  What is 
important is that
subscripting uses numeric function.  Its argumet is a set of one or more 
subscripts and
its value is an address.  All subscripting schemes are devices for 
viewing a one-dimensional

sequence of storage locations as a multidimensional one.


Historically, identifiers or variable names were specified at program-writing 
time,
but they can also be created at program-execution time.  One needs a 
table of
identifiers--It is/was often called a symbol table--and a convention for 
specifying/identifying

 the value of an identifier.


In the IBM HLASM macro language, for example, ordinary set symbols have names 
like
counter,&switch, or&abort that are given to them at program-writing 
time.  They can
 also be created later, and these created set symbols are distinguished 
from ordinary

set symbols using an extra set of parentheses.  Thus


|&name0setc'gubbins'  --set-symbol identifier
|gblc&(&name0) --created set symbol

Encoumntering these statements, the HLASM macro processor loks in its symbol 
table
for the identifier 'gubbins'.  If it finds that identifier, its value is 
used.

If not a created global set symbol is added to the appropriate symbol table.


We can do much more interesting things too. Consider

|&name1setc  'name0'.'&sex'.'&age'|
  gblc&(&name1)

where&sex is always either 'M' or 'F' and&age is always one of '000', '001', 
'002', . . . , '999'.

If then on some occasion&name1 has the value 'gubbinsM024' we ca view the 
statement

|&name1   seta&(&name1)+1

as incrementing the count of 24-year-old males in some population.  In 
practical terms
 this is much is scheme is very similar to one that uses a 2 x 1000 
array, but the mechanism
 used to implement it is very different: ituses not subscripting but a 
large number of
scalar identifiers that have an internal, decodable structure like that 
of a part nu

Re: Tivoli Storage Manager for z/OS (Functionally Stablized & Impending Demise)

2010-11-06 Thread Stephen Mednick
Elaborating on Sam's response below, users of TSM for z/OS users may well be
lamenting IBM's decision and continue to maintain a strong belief in the
strengths of the mainframe as a backup server by  being able to exploit
z/OS's strengths of job scheduling, tape management and system security for
the backing up of Open Systems data. 

As Sam has mentioned, users wanting to continue using the mainframe as a
backup server because of its inherent strengths and stability should take a
look at Innovation Data Processing's family of FDR/UPSTREAM solutions
especially if running Linux on System z. There are many user success stories
around and perhaps some of those users might respond to this thread. 

Sites with either IBM DS8700/DS8800 storage systems or EMC's SYMMETRIX/V-MAX
systems, can also enjoy high-speed LAN-free backups using a FICON connection
achievable with UPSTREAM/SOS.  Furthermore, IBM recently released its
Distributed Data Backup (DDB) for the DS8700 platform which is fully
exploited by USPTREAM/SOS.

Check the following links:

http://www.innovationdp.fdr.com/products/upstream/

http://www.innovationdp.fdr.com/products/fdrsos/


Stephen Mednick
Computer Supervisory Services
Sydney, Australia
 
Asia/Pacific representatives for
Innovation Data Processing, Inc.





Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf
Of Knutson, Sam
Sent: Sunday, 7 November 2010 1:50 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Tivoli Storage Manager for z/OS (Functionally Stablized &
Impending Demise)

If IBM cannot or will not support z/OS in this roll there are good third
party software vendors who do like Innovation.
This will preserve your investment in z/OS and maintain the z/OS qualities
of service and economies of scale you have today.

http://www.fdr.com/products/upstream/index.cfm 

http://www.fdr.com/products/upstreamunix/

http://www.fdr.com/index.cfm 


Best Regards, Sam Knutson 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Tivoli Storage Manager for z/OS (Functionally Stablized & Impending Demise)

2010-11-06 Thread Norman Hollander
I can't believe only 4 licenses for TSM. I'll check to see of there is 
something new coming out. 

New guy on Tivoli team
--Original Message--
From: Edward Jaffe
Sender: IBM Mainframe Discussion List
To: IBM-MAIN@bama.ua.edu
ReplyTo: IBM Mainframe Discussion List
Subject: Re: Tivoli Storage Manager for z/OS (Functionally Stablized & 
Impending Demise)
Sent: Nov 6, 2010 5:41 AM

On 11/5/2010 5:38 AM, Jim Marshall wrote:
> Question - 1:
>
> "SO" I would like to know who are the other four people who had a similar idea
> about using TSM for z/OS, to be the data backup place in order to leverage all
> the good things z/OS has to offer.

I guess we're one of the other four. TSM for z/OS works great for us. It's 
hooked into our mainframe-based "cron" facilities, uses large DASD EAVs, uses 
the same tapes and drives that HSM uses--which get moved by RMM to the same 
off-site locations, etc. I really don't want to try to come up with an 
alternate 
PC and zFS file backup strategy...

-- 
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
310-338-0400 x318
edja...@phoenixsoftware.com
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



nor...@desertwiz.biz  
Sent from my Verizon Wireless BlackBerry

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Rexx quest ion - Dyna mic genera tion of va riables?‏

2010-11-06 Thread john gilmore
In my previous post

. . . have names like counter
 
should have been
 
. . . have names like &counter

John Gilmore Ashland, MA 01721-1817 USA

  

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why are TSO IDs limited to 7 characters

2010-11-06 Thread Paul Gilmartin
On Sat, 6 Nov 2010 14:27:26 -0400, J R wrote:

>Good point.  However, update-in-place really only *need* be done during the 
>user's session to record profile changes, etc.  
>
>Extending the member should only be necessary when the ACCOUNT command is 
>adding segments, in which case it shoul be opened for output and recreate the 
>entire member.  
>
... which leaves unused space in the PDS.  If you do this enough times
you run out.  Then what do you do?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Rexx question - Dynamic generation of variables?

2010-11-06 Thread john gilmore
Joel Ewing wrote:

| This technique in effect maps any number of dimensions to a single dimension. 
 
and there is an important functional sense in which his statement is correct; 
but 1) it confounds two very different mechanisms, 2) it is not a scheme 
specific to REXX, and 3) these two mechanisms have their own distinct, 
non-overlapping uses.  
 
Let us look first at subscripting, specifically at a one-dimensional, 
eight-element single-byte array having what I shall call the identifier x,
 
|0|1|2|3|4|5|6|7|
 
Suppose now that we wish to access element i,  0 <= i <= 7 of x.  If the 
address of this array is addr(x) then the address of its i-th element is just
 
addr(x) + i.
 
If  now we consider another, two-dimensional, 2 x 4, eight-element single-byte 
array having the identifier y,
 
|0,0|0,1|0,2|0,3|1,0|1,1|1,2|1,3|
 
the address of its element having the subscripts i, j is just
 
addr(y) + j + (i - 1)4
 
Here  eight bytes of storage can be viewed as a one-dimensional array, as a 
two-dimensional one, or, on occasion, as both.  The location of an element of a 
one-, two-, or n-dimensional array is determined arithmetically.  (For 
simplicity I have made these elements single-byte ones that are stored in 
zero-origin, row-major sequence.  Some arrays are one-origin ones; most have 
elements more than a single byte in length, and some FORTRAN dialects still 
store arrays in column-major order; but these differences are trivial.)  What 
is important is that subscripting uses numeric function.  Its argumet is a set 
of one or more subscripts and its value is an address.  All subscripting 
schemes are devices for viewing a one-dimensional sequence of storage locations 
as a multidimensional one.
 
Historically, identifiers or variable names were specified at program-writing 
time, but they can also be created at program-execution time.  One needs a 
table of identifiers--It is/was often called a symbol table--and a convention 
for specifying/identifying the value of an identifier.  
 
In the IBM HLASM macro language, for example, ordinary set symbols have names 
like counter, &switch, or &abort that are given to them at program-writing 
time.  They can also be created later, and these created set symbols are 
distinguished from ordinary set symbols using an extra set of parentheses.  Thus
 
|&name0setc'gubbins'  --set-symbol identifier
|gblc&(&name0) --created set symbol
 
Encoumntering these statements, the HLASM macro processor loks in its symbol 
table for the identifier 'gubbins'.  If it finds that identifier, its value is 
used.  If not a created global set symbol is added to the appropriate symbol 
table.
 
We can do much more interesting things too. Consider
 
|&name1setc  'name0'.'&sex'.'&age'|
 gblc  &(&name1)
 
where &sex is always either 'M' or 'F' and &age is always one of '000', '001', 
'002', . . . , '999'.
 
If then on some occasion &name1 has the value 'gubbinsM024' we ca view the 
statement
 
|&name1   seta  &(&name1)+1
 
as incrementing the count of 24-year-old males in some population.  In 
practical terms this is much is scheme is very similar to one that uses a 2 x 
1000 array, but the mechanism used to implement it is very different: ituses 
not subscripting but a large number of scalar identifiers that have an 
internal, decodable structure like that of a part number, insdurance-policy 
number or savings-account number, here some or all of
 
gubbinsF000,  gubbinsF001,  . . . , gubbinsF999, gubbinsM000, gubbinsM001, . . 
. , gubbinsM999.
 
Identifier-construction schemes like these are slower, much slower, than 
arithmetic subscripting; but if a table is sparsely populated, i.e., if only a 
few of the identifiers that a particular sceme makes possible are in fact used, 
they can be very useful.
 
They have another important use in both the HLASM and REXX.  They can be used 
to make data 'reentrant' in a Pickwickian but important sense.  In certain 
HLASM table-generation macros, for example,  I accumulate information in sets 
of global set symbol of the form
 
|&valueid setc '&macname'.'&tabname'.''
|  gblc   &(&valueid)(1)
 
and the use of this scheme permits two, three, or n different tables of the 
same sort but having different tabname= values to be assembled concurrently: 
the data for table alpha are distinguishable and distinguished from the data 
for table delta because 'alpha' and 'delta'  appear as positional substrings in 
the different, non-overlapping identifiers of their data.Table-generation 
macros that use this scheme are reentrant in much the same sense in which 
procedures trhat use different blocks of automatic storage are reentrant. 
 
John Gilmore Ashland, MA 01721-1817 USA


  
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to 

Re: Why are TSO IDs limited to 7 characters

2010-11-06 Thread J R
No.  I have no problem with TSO EDIT.  

 
> Date: Sat, 6 Nov 2010 14:23:01 -0400
> From: ibm...@woodsway.com
> Subject: Re: Why are TSO IDs limited to 7 characters
> To: IBM-MAIN@bama.ua.edu
> 
> On Friday 05 November 2010 16:46, Shmuel Metz (Seymour J.) wrote:
> > In ,
> > on 11/05/2010
> >
> > at 09:46 AM, "Roach, Dennis (N-GHG)"  said:
> >
> > >Try the TSO EDIT command from ready some time.
> >
> > I have.
> >
> > >Make you like vi.
> >
> > No.
> 
> Yes.
  
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why are TSO IDs limited to 7 characters

2010-11-06 Thread J R
Good point.  However, update-in-place really only *need* be done during the 
user's session to record profile changes, etc.  

Extending the member should only be necessary when the ACCOUNT command is 
adding segments, in which case it shoul be opened for output and recreate the 
entire member.  

 
> Date: Sat, 6 Nov 2010 10:45:08 -0500
> From: paulgboul...@aim.com
> Subject: Re: Why are TSO IDs limited to 7 characters
> To: IBM-MAIN@bama.ua.edu
> 
> On Sat, 6 Nov 2010 11:06:09 -0400, J R wrote:
> 
> >I'm not sure I buy this highly speculative explanation. 
> >
> >There's a big difference between not allowing multiple blocks per member and 
> >not considering second blocks to be necessary. Furthermore, to "solve" the 
> >problem by introducing multiple members per userid, rather than multiple 
> >blocks per member, defies credibility. 
> >
> I'm highly speculating about the possibility of update-in-place. If
> UADS management employs update-in-place, the only way to extend a
> member is to introduce an overflow member.
> 
> -- gil
  
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why are TSO IDs limited to 7 characters

2010-11-06 Thread Bob Woodside
On Friday 05 November 2010 16:46, Shmuel Metz (Seymour J.) wrote:
> In ,
> on 11/05/2010
>
>at 09:46 AM, "Roach, Dennis (N-GHG)"  said:
>
> >Try the TSO EDIT command from ready some time.
>
> I have.
>
> >Make you like vi.
>
> No.

Yes.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IDCAMS ALTER and GDGs - From A(0) to B(+1) - Relative Generations

2010-11-06 Thread Martin Packer
Note: This ISN'T tape we're talking about. (I'm sorry I mentioned it in 
passing.)

Thanks for all the replies!

Martin Packer,
Mainframe Performance Consultant, zChampion
Worldwide Banking Center of Excellence, IBM

+44-7802-245-584

email: martin_pac...@uk.ibm.com

Twitter / Facebook IDs: MartinPacker





Unless stated otherwise above:
IBM United Kingdom Limited - Registered in England and Wales with number 
741598. 
Registered office: PO Box 41, North Harbour, Portsmouth, Hampshire PO6 3AU






--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Processing Compressed SMF Records with MXG

2010-11-06 Thread Barry Merrill
I changed the subject from the How Log For SMF to Switch
to answer the question posed in that thread 
with regard to MXG and it's handling of compressed SMF
records from CICS and (new in V10) DB2:

For sites executing on z/OS, MXG 28.07 provides
the ASM code in member EXITCICS to create a SAS
"Infile" Exit that decompresses the SMF 110-1
CICS records and the SMF 100,101, and 102 DB2
records, transparently, once the load module is 
created and stored in a STEPLIB, and MXG is 
informed the exit exists with
 //SYSIN DD *
 %LET SMFEXIT=CICS; 
to enable MXG to use that decompression infile exit.

In addition, if the infile exit is not installed
on z/OS, or if MXG is executed on ASCII SAS 
(which does not provide "Infile Exits"),
the compressed records are transparently processed
using an internal SAS code algorithm, which,
unfortunately is VERY CPU EXPENSIVE on z/OS.
  (So expensive MXG prints ERROR messages when
   the internal algorithm is used on z/OS where
   the EXITCICS algorithm should be used.)

On z/OS, for CICS, the IBM utility DFH$MOLS will 
decompress the SMF 110 subtype 1 records, but 
there is (at present) no IBM utility that decompresses
the DB2 V10 SMF records.

The below note from the NEXT MXG NEWSLETTER
www.mxg.com/newsltrs
compares processing of compressed CICS SMF records.


Barry Merrill

Herbert W. Barry Merrill, PhD
President-Programmer
Merrill Consultants
MXG Software
10717 Cromwell Drive
Dallas, TX 75229

 ba...@mxg.com
 http://www.mxg.com
   admin questions:   ad...@mxg.com
   technical questions:  supp...@mxg.com
 tel: 214 351 1966
 fax: 214 350 3694





 1.  Processing Compressed CICS data on z/OS and on Windows.

 An SMF file of 125,712 ID=110 records that created 267,899 CICSTRAN
 transactions was 212 MB when IBM Compression was enabled, and was
 970 MB when uncompressed by the IBM utility DFH$MOLS.  The example
 JCL for CICS decompression is in new DFH$MOLS member in MXG 28.06.

 On z/OS, three alternatives exist to process compressed CICS data:

 a. Use DFH$MOLS first to uncompress the file and read UNCOMPRESSED.
 b. Use EXITCICS (SAS Infile Exit) to read COMPRESSED WITH EXIT.
 c. Use MXG's internal SAS code to read COMPRESSED WITH INTERNAL.

   Average 7 runs:ElapsedTCBSRB   EXCP  Connect  Size
   (min)(min)  (min) (sec)

  a. DFH$MOLS.8  .07.00   53158   11.2  212/970
 UNCOMPRESSED   2.0  .62.01   47934   11.3   970 MB
 total  2.8  .69.01  101092   22.5

  b. COMP WITH EXIT 2.3  .70.00   145495.7   212 MB

  c. INTERNAL SAS  22.4 9.88.00   145545.7   212 MB

  As previously reported, the INTERNAL SAS algorithm on z/OS is VERY
  CPU intensive (and it takes a long time, too!).  DFH$MOLS and read
  UNCOMPRESSED is only slightly slower than reading COMPRESSED+EXIT,
  but the uncompressed file needs nearly 5 times the disk space for
  the (temporary) uncompressed file, and I/O activity with DFH$MOLS
  (read compressed, write uncompressed, then read uncompressed) took
  six times the EXCPs and four times the IOTM (Connect Time), so the
  reading of the compressed file with the EXITCICS exit is best.

 On Windows/ascii platforms, SAS Infile Exits do not exist (and, if
 they existed, the ASM code in EXITCICS couldn't execute on ASCII),
 so if the SMF data file is downloaded and then processed, there are
 only two ways to process compressed CICS data:

 a. Use DFH$MOLS first to uncompress the file and read UNCOMPRESSED.
 c. Use MXG's internal SAS algorithm to read COMPRESSED NO EXIT.

 Elapsed User   SYSSize
  a. DFH$MOLS.4  .07.00   212/970
 ftp download   2.0  .04.00970 MB
 UNCOMPRESSED.4  .23.05970 MB
   total2.8  .34.05

  c. ftp download   2.0  .04.00212 MB
 INTERNAL SAS   3.8 2.71.05212 MB
   total5.8 2.75.05

The internal algorithm on Windows is only ten times as CPU intensive
reading the compressed file, compared to reading uncompressed, but
a lot more disk space is needed for the uncompressed file.

Unfortunately, at this test site, we were not able to use the SAS
ftp access method on ASCII to read the uncompressed and compressed
files directly from z/OS, without download, for that comparison, but
prior tests using the access method to directly read z/OS files have
always been cheaper and faster than reading the downloaded files, so
I would expect that if you can tolerate the temporary disk space on
z/OS for the uncompressed file, using DFH$MOLS first would be best.

--
For IBM-MAIN subscribe

PDOS/390

2010-11-06 Thread Paul Edwards
I've just uploaded a new version of PDOS/390 here:

http://sourceforge.net/projects/pdos/files/pdos/pdos-stage67.zip/download

This beta is far better than previous betas, and is
actually good enough to allow GCC to self-compile
under it.

Obviously there's still a lot lacking, but that is
at least one real-world task that PDOS/390 can do.
And it does it with the natural filenames that GCC
uses by default too.

A lot of people downloaded the previous beta, but
no reports of anyone successfully using it on real
iron.  It should be in with a shot at working on real
iron so long as a telnet connection is used (ie it
doesn't support 3270 currently).

BFN.  Paul.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why are TSO IDs limited to 7 characters

2010-11-06 Thread Paul Gilmartin
On Sat, 6 Nov 2010 11:06:09 -0400, J R wrote:

>I'm not sure I buy this highly speculative explanation.  
>
>There's a big difference between not allowing multiple blocks per member and 
>not considering second blocks to be necessary.  Furthermore, to "solve" the 
>problem by introducing multiple members per userid, rather than multiple 
>blocks per member, defies credibility.  
>
I'm highly speculating about the possibility of update-in-place.  If
UADS management employs update-in-place, the only way to extend a
member is to introduce an overflow member.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Rexx question - Dynamic generation of variables?

2010-11-06 Thread Paul Gilmartin
On Sat, 6 Nov 2010 08:33:02 -0500, Joel C. Ewing wrote:
>
>Since the stem index is an arbitrary variable value, whenever I have
>needed a table lookup dependent on multiple variable values I have
>usually been able to use a construct like
>
>table. = 'some default value'
>...
>index = dsname "#" volser "#" lpar
>table.index = 'some value'
>
>and then use a similar setting of "index" before using "table.index" to
>lookup a value in the table.
>
>This technique in effect maps any number of dimensions to a single
>dimension.
>
Of course:

table.dsname.volser.lpar = 'some value'

is simpler.  I can imagine only two reasons for manufacturing
the index.

o The '.' character may appear in dsnames, allowing ambiguity.
  But it's still safe if neither of the other two tail components
  can contain '.'.  And since '#', like '.' can appear in dsnames,
  you gain nothing by using it as a delimiter.  Best use a
  delimiter that's prohibited in all tail components.  Even
  here there's a hazard.  JCL allows (or allowed a couple decades
  ago) any code point in a volser surrounded by apostrophes.
  In a POC back then, we discovered that a volser starting with
  x'FF' was taken as a special form where the remaining five
  bytes contained a memory address.  Strange program checks in
  label processing.

o Generating the tail separately allows NOVALUE signals, detecting
  possible undefined variables.  Explicit use of an undefined
  symbol in a compound tail does not signal NOVALUE.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IDCAMS ALTER and GDGs - From A(0) to B(+1) - Relative Generations

2010-11-06 Thread J R
With the nature of the last eight characters of a GDS name, the likelihood of 
it not changing between FILE1 and FILE2 is very low.  If the GDS is on tape, 
renaming is not an option.  

 
> Date: Sat, 6 Nov 2010 09:53:53 -0500
> From: sba...@sbbworks.com
> Subject: Re: IDCAMS ALTER and GDGs - From A(0) to B(+1) - Relative Generations
> To: IBM-MAIN@bama.ua.edu
> 
> If a tape dataset name is 17 characters or longer (and the last 17
> characters do not change), I believe that it can be renamed, using a DEFINE
> NVSAM command (with DEVTYPE, VOLUMES and optionally FSEQN), along with the
> requisite DELETE '' NOSCRATCH command. At least with CA-1, there are
> TMC update utilities TMSUPDTE and TMSUDSNB ("restricted use" though), as
> well, to consider using with this activity, where any DSN length is a
> candidate for change.
> 
> Scott Barry
> SBBWorks, Inc.
> 
> 
> On Fri, 5 Nov 2010 14:37:21 -0700, Ulrich Krueger  wrote:
> 
> >Martin,
> >Unless something changed since the last time I looked at this ...
> >You cannot rename a dataset on tape.
> >1) Your tape management system probably wouldn't like it.
> >2) The physical tape label info can not be changed after the tape has been
> >created.
> >
> >AFAIK, your only way to "rename a tape dataset" is to copy it to a new tape.
> >
> >
> >Regards,
> >Ulrich Krueger
> >
> >-Original Message-
> >From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf
> >Of Martin Packer
> >Sent: Friday, November 05, 2010 12:54 PM
> >To: IBM-MAIN@bama.ua.edu
> >Subject: IDCAMS ALTER and GDGs - From A(0) to B(+1) - Relative Generations
> >
> >I'm looking at a customer batch job and they are rolling over 12 monthly
> >files by 1 - the oldest going off to another data set on tape. They are
> >doing this with ICEGENER copy steps. Each monthly file is a different GDG.
> >Rather than do the actual copying I'd like them to explore using some form
> >of rename.
> >
> >In this case it boils down to renaming FILE1(0) to FILE2(+1). IDCAMS ALTER
> >will do it with hardcoded generations and versions. I checked this and
> >that the structure of the target GDG was intact - by coding some JCL on my
> >own system.
> >
> >However, I'd prefer not to have to recommend absolute generations and
> >versions. Does anyone know how to do this with (0) and (+1)?
> >
> >Yes, I'm aware there may be some operational difficulties with this
> >approach - we didn't keep n generations this way. I'm not convinced the
> >customer actually wants to. I want to present them with options.
> >
> >Thanks, Martin
> >
> >Martin Packer,
  
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why are TSO IDs limited to 7 characters

2010-11-06 Thread J R
I'm not sure I buy this highly speculative explanation.  

There's a big difference between not allowing multiple blocks per member and 
not considering second blocks to be necessary.  Furthermore, to "solve" the 
problem by introducing multiple members per userid, rather than multiple blocks 
per member, defies credibility.  

At best, this is a non sequitur.  The OP's question was, "Why are TSO IDs 
limited to 7 characters?"  The explanation given relies on the fact that the 
userid was already defined as less than eight characters.  

I used TSO under MVT in the early '70s on 2741s (and SPF, but not on 2741s) and 
the notion that the seven character userid plus one byte length was 
specifically to make it fit in a doubleword seems a stretch.  Sitting at a 
2741, the response time was such that the thought that the code had been 
optimized in such detail never entered one's head.  

I agree that TSO still works extremely well today, so I'm not knocking its 
design.  However, if IBM were to increase the maximum userid length, a lot of 
40 year old software would stop working.  


 
> Date: Sat, 6 Nov 2010 08:01:46 -0600
> From: rfocht...@ync.net
> Subject: Re: Why are TSO IDs limited to 7 characters
> To: IBM-MAIN@bama.ua.edu
> 
> The original UADS dataset blksize was dictated by the DASD devices of 
> the time, which sometimes included track sizes of 2000 bytes (2321, for 
> example). The design of UADS and the code that used it would not allow 
> multiple blocks per member, because no second block was ever considered 
> necessary. Later, when the information content increased, the solution 
> implemented was multiple members, based on the seven-character (or less) 
> user id, suffixed with a numeric digit. The sequence always started with 
> zero and went up from there.
> 
> Also, some of the TSO control blocks contained the USERID length in the 
> first character, followed by up to a seven-character userid. Alignment 
> sensitivies required that this information all fit into a double-word, 
> so that succeeding fields in the block could be kept aligned and still 
> minimize the space required. Recall that the S/360, where TSO was 
> originally designed, was very sensitive to alignment issues and there 
> was no virtual storage to expand blocks, etc. S0C5 abends were quite 
> common, whereas they are almost unheard-of today.
> 
> Considering how old TSO really is, I'm surprised that it still works as 
> well as it does today, while still maintaining backward compatability. :-)
> 
> Rick
  
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: IDCAMS ALTER and GDGs - From A(0) to B(+1) - Relative Generations

2010-11-06 Thread Scott Barry
If a tape dataset name is 17 characters or longer (and the last 17
characters do not change), I believe that it can be renamed, using a DEFINE
NVSAM command (with DEVTYPE, VOLUMES and optionally FSEQN), along with the
requisite DELETE '' NOSCRATCH command.  At least with CA-1, there are
TMC update utilities TMSUPDTE and TMSUDSNB ("restricted use" though), as
well, to consider using with this activity, where any DSN length is a
candidate for change.

Scott Barry
SBBWorks, Inc.


On Fri, 5 Nov 2010 14:37:21 -0700, Ulrich Krueger  wrote:

>Martin,
>Unless something changed since the last time I looked at this ...
>You cannot rename a dataset on tape.
>1) Your tape management system probably wouldn't like it.
>2) The physical tape label info can not be changed after the tape has been
>created.
>
>AFAIK, your only way to "rename a tape dataset" is to copy it to a new tape.
>
>
>Regards,
>Ulrich Krueger
>
>-Original Message-
>From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf
>Of Martin Packer
>Sent: Friday, November 05, 2010 12:54 PM
>To: IBM-MAIN@bama.ua.edu
>Subject: IDCAMS ALTER and GDGs - From A(0) to B(+1) - Relative Generations
>
>I'm looking at a customer batch job and they are rolling over 12 monthly
>files by 1 - the oldest going off to another data set on tape. They are
>doing this with ICEGENER copy steps. Each monthly file is a different GDG.
>Rather than do the actual copying I'd like them to explore using some form
>of rename.
>
>In this case it boils down to renaming FILE1(0) to FILE2(+1). IDCAMS ALTER
>will do it with hardcoded generations and versions. I checked this and
>that the structure of the target GDG was intact - by coding some JCL on my
>own system.
>
>However, I'd prefer not to have to recommend absolute generations and
>versions. Does anyone know how to do this with (0) and (+1)?
>
>Yes, I'm aware there may be some operational difficulties with this
>approach - we didn't keep n generations this way. I'm not convinced the
>customer actually wants to. I want to present them with options.
>
>Thanks, Martin
>
>Martin Packer,
>Mainframe Performance Consultant, zChampion
>Worldwide Banking Center of Excellence, IBM
>
>+44-7802-245-584
begin_of_the_skype_highlighting  +44-7802-245-584  end_of_the_skype_highlighting
>
>email: martin_pac...@uk.ibm.com
>
>Twitter / Facebook IDs: MartinPacker
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Tivoli Storage Manager for z/OS (Functionally Stablized & Impending Demise)

2010-11-06 Thread Knutson, Sam
If IBM cannot or will not support z/OS in this roll there are good third
party software vendors who do like Innovation.
This will preserve your investment in z/OS and maintain the z/OS
qualities of service and economies of scale you have today.

http://www.fdr.com/products/upstream/index.cfm 

http://www.fdr.com/products/upstreamunix/

http://www.fdr.com/index.cfm 


Best Regards, Sam Knutson 


-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Edward Jaffe
Sent: Saturday, November 06, 2010 8:41 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Tivoli Storage Manager for z/OS (Functionally Stablized &
Impending Demise)

On 11/5/2010 5:38 AM, Jim Marshall wrote:
> Question - 1:
>
> "SO" I would like to know who are the other four people who had a
similar idea
> about using TSM for z/OS, to be the data backup place in order to
leverage all
> the good things z/OS has to offer.

I guess we're one of the other four. TSM for z/OS works great for us.
It's 
hooked into our mainframe-based "cron" facilities, uses large DASD EAVs,
uses 
the same tapes and drives that HSM uses--which get moved by RMM to the
same 
off-site locations, etc. I really don't want to try to come up with an
alternate 
PC and zFS file backup strategy...

-- 
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
310-338-0400 x318
edja...@phoenixsoftware.com
http://www.phoenixsoftware.com/


This email/fax message is for the sole use of the intended
recipient(s) and may contain confidential and privileged information.
Any unauthorized review, use, disclosure or distribution of this
email/fax is prohibited. If you are not the intended recipient, please
destroy all paper and electronic copies of the original message.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Tivoli Storage Manager for z/OS (Functionally Stablized & Impending Demise)

2010-11-06 Thread Anne & Lynn Wheeler
edja...@phoenixsoftware.com (Edward Jaffe) writes:
> I guess we're one of the other four. TSM for z/OS works great for
> us. It's hooked into our mainframe-based "cron" facilities, uses large
> DASD EAVs, uses the same tapes and drives that HSM uses--which get
> moved by RMM to the same off-site locations, etc. I really don't want
> to try to come up with an alternate PC and zFS file backup strategy...

... random trivia ... started as cmsback that I implemented in the late
70s for internal use. cmsback went thru several internal releases before
morphing into "workstation datasave" for product release. It then
morphed into ADSM ... adstar storage manager ... in the period of the
early 90s when the disk division was renamed (adstar) as part of
anticipation of being spun off as independent business. That decision
was reversed after new management was brought in (after the company had
gone into the red). However, later the disk business unit was sold off
... however ADSM morphed into TSM

tsm wiki page
http://en.wikipedia.org/wiki/IBM_Tivoli_Storage_Manager

old cmsback related email
http://www.garlic.com/~lynn/lhwemail.html#cmsback

one of the early cmsback adopters was HONE ... one of my favorite and
long-term internal customers for my highly modified operating systems.

-- 
virtualization experience starting Jan1968, online at home since Mar1970

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why are TSO IDs limited to 7 characters

2010-11-06 Thread Rick Fochtman

---


I used 2741 with TSO on SVS.

Line mode only.
ISPF did not exist. Its predecessor (SPF/PDF) required 3270.
All working from TSO READY.
Try the TSO EDIT command from ready some time. Make you like vi.
 



Also made RAX look ultra-modern.  :-)

Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why are TSO IDs limited to 7 characters

2010-11-06 Thread Rick Fochtman


I am quite convinced TSO was from a later period, after MVT and with 
3270 screens.


In the distant past, I used TSO on 2741 terminals, as well as 2260 "tubes"

Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why are TSO IDs limited to 7 characters

2010-11-06 Thread Rick Fochtman

--


This is a curiosity question sparked by another thread.
The limitation of 7 characters for TSO IDs has caused us extra work in the
past (we use IDs of 3-8 characters across the institution, but the mainframe
can't use the institutional IDs in part because of this limitation).

 


True, very true.  It's a cultural/environmental fact that IBM should
be sensitive to; it falls in the category of "Plays Well with Others".
IBM should even consider leapfrogging the competition and allowing
more than 8, such as 25 or 50, or even flexible upper limit.

I believe RACF will allow creating an OMVS segment with an 8-character
ID, compatible with prevalent institutional IDs.  What would happen if
a user with such an ID submitted a batch job, or issued the Rexx
"address TSO" instruction?

 


Originally, TSO/E user IDs were kept in the User Attribute Data Set
(UADS), a PDS.  User IDs with few attributes fit in a single member.
User IDs with many attributes overflow into multiple members.  The
member naming convention is USERIDn, where n is a digit from 0 (the
first member) to 9.  You can control when IDs overflow by changing the
block size; smaller block sizes split sooner, and larger ones split later.

TSO/E looks at all the USERIDn members when you log on to retrieve all
your user attributes.

   


I'm trying to imagine what could have limited the size of each
UADS member?  Was each member required to fit in one block?
Surely issuing a single FIND and multiple READS should have
been cheaper than concocting multiple member names and issuing
a FIND for each, then READs.

Was the processing sensitive to block boundaries, with the only
way to control the placement of block boundaries being creation
of artificial member boundaries?
 



The original UADS dataset blksize was dictated by the DASD devices of 
the time, which sometimes included track sizes of 2000 bytes (2321, for 
example). The design of UADS and the code that used it would not allow 
multiple blocks per member, because no second block was ever considered 
necessary. Later, when the information content increased, the solution 
implemented was multiple members, based on the seven-character (or less) 
user id, suffixed with a numeric digit. The sequence always started with 
zero and went up from there.


Also, some of the TSO control blocks contained the USERID length in the 
first character, followed by up to a seven-character userid. Alignment 
sensitivies required that this information all fit into a double-word, 
so that succeeding fields in the block could be kept aligned and still 
minimize the space required. Recall that the S/360, where TSO was 
originally designed, was very sensitive to alignment issues and there 
was no virtual storage to expand blocks, etc. S0C5 abends were quite 
common, whereas they are almost unheard-of today.


Considering how old TSO really is, I'm surprised that it still works as 
well as it does today, while still maintaining backward compatability.  :-)


Rick

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Rexx question - Dynamic generation of variables?

2010-11-06 Thread Joel C. Ewing

On 11/05/2010 07:24 PM, Gibney, Dave wrote:

-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Phil Smith
Sent: Friday, November 05, 2010 5:09 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Rexx question - Dynamic generation of variables?





"Stems are not arrays."
Not now, not ever. But in some ways they're more powerful, as they let
you do associative memory.


That's why I decided on Rexx, I want what is in effect a 3 dimensional
associative memory space. Dsname X volser X Lpar.


--
...phsiii

Phil Smith III
p...@voltage.com
Voltage Security, Inc.
www.voltage.com


...

Since the stem index is an arbitrary variable value, whenever I have 
needed a table lookup dependent on multiple variable values I have 
usually been able to use a construct like


table. = 'some default value'
...
index = dsname "#" volser "#" lpar
table.index = 'some value'

and then use a similar setting of "index" before using "table.index" to 
lookup a value in the table.


This technique in effect maps any number of dimensions to a single 
dimension.


--
Joel C. Ewing, Fort Smith, ARjcew...@acm.org

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Tivoli Storage Manager for z/OS (Functionally Stablized & Impending Demise)

2010-11-06 Thread Edward Jaffe

On 11/5/2010 5:38 AM, Jim Marshall wrote:

Question - 1:

"SO" I would like to know who are the other four people who had a similar idea
about using TSM for z/OS, to be the data backup place in order to leverage all
the good things z/OS has to offer.


I guess we're one of the other four. TSM for z/OS works great for us. It's 
hooked into our mainframe-based "cron" facilities, uses large DASD EAVs, uses 
the same tapes and drives that HSM uses--which get moved by RMM to the same 
off-site locations, etc. I really don't want to try to come up with an alternate 
PC and zFS file backup strategy...


--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
310-338-0400 x318
edja...@phoenixsoftware.com
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html


Re: Why are TSO IDs limited to 7 characters

2010-11-06 Thread Shane
And then there were those of us "fortunate" enough to have also
experienced the Fujitsu/FACOM equivalents.

One significant contributor to this list has even admitted appreciating
the opportunity.
No accounting for taste ... 

Shane ...

On Sat, 6 Nov 2010 02:13:23 -0400
"Robert A. Rosenberg" wrote:

> I beg to differ. Originally there was SPF with an optional product 
> called PDF which ran under it.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html