Re: Name/Tokens

2008-09-12 Thread Peter Relson
I obviously stirred up a hornet's nest. Good.

Every post basically said I don't care what are programming interfaces, I
am going to use whatever I feel like using.  A customer will have very
little sympathy with that approach if his system stops working because of
it.

Not one addressed my point of why you would design an approach that relies
on using something that does not exist and forces you to use non-interfaces
when other alternatives are available. Dave Cole at least has a different
need than most in that he is trying to surface everything to his users.
In practice, is it the case that a debugger typically needs to know what
is the status of this name/token pair (does it exist, what is the token)
more than what are all the name/token pairs that I might have created?

Bob Shannon wrote
It seems to me that people wouldn't have gone through the effort
of writing code to list name/tokens if there was an
easier way to accomplish what they needed.
Is that a valid assumption?   I think not. Especially for the cases that
have been mentioned so far. Just because you used one approach with ENQ and
GQSCAN does not mean that it is appropriate for you to use the same
approach with the names of a name/token pair.

Dave Cole write
Several of us have documented our
need for a name/token list/search service,
I have seen nothing in what has been posted to far that would constitute
such documentation.

If you feel that we are not competent enough to correctly determine
our own needs, then why are you even talking to us?

If you need it so strongly, why haven't you asked for it properly/formally?
A discussion in IBM-MAIN hardly constitutes submission of a requirement. I
might have missed it in the 10+ years that I have been monitoring customer
submissions of requirements to the base control program, but I do not
recall ever seeing a submitted requirement for such a function, either by
an individual or SHARE.

It might be the case that even if you ask for something you won't get it.
But you're certainly more likely to get it if you ask than if you don't.
Again, I understand the desire (OK, need, if you want) for a way to list
things For Debugging.  That does not mean that there is a need outside of
that. Make your case. Present your requirement.  It certainly does not mean
that you should be designing applications in a way that requires you to
violate the rules and possibly puts customers at risk. That last sentence
doesn't really apply to Dave, but rather to someone who is trying to
shoe-horn the ENQ/GQSCAN approach into name/token with roll-your-own list.

Pat O'Keefe wrote
Reading between the lines I see you saying Submit a Requirement
and justify it.  Maybe that requirement should come from users of
the tools that currently use the unsupported techniques.   They
would be the ones hurt when the unsupported techniques fail.
I probably wasn't direct enough that you had to read between the lines.
Yes, exactly.
Actually, it's the customers who are hurt.

Peter Relson
z/OS Core Technology Design
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/Tokens

2008-09-12 Thread John P Kalinich
Peter Relson of the IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
wrote on 09/12/2008 07:14:39 AM:

 I obviously stirred up a hornet's nest. Good.

What about the scenario of you quitting IBM and going to work for Dave
Cole?

Regards,
John K

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/Tokens

2008-09-12 Thread Rob Scott
Peter,

My answers are obviously slanted as I work as a developer for an ISV, however 
...

In practice, is it the case that a debugger typically needs to know what is 
the status of this name/token pair (does it exist, what is the token) more 
than what are all the name/token pairs that I might have created?

My own personal experience I find that both are equally likely and the ability 
to see them whilst debugging can be as useful as the ability to see the TCB 
tree.

Currently I am in a suituation where my internal and external customers want 
the software that I write to be able to show them the list of name/tokens and I 
have to make a choice between not supplying the functionality or running a few 
OCO control blocks - so I plump for the latter and wrap the code in a couple of 
layers of recovery code.

Is there a need outside of debugging - maybe not - but does that invalidate the 
requirement? Funnily enough I considered raising a requirement for this very 
thing a few years back as I hate having to use reverse-engineered OCO control 
blocks, but I did not in the end because I could not see any way of convincing 
IBM of the real business benefit.



Rob Scott
Rocket Software, Inc
275 Grove Street
Newton, MA 02466
617-614-2305
[EMAIL PROTECTED]


-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of 
Peter Relson
Sent: 12 September 2008 13:15
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Name/Tokens

I obviously stirred up a hornet's nest. Good.

Every post basically said I don't care what are programming interfaces, I am 
going to use whatever I feel like using.  A customer will have very little 
sympathy with that approach if his system stops working because of it.

Not one addressed my point of why you would design an approach that relies on 
using something that does not exist and forces you to use non-interfaces when 
other alternatives are available. Dave Cole at least has a different need than 
most in that he is trying to surface everything to his users.
In practice, is it the case that a debugger typically needs to know what is 
the status of this name/token pair (does it exist, what is the token) more 
than what are all the name/token pairs that I might have created?

Bob Shannon wrote
It seems to me that people wouldn't have gone through the effort of
writing code to list name/tokens if there was an easier way to
accomplish what they needed.
Is that a valid assumption?   I think not. Especially for the cases that
have been mentioned so far. Just because you used one approach with ENQ and 
GQSCAN does not mean that it is appropriate for you to use the same approach 
with the names of a name/token pair.

Dave Cole write
Several of us have documented our
need for a name/token list/search service,
I have seen nothing in what has been posted to far that would constitute such 
documentation.

If you feel that we are not competent enough to correctly determine our
own needs, then why are you even talking to us?

If you need it so strongly, why haven't you asked for it properly/formally?
A discussion in IBM-MAIN hardly constitutes submission of a requirement. I 
might have missed it in the 10+ years that I have been monitoring customer 
submissions of requirements to the base control program, but I do not recall 
ever seeing a submitted requirement for such a function, either by an 
individual or SHARE.

It might be the case that even if you ask for something you won't get it.
But you're certainly more likely to get it if you ask than if you don't.
Again, I understand the desire (OK, need, if you want) for a way to list things 
For Debugging.  That does not mean that there is a need outside of that. Make 
your case. Present your requirement.  It certainly does not mean that you 
should be designing applications in a way that requires you to violate the 
rules and possibly puts customers at risk. That last sentence doesn't really 
apply to Dave, but rather to someone who is trying to shoe-horn the ENQ/GQSCAN 
approach into name/token with roll-your-own list.

Pat O'Keefe wrote
Reading between the lines I see you saying Submit a Requirement and
justify it.  Maybe that requirement should come from users of
the tools that currently use the unsupported techniques.   They
would be the ones hurt when the unsupported techniques fail.
I probably wasn't direct enough that you had to read between the lines.
Yes, exactly.
Actually, it's the customers who are hurt.

Peter Relson
z/OS Core Technology Design
--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
[EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN

Re: Name/Tokens

2008-09-12 Thread Patrick O'Keefe
On Fri, 12 Sep 2008 09:48:16 -0400, Rob Scott 
[EMAIL PROTECTED] wrote:

...
Is there a need outside of debugging - maybe not - but does that 
invalidate the requirement? Funnily enough I considered raising a 
requirement for this very thing a few years back as I hate having to 
use reverse-engineered OCO control blocks, but I did not in the end 
because I could not see any way of convincing IBM of the 
real business benefit.
...

Sometimes there are very unusual situations like a debugging 
tool so useful that IBM makes arrangements to OEM it, 
but finds that the tool uses unsupported interfaces.  One part of 
IBM can't use the tool (without some major rewriting it wants 
to avoid) because another part of IBM didn't provide an official
interface.  So IBM avoids the whole problem by purchasing another
vendor of tools.

Now, that might be apocryphal, and NDAs prevent me from being
more specific, but I suspect some readers of this list know the 
detals a lot better than I do.   And no, I don't really think that IBM
bought Candle just to get around rewriting a tool that used 
unsupported interfaces.   

In any case, useful tools will be written to display useful information
whether or not supported interfaces are available to gather the 
data.  And whether or not access to that information ever reaches
the level of need.   And even IBM can suffer from the lack of those 
supported interfaces.

Pat O'Keefe

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-11 Thread Peter Relson
Every response to my query seems to have missed the point and put the cart
before the horse.

I don't disagree that it is desirable to have a list service for
name/tokens. What I question is the need.
Since a list service does not exist, it seems pretty clear to me that you
should not take an approach that requires such a service.

You are welcome of course to ask for such a service and, after/if it is
made available, exploit it.

Peter Relson
z/OS Core Technology Design

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-11 Thread Bob Shannon
It seems to me that people wouldn't have gone through the effort of writing 
code to list name/tokens if there was an easier way to accomplish what they 
needed. If vendors waited for IBM to produce GUPI interfaces for everything 
they need, there would be no vendor code.

Bob Shannon
Rocket Software

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-11 Thread David Cole
This is a bizarre response, Peter. Several of us have documented our 
need for a name/token list/search service, a need that we've felt 
strongly enough about to actually go to the trouble of writing 
complicated workarounds to your failure to fulfill that need. What 
more do you want by way of demonstrating a need?




it seems pretty clear to me that you should not take an approach 
that requires such a service.


Our needs dictate our approaches, Peter. If you feel that my product 
does not need a list/search service, then feel free to quit IBM and 
come work for me and find a better way to code to my product's needs.


If you feel that we are not competent enough to correctly determine 
our own needs, then why are you even talking to us?


David Cole







At 9/11/2008 07:28 AM, Peter Relson wrote:

Every response to my query seems to have missed the point and put the cart
before the horse.

I don't disagree that it is desirable to have a list service for
name/tokens. What I question is the need.
Since a list service does not exist, it seems pretty clear to me that you
should not take an approach that requires such a service.

You are welcome of course to ask for such a service and, after/if it is
made available, exploit it.

Peter Relson
z/OS Core Technology Design


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-11 Thread Patrick O'Keefe
On Thu, 11 Sep 2008 07:28:24 -0400, Peter Relson 
[EMAIL PROTECTED] wrote:

...
I don't disagree that it is desirable to have a list service for
name/tokens. What I question is the need.
Since a list service does not exist, it seems pretty clear to me that you
should not take an approach that requires such a service.

You are welcome of course to ask for such a service and, after/if it is
made available, exploit it.
...

But with that logic it is very tough to justify an assembler (let 
alone a high level language) or just about any utility ever created.
There is always another, lower level technique for doing anything 
so there is no need for a better tool.

If people have written their own tools they must have felt some
need (even if it was just a need to experimment).   If they made it
available to others they must have felt that others also had the 
need.

Reading between the lines I see you saying Submit a Requirement
and justify it.  Maybe that requirement should come from users of
the tools that currently use the unsupported techniques.   They
would be the ones hurt when the unsupported techniques fail.

Pat O'Keefe 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-11 Thread John McKown
On Thu, 11 Sep 2008, Patrick O'Keefe wrote:

 
 Reading between the lines I see you saying Submit a Requirement
 and justify it.  Maybe that requirement should come from users of
 the tools that currently use the unsupported techniques.   They
 would be the ones hurt when the unsupported techniques fail.
 
 Pat O'Keefe 

I agree with you on that. However, being the SOB (Swell Ol' Boy) that I
am, I wonder how well IBM's S/360  MVT would have faired against the
other vendors' hardware and software if IBM had started OS/360 as closed
source and had the attitude of if you need something, ask us and if you
make a good enough economic argument about how __we__ will make some money
off of it, we'll look at putting in an interface to do that. 

Of course, back then it was all about selling the hardware. Software was
an after thought, so to speak. Today, it is about selling services and
software with the hardware just along for the ride (more or less). I know,
different times, different techniques.

This is why I'm a Linux bigot now. The source is available. Thanks to the 
GPL, it will always be available. You want to modify the kernel? Fine, 
feel free. You break it, you bought it!

BTW - to the person who said that eventually the System z software stack 
will likely be on Intel - I doubt it. But, on Power? That might be nice! A 
single box, running a hypervisor, and running all the iSeries, pSeries, 
and zSeries software on it. drool. After, the iSeries runs on Power via 
a sort of emulation. If I had an AIX box available to me, I'd love to see 
how Hercules/390 (not an optimally performing emulation) runs on it. 

-- 
Q: What do theoretical physicists drink beer from?
A: Ein Stein.

Maranatha!
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-10 Thread Peter Relson
I have a need to traverse all system level name/tokens on an lpar.

Care to enlighten the group why such a need exists?

Peter Relson
z/OS Core Technology Design

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-10 Thread Rob Scott
Peter,

In the past, I have seen software that uses part of the name as a constant 
prefix and then places variable information in the later part of the name 
(maybe ASID, TCB or subsystem instance or whatever the developer wanted) - I 
imagine this can happen when the token part is already full. In this case the 
ability to list the name/tokens for search purposes would be desirable.

From a purely generic perspective, if there is a service to create and delete 
a thing - the ability to list all things seems to me to be a fundamental 
function.

Rob Scott
Rocket Software, Inc
275 Grove Street
Newton, MA 02466
617-614-2305
[EMAIL PROTECTED]


-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of 
Peter Relson
Sent: 10 September 2008 12:20
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Name/tokens

I have a need to traverse all system level name/tokens on an lpar.

Care to enlighten the group why such a need exists?

Peter Relson
z/OS Core Technology Design

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
[EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-10 Thread Edward Jaffe

Rob Scott wrote:

From a purely generic perspective, if there is a service to create and delete a thing 
- the ability to list all things seems to me to be a fundamental function.
  


Agreed. For example, when you acquire storage areas using the STORAGE 
macro, you can list them using VSMLIST. When you acquire storage objects 
using IARV64, you can list them using IARV64. VSMLIST appeared only 
after people realized the need to list memory areas existed. The 
developers of IARV64 learned the lesson well. Similar story for 
GQSCAN/ISGQUERY to list ENQs, CSVQUERY to list LOADed modules, and many 
others.


There ought to be a way to list name/tokens. Several popular programs do 
it without a service. This has been discussed before.


--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-10 Thread David Cole

At 9/10/2008 09:50 AM, Rob Scott wrote on IBM-MAIN:

Peter,

In the past, I have seen software that uses part of the name as a 
constant prefix and then places variable information in the later 
part of the name (maybe ASID, TCB or subsystem instance or 
whatever the developer wanted) - I imagine this can happen when the 
token part is already full. In this case the ability to list the 
name/tokens for search purposes would be desirable.


Ditto.

z/XDC used to keep track of certain control data via ENQs. The RNAMEs 
all were control data that started with an identifying keyword 
followed by specific data. I could then use GQSCAN to search for and 
return all instances of a desired control data type simply by 
specifying a GENERIC scan for the first n bytes of the RNAME.


Some 6 or 8 years ago, I had reason to switch from using enqueues and 
GQSCAN to using name/token services. What should have been a rather 
straightforwards conversion turned out to be immensely complicated by 
the fact that name/token services did not in any way support generic searches!


It was a major P.I.T.A.!

That's my nickel's worth.

Dave Cole  REPLY TO: [EMAIL PROTECTED]
Cole Software  WEB PAGE: http://www.xdc.com
736 Fox Hollow RoadVOICE:540-456-8536
Afton, VA 22920FAX:  540-456-6658

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-10 Thread Edward Jaffe

David Cole wrote:
z/XDC used to keep track of certain control data via ENQs. The RNAMEs 
all were control data that started with an identifying keyword 
followed by specific data. I could then use GQSCAN to search for and 
return all instances of a desired control data type simply by 
specifying a GENERIC scan for the first n bytes of the RNAME.


We still have software that does this. It's immensely useful to be able 
to list objects that have been created for your task, address space, 
system, or sysplex. ENQ/GQSCAN/ISGQUERY does this nicely. Name/Token? 
Not so much (or at all).


--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-10 Thread Rob Scott
Maybe this affects us more than 'real' z/OS users because we are all in 
development.

From my local experience in Rocket, I know that Name/Token is very popular in 
a lot of software that we write - and the MXI command NTOK that displays the 
system-level ones is used a lot - so much so that in the next version of MXI I 
have changed the collector to be an SRB so that it can show ASID/TCB level 
tokens from any address space as well. A supported callable service to do this 
would be preferable to the non-GUPI control block chasing that I currently 
have to do...




Rob Scott
Rocket Software, Inc
275 Grove Street
Newton, MA 02466
617-614-2305
[EMAIL PROTECTED]


-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of 
Edward Jaffe
Sent: 10 September 2008 18:00
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Name/tokens

David Cole wrote:
 z/XDC used to keep track of certain control data via ENQs. The RNAMEs
 all were control data that started with an identifying keyword
 followed by specific data. I could then use GQSCAN to search for and
 return all instances of a desired control data type simply by
 specifying a GENERIC scan for the first n bytes of the RNAME.

We still have software that does this. It's immensely useful to be able to list 
objects that have been created for your task, address space, system, or 
sysplex. ENQ/GQSCAN/ISGQUERY does this nicely. Name/Token?
Not so much (or at all).

--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
[EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-10 Thread Pedro Vera
 From a purely generic perspective, if there is a service to create and 
delete a thing - the ability to list all things seems to me to be a 
fundamental function.

agree.

 It's immensely useful to be able to list objects that have been created

I have always been one to poke around in the system. You find out how 
stuff works; every bit of knowledge is useful. 

But in this case, I am not sure what I would learn by knowing the 
name/tokens.  How would I use the information?  More interesting to me 
might be who created what name/tokens (even then, the benefit of knowing 
it is hazy).  Is ownership kept in the control blocks?



Pedro Vera

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-10 Thread Edward Jaffe

Rob Scott wrote:

Maybe this affects us more than 'real' z/OS users because we are all in 
development.
  


Ummm. That's true of *all* programming services provided by the 
operating system. We use them every day. Average users do not.


--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-10 Thread Rob Scott
A small amount of ownership info is kept in the control block that describes 
the name/token entry - for example it contains the ASID and TCB. However, I 
would *love* to see the following information added :

JOBNAME of creator
STOKEN of creator
STCK of creation

The usefullness of seeing the tokens is proportional to your knowledge of what 
either/both the name and token refer to. I find that displaying the 
name/tokens help during interactive debug sessions of my own code as I use them 
to anchor each task and its associated end-of-task exit routine.


Rob Scott
Rocket Software, Inc
275 Grove Street
Newton, MA 02466
617-614-2305
[EMAIL PROTECTED]


-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of 
Pedro Vera
Sent: 10 September 2008 18:15
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Name/tokens

 From a purely generic perspective, if there is a service to create and
delete a thing - the ability to list all things seems to me to be a 
fundamental function.

agree.

 It's immensely useful to be able to list objects that have been
 created

I have always been one to poke around in the system. You find out how stuff 
works; every bit of knowledge is useful.

But in this case, I am not sure what I would learn by knowing the name/tokens.  
How would I use the information?  More interesting to me might be who created 
what name/tokens (even then, the benefit of knowing it is hazy).  Is ownership 
kept in the control blocks?



Pedro Vera

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
[EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at 
http://bama.ua.edu/archives/ibm-main.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-09 Thread Rolf Ernst
Ooops, 


just answered my own question. It's a pointer off the ECVT. Sorry. 


/re 

- Original Message - 
From: Rolf Ernst [EMAIL PROTECTED] 
To: IBM-MAIN@BAMA.UA.EDU 
Sent: Tuesday, September 9, 2008 8:50:39 AM GMT -06:00 US/Canada Central 
Subject: Name/tokens 

Hi, 

I have a need to traverse all system level name/tokens on an lpar. I vaguely 
recall that this can be done but for the life of me cannot remember. Does 
anybody know which chain to follow? 

/re 

-- 
For IBM-MAIN subscribe / signoff / archive access instructions, 
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO 
Search the archives at http://bama.ua.edu/archives/ibm-main.html 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-09 Thread Paul Gilmartin
On Tue, 9 Sep 2008 09:04:03 -0500, Rolf Ernst wrote:

just answered my own question. It's a pointer off the ECVT. Sorry.

But be careful; that list is updated dynamically with no standard
serialization.  By following pointers at the wrong time you might
find yourself traversing the free list.  IBM's token retrieval
service knows how to detect an invalid outcome and retry, but
it's tricky.

I have a need to traverse all system level name/tokens on an lpar. I vaguely 
recall that this can be done but for the life of me cannot remember. Does 
anybody know which chain to follow?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-09 Thread Walt Farrell
On Tue, 9 Sep 2008 09:04:03 -0500, Rolf Ernst [EMAIL PROTECTED] wrote:

Ooops,


just answered my own question. It's a pointer off the ECVT. Sorry.


But note that ECVTNTTP is not an intended programming interface, and you use
it at your own risk.  

-- 
  Walt Farrell, CISSP
  IBM STSM, z/OS Security Design

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-09 Thread Rolf Ernst
I understand. It's not for use in a production environment. Just a quick and 
dirty check. 


/re 


- Original Message - 
From: Walt Farrell [EMAIL PROTECTED] 
To: IBM-MAIN@BAMA.UA.EDU 
Sent: Tuesday, September 9, 2008 11:34:30 AM GMT -06:00 US/Canada Central 
Subject: Re: Name/tokens 

On Tue, 9 Sep 2008 09:04:03 -0500, Rolf Ernst [EMAIL PROTECTED] wrote: 

Ooops, 
 
 
just answered my own question. It's a pointer off the ECVT. Sorry. 
 

But note that ECVTNTTP is not an intended programming interface, and you use 
it at your own risk.   

-- 
  Walt Farrell, CISSP 
  IBM STSM, z/OS Security Design 

-- 
For IBM-MAIN subscribe / signoff / archive access instructions, 
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO 
Search the archives at http://bama.ua.edu/archives/ibm-main.html 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-09 Thread Edward Jaffe

Walt Farrell wrote:

But note that ECVTNTTP is not an intended programming interface, and you use
it at your own risk.
  


IBM never provided an intended interface. :-(

--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-09 Thread Walt Farrell
On Tue, 9 Sep 2008 09:57:41 -0700, Edward Jaffe
[EMAIL PROTECTED] wrote:

Walt Farrell wrote:
 But note that ECVTNTTP is not an intended programming interface, and you use
 it at your own risk.


IBM never provided an intended interface. :-(

Not true, Ed.  We have lots of them, and they're all documented as being
interfaces.  We also have a bunch of things that we do not intend others to
use, but people do anyway.

-- 
  Walt Farrell, CISSP
  IBM STSM, z/OS Security Design

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-09 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Walt Farrell
Sent: Tuesday, September 09, 2008 12:35 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Name/tokens

On Tue, 9 Sep 2008 09:57:41 -0700, Edward Jaffe
[EMAIL PROTECTED] wrote:

Walt Farrell wrote:
SNIP
IBM never provided an intended interface. :-(

Not true, Ed.  We have lots of them, and they're all documented as being
interfaces.  We also have a bunch of things that we do not intend others
to
use, but people do anyway.

SNIP

How soon will this INTENDED clause get implemented in COBOL?  ;-)

Regards,
Steve Thompson

-- Opinions expressed by the poster are not necessarily those of
poster's employer. Any attempt to take this as advice, legal, financial
or otherwise, makes this posting null and void. Any attempt to read this
without gas will cause carburetion starvation and engine failure may
result --

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-09 Thread Roland Schiradin
AFAIR the create/delete/retrieve works fine in Cobol.

Roland

-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Walt Farrell
Sent: Tuesday, September 09, 2008 12:35 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Name/tokens

On Tue, 9 Sep 2008 09:57:41 -0700, Edward Jaffe
[EMAIL PROTECTED] wrote:

Walt Farrell wrote:
SNIP
IBM never provided an intended interface. :-(

Not true, Ed.  We have lots of them, and they're all documented as being
interfaces.  We also have a bunch of things that we do not intend others
to
use, but people do anyway.

SNIP

How soon will this INTENDED clause get implemented in COBOL?  ;-)

Regards,
Steve Thompson


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-09 Thread Edward Jaffe

Walt Farrell wrote:

On Tue, 9 Sep 2008 09:57:41 -0700, Edward Jaffe
[EMAIL PROTECTED] wrote:

  

Walt Farrell wrote:


But note that ECVTNTTP is not an intended programming interface, and you use
it at your own risk.

  

IBM never provided an intended interface. :-(



Not true, Ed.  We have lots of them, and they're all documented as being
interfaces.  We also have a bunch of things that we do not intend others to
use, but people do anyway.
  


What are you talking about, Walt???! It should be obvious that I'm not 
asserting that IBM has never written an intended interface. I'm saying 
that IBM never provided a Name/Token service to allow you to list/search 
them. The only way to achieve this is a roll-your-own approach. And, as 
Paul G. points out, you need to be aware of the serialization (or lack 
thereof) issues. Jeez!


--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[EMAIL PROTECTED]
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens

2008-09-09 Thread Walt Farrell
On Tue, 9 Sep 2008 12:32:23 -0700, Edward Jaffe
[EMAIL PROTECTED] wrote:

What are you talking about, Walt???! It should be obvious that I'm not
asserting that IBM has never written an intended interface. I'm saying
that IBM never provided a Name/Token service to allow you to list/search
them. The only way to achieve this is a roll-your-own approach. And, as
Paul G. points out, you need to be aware of the serialization (or lack
thereof) issues. Jeez!


Sorry, Ed, but I did not interpret your message in that context at all.  

It seemed like a general snipe at IBM (which, after all, does happen on this
list with some regularity when the topic of interface vs non-interface comes
up) rather than something related to the OP's question about scanning
defined name/token pairs.

My apologies.

-- 
  Walt Farrell, CISSP
  IBM STSM, z/OS Security Design

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens -- Joke reference

2008-09-09 Thread Thompson, Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Roland Schiradin
Sent: Tuesday, September 09, 2008 2:11 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Name/tokens

AFAIR the create/delete/retrieve works fine in Cobol.

Roland

SNIP

ID DIVISION
:
:
:
:
  PERFORM ABC-PARAGRAPH WITH INTENDED TO PRODUCE PAYROLL REGISTER
:
  STOP RUN WITH INTENDED TO GOBACK, RETURN, ESW.
:

This was a LONNNG running joke from back about 1977 when I
first heard it. COBOL needs to have an INTENDED clause.

Later,
Steve Thompson

-- Opinions expressed by the poster are not necessarily those of
poster's employer. --

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens -- Joke reference

2008-09-09 Thread Roland Schiradin
Ok got it. You're welcome


-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Roland Schiradin
Sent: Tuesday, September 09, 2008 2:11 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Name/tokens

AFAIR the create/delete/retrieve works fine in Cobol.

Roland

SNIP

ID DIVISION
:
:
:
:
  PERFORM ABC-PARAGRAPH WITH INTENDED TO PRODUCE PAYROLL REGISTER
:
  STOP RUN WITH INTENDED TO GOBACK, RETURN, ESW.
:

This was a LONNNG running joke from back about 1977 when 
I
first heard it. COBOL needs to have an INTENDED clause.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens -- Joke reference

2008-09-09 Thread Chase, John
 -Original Message-
 From: IBM Mainframe Discussion List On Behalf Of Thompson, Steve
 
 SNIP
 
 ID DIVISION
 :
 :
 :
 :
   PERFORM ABC-PARAGRAPH WITH INTENDED TO PRODUCE PAYROLL REGISTER
 :
   STOP RUN WITH INTENDED TO GOBACK, RETURN, ESW.
 :
 
 This was a LONNNG running joke from back about 
 1977 when I first heard it. COBOL needs to have an INTENDED clause.

Aren't they waiting for somebody to complete the DWIM macro??  :-)

-jc-

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



Re: Name/tokens -- Joke reference

2008-09-09 Thread Mark Zelden
On Tue, 9 Sep 2008 15:21:07 -0500, Chase, John [EMAIL PROTECTED] wrote:

 -Original Message-
 From: IBM Mainframe Discussion List On Behalf Of Thompson, Steve

 SNIP

 ID DIVISION
 :
 :
 :
 :
   PERFORM ABC-PARAGRAPH WITH INTENDED TO PRODUCE PAYROLL REGISTER
 :
   STOP RUN WITH INTENDED TO GOBACK, RETURN, ESW.
 :

 This was a LONNNG running joke from back about
 1977 when I first heard it. COBOL needs to have an INTENDED clause.

Aren't they waiting for somebody to complete the DWIM macro??  :-)


That is next in line after they finish getting the GF button on the processor
to work.

Mark
--
Mark Zelden
Sr. Software and Systems Architect - z/OS Team Lead
Zurich North America / Farmers Insurance Group - ZFUS G-ITO
mailto:[EMAIL PROTECTED]
z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/
Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html