Re: Product license key program

2018-02-27 Thread Brian Westerman
You lost me Shmuel,

I don't think I misrepresented the people who object to keys, at least not on 
purpose.  I don't understand the straw dummy reference and I honestly don't 
understand the objection to a vendor using keys for their product(s).

What collateral damage is cause by a vendor's use of keys in their software?  
The keys are there to "lock" the software to the system it was licensed for.  
If the software is moved, or used in other creative means without permission 
from the vendor (who we must remember, owns the software), then it 
(theoretically) won't work on that "other" platform.  I guess I'm missing the 
damage part of that.  Do you mean disaster recovery keys?  I think every vendor 
has that covered by now, but maybe they don't, and again, it's their software, 
if they don't want to allow that use, and they let you know up front, then 
whats the damage?

There are many parts (I guess types of keys makes more sense) of vendors keys 
that I don't agree with, and I don't personally think that software in and of 
itself should cost more for one processor than another, regardless of processor 
size, but that's just my personal feeling.  If a vendor wishes to price their 
software that way, then it's completely their decision.  

Possibly our difference of opinion is because I see the vendor's product as 
belonging to the vendor, not unlike my "locking your car or house" analogy.  
It's not like the vendor is locking other software, just their own.  At least I 
hope so.  If the vendor wants to lock their software so that it isn't 
"misused", (and specifying what "misused" means is 100% the software vendor's 
decision).  Then, as they "own" the software, it's up to them to say what those 
rules are.  They need to be up front on the rules, even if they are 
unreasonable rules, otherwise the contract for the software would be invalid 
anyway under the "meeting of the minds" concept of contract law. 

If a site "purchased" the software instead of licensed (or rented) it, then I 
believe you are 100% correct that the software vendor loses the right to lock 
it up.  I don't think many vendors sell their software that way though, it 
would not be cost effective for either party.

So, I really do want you to educate me on this.  If you can do it without 
losing your temper or being condescending, then I would like to do it here, 
publicly, so that others can understand as well.  

On the other hand, if you can't discuss it calmly, or if you want to be 
sarcastic and/or virulent about it, then feel free to send me the discussion 
points offline, because I still really do want to try to understand your points.

Sincerely, 

Brian




On Tue, 27 Feb 2018 21:44:45 +, Seymour J Metz  wrote:

>You can, and did, misrepresent the position of those who object to license 
>keys. The issue isn't protecting the  software; the issue is the means used to 
>do so and the collateral damage from those means.
>
>If you have someone willing to steal your product, then he will also be 
>willing to patch it to bypass the license check? Illegal, sure, and I hope 
>that you nail anybody who does so, but still inevitable.
>
>As for support of stolen copies, that's a separate issue from preventing the 
>product from running. Use of keys et al in the support process doesn't have 
>the same potential for collateral damage.
>
>Microsoft? They have a vested interest in lying about their reasons; they want 
>to force bundling, and have been very successful at it.
>
>Of course, after inventing straw dummies and openly being facetious  you ar 
>likely to get sarcastic replies; if you didn't want sarcasm then you should 
>have used honest and polite argument.
>
>--
>Shmuel (Seymour J.) Metz
>http://mason.gmu.edu/~smetz3
>
>
>From: IBM Mainframe Discussion List  on behalf of 
>Brian Westerman 
>Sent: Monday, February 26, 2018 9:27 PM
>To: IBM-MAIN@listserv.ua.edu
>Subject: Re: Product license key program
>
>If someone violates a copyright, there are legal and I think criminal 
>penalties.  But I doubt the FBI will get involved if you decided not to pay CA 
>for using Panvalet.
>
>You can't over simplify the issue and decide categorically that all vendors 
>that want to "protect" their software are bad.  Just like people, there are 
>indeed some bad vendors, whether or not they have product "protection" doesn't 
>enter into the equation.
>
>How would a vendor even know that someone didn't take a "personal" copy of 
>their unprotected code from site A to site B?  Does that happen, it sure does.
>
>Microsoft did a study several years back on how much time they spent fixing 
>problems and helping people who had pirated copies of their code, and it was 
>something on the order of 38%.  That didn't mean that 38% of the people 
>running Windows were running pirated copies, just that during their study, 38% 
>of the people 

Re: Product license key program

2018-02-27 Thread Brian Westerman
This is exactly the reason we decided that our software would always be sent 
with the keys for that particular site embedded into the software, there are no 
separate steps necessary to install the keys.  It actually provides us with 
another advantage in that when it's time to update the software (or just the 
keys) we ship them their new software with the new keys with all current 
maintenance already applied.  That way we don't end up with trying to support 
10 (or 20) years of different versions of the products.  It's more work for us 
on the one end, but a lot less to maintain overall. 

Brian

On Tue, 27 Feb 2018 23:40:17 +, Schuffenhauer, Mark  
wrote:

>My thought is simply, license keys make it easier (but not always 100%) to 
>protect the intellectual property that belongs to the owner.  It in most cases 
>prevents the expense of having to resort to investigation and litigation of 
>something.  
>
>I think its great Tony takes the time oo properly account in his example. 
>
> Some people are careless, some are less rigorous, and some people are 
> criminal.  License keys and other items that reduce simplicity in product 
> installation and maintenance are a bit to avoid the first two items, and 
> aimed squarely at the criminals.  
>
>From a non-legal standpoint, but from an impaceed person standpoint, I 
>understand where owners of all intellectual/copyrighted property are coming 
>from.  At times it's a pain below my back, but I get it. 
>
>-Original Message-
>From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>Behalf Of Seymour J Metz
>Sent: Tuesday, February 27, 2018 3:24 PM
>To: IBM-MAIN@LISTSERV.UA.EDU
>Subject: Re: Product license key program
>
>No. 
>
>hhe relevant difference between copying the sheet music and singing it has 
>nothing to do with the equipment used, but with what that equipment is used to 
>do. Making copies not covered by fair use or license is a violation regardless 
>of the hardware used. The Devil is in the details.
>
>Let's take your copier claim. A copier contains a scanner and a printer.  
>Scanning a song is in a very different category from printing the canned song. 
>If I am licensed to play the song and have software that will play it from the 
>scanned image, that performance is legal.
>
>As to eecording the service, that again is not a question of what equipment 
>you use but of what you use it for. The legal issues are the same whether you 
>make a wire recording, a tape recording or a digital recording.
>
>Maybe you should go back to law school and take a refresher course.
>
>--
>Shmuel (Seymour J.) Metz
>http://mason.gmu.edu/~smetz3
>
>
>From: IBM Mainframe Discussion List  on behalf of 
>Tony Thigpen 
>Sent: Tuesday, February 27, 2018 2:22 PM
>To: IBM-MAIN@listserv.ua.edu
>Subject: Re: Product license key program
>
>Seymour,
>
>You knowledge of music copyright is incorrect. In many cases it *does* matter 
>what equipment.
>
>I am involved with the copyright issues with songs at our church. I have to 
>account separately for:
>
>1) A pre-printed copy of the song, such as a hymnal
>2) A 'copy' of the song printed locally on a printer or copier
>2) The display of the song on a projector during the service
>
>And, if I record the worship services, I have to account for:
>1) Did the audio recording of our people singing the song get recorded>
>2) Did the video of the service actually capture display of the song by the 
>projector on the screen?
>
>And, as for the recordings,
>1) If I plyy back the audio or video to a assembly, then that is another item 
>to be accounted for.
>2) If I make a DVD and send it to someone outside our congergation, then it 
>has to be accounted for.
>
>Tony Thigpen
>
>Seymour J Metz wrote on022/26/2018 12:48 PM:
>> It's fair when the vendor assumes the risk. It's not fair when the customer 
>> has bee left holding the bag. "product keys are just any other license 
>> enforcement" is not even close. If I license, e.g., a copyrighted song for 
>> use in a movie, it doesn't matter what equipment I use to play the song or 
>> to record it in the movie. The enforcement is via legal proceedings that the 
>> vendor does not invoke capriciously, but only when he has good reason to 
>> believe that I am in violation of the license terms.
>>
>> Software keys, OTOH, can and have caused problems for legitimate users. Some 
>> are more reliable than others, but I see nothing wrong with a shop refusing 
>> to use a product because they are not willing to assume the risk. If you are 
>> really confident that there is no risk, add an indemnification clause to 
>> your contract and I'll take your confidence seriously. If you don't trust it 
>> enough to have such a clause, why should a potential customer trust it?
>>
>>
>> --
>> Shmuel (Seymour J.) Metz
>> http://mason.gmu.edu/~smetz3
>>
>> 

Re: SYSLOG processing to JES Output product

2018-02-27 Thread Bruce Hewson
Hello Peter,

OPERLOG captured daily to GDG. Easiest way.

SYSLOG per system captured daily.

I have used three ways to capture SYSLOG.

1. old- Use and External Writer to capture explicit class reserved for SYSLOG 
daily. Output can be a GDG, but better is Datestamped dataset.
2. Use SDSF to capture specific system SYSLOG messages for date/time range 
daily, Output to datestamped dataset.
3. CA-View - use exit to modify SYSLOG file name to include SYSNAME suffix. 
Capture daily, or as spool dataset spun off due line count.

Personally, I preferred data being captured to datestamped dataset. Let HSM to 
migrate. And possibly manage age based deletion. This allows easy access to 
diagnostic data using ISPF VIEW commands. OPERLOG for large sysplex often 
cannot be VIEWed by ISPF, with auto-switch to BROWSE mode, requiring alternate 
search activities.

CA-View is sort of OK, especially if PRINT to DISK has been setup.

On Tue, 27 Feb 2018 17:46:23 +0530, Peter  wrote:

>Hi
>
>Just wanted to get an idea on how you are all processing your syslog to an
>JES output management Products (could be anything).
>
>Are you running SYSLOG offload everyday , weekends ? How long you keep the
>SYSLOG data online and what are the retention period etc.. ?
>
>I am trying to set the same thing in my shop but just wanted to know some
>best practices from you all.
>
>Peter
>
>--
>For IBM-MAIN subscribe / signoff / archive access instructions,
>send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Regards
Bruce Hewson

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Product license key program

2018-02-27 Thread Paul Gilmartin
On Tue, 27 Feb 2018 23:59:54 +, Seymour J Metz wrote:

>I understand where the vendors are coming from, but that does not mean that 
>I'm willing to assume a risk for their convenience. Given two products of 
>comparable cost and functionality, I'll always opt for the one without keys, 
>except in the unlikely case of a vendor willing to contractually guaranty 
>indemnification when the key software interferes with legitimate use. Tony 
>seems to be unable to see things from the customer's perspective.
> 
And it's unusual for consequential damages to be covered.  Most probably, the 
supplier
will agree only to waive the license fee for the duration of the outage.

At the most recent change of my employer's ownership, the acquiring company
directed that all licensing paraphernalia be removed from our products.

>
>From: Tony Thigpen
>Sent: Tuesday, February 27, 2018 2:22 PM
>
>You knowledge of music copyright is incorrect. In many cases it *does* matter 
>what equipment.
>
>I am involved with the copyright issues with songs at our church.
> 
It's unlikely that a mishap would result in unavailability.  If  your copy of
the license (analogous to "key") were lost or destroyed, or casualty forced
you to relocate the service, would you redact that service, omitting
licensed material until the vendor could issue a new license?

>Seymour J Metz wrote on 02/26/2018 12:48 PM:
>>
>> Software keys, OTOH, can and have caused problems for legitimate users. Some 
>> are more reliable than others, but I see nothing wrong with a shop refusing 
>> to use a product because they are not willing to assume the risk. If you are 
>> really confident that there is no risk, add an indemnification clause to 
>> your contract and I'll take your confidence seriously. If you don't trust it 
>> enough to have such a clause, why should a potential customer trust it?
>> 
Interesting point.  In its early days, Apple offered only a 90-day warranty,
saying,  "Our products rarely break after more than 90 days, so customers
shouldn't be concerned."

>>> 
>>> From: Charles Mills
>>> Sent: Sunday, February 25, 2018 12:47 PM
>>>
>>> Most customers are honest -- beyond honest to the point of
>>> paranoia -- but a few are not. And honest customers sometimes make
>>> honest mistakes.
>>>
Quite so.  We once neglected to read the fine print which restricted not
which processor was running the software but rather in which county
the programmer's chair was.  We negotiated an amendment.

And a while ago I was astonished to learn in this list of a product that was
licensed not according to which processor ran it, but according to the source
of its input data.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: (MBP and) macbook air and keyboard emulation

2018-02-27 Thread Lee B
Hi Martin,

I install mine from brew - the 'x3270' package includes c3270.
Just ran an upgrade now, and get this:

lee@mbp.local:~/tmp $ brew info x3270
x3270: stable 3.6ga5 (bottled)
IBM 3270 terminal emulator for the X Window System and Windows
http://x3270.bgp.nu/
/usr/local/Cellar/x3270/3.5ga9 (16 files, 3.2MB)
  Poured from bottle on 2017-09-04 at 16:09:55
/usr/local/Cellar/x3270/3.6ga5 (16 files, 3.2MB) *
  Poured from bottle on 2018-02-28 at 12:01:14
From: https://github.com/Homebrew/homebrew-core/blob/master/Formula/x3270.rb
==> Dependencies
Required: openssl
==> Requirements
Optional: x11
==> Options
--with-x11
Include x3270 (X11-based version)
--without-c3270
Exclude c3270 (curses-based version)
--without-pr3287
Exclude pr3287 (printer emulation)
--without-s3270
Exclude s3270 (displayless version)
--without-tcl3270
Exclude tcl3270 (integrated with Tcl)
lee@mbp.local:~/tmp $

HTH,

Lee.

On 水,  2 28 2018, Martin Packer wrote:

> Where did you get a version of c3270 from for Mac? And how up to date is 
> it relative to Development versions?
>
> Thanks, Martin
>
> Martin Packer
>
> zChampion, Systems Investigator & Performance Troubleshooter, IBM
>
> +44-7802-245-584
>
> email: martin_pac...@uk.ibm.com
>
> Twitter / Facebook IDs: MartinPacker
>
> Blog: 
> https://www.ibm.com/developerworks/mydeveloperworks/blogs/MartinPacker
>
> Podcast Series (With Marna Walle): https://developer.ibm.com/tv/mpt/or 
>   
> https://itunes.apple.com/gb/podcast/mainframe-performance-topics/id1127943573?mt=2
>
>
> Youtube channel: https://www.youtube.com/channel/UCu_65HaYgksbF6Q8SQ4oOvA
>
>
>
> From:   Thomas David Rivers 
> To: IBM-MAIN@LISTSERV.UA.EDU
> Date:   27/02/2018 20:14
> Subject:Re: (MBP and) macbook air and keyboard emulation
> Sent by:IBM Mainframe Discussion List 
>
>
>
> Paul Gilmartin wrote:
>
>>On Sun, 25 Feb 2018 10:21:43 +0200, Itschak Mugzach wrote:
>> 
>>
>>>I am using macbook to connect to our (and client's) mainframes. I do not
>>>want to change the keyboard map in the emulation product. what is the
>>>keyboard mapping for enter, ph11 and pf12?
>>>
>>> 
>>>
>>Related question:
>>
>>I'm considering an MBP.  But can the touch bar be configured to 
> transparently
>>provide (P)F keys for emulators, X11, VirtualBox, ...
>>
>>On my old MB I used Keyboard Preferences so I can use F1-F12 without 
> using
>>a modifier key.
>>
>>I never mastered PF13-PF24, so that's not a concern.
>>
>>Thanks,
>>gil
>>
>> 
>>
> I switched to the latest MacBook pro late last year.
>
> The touch bar is an abomination;  it is simply too easy to accidently
> bump into and cause all sorts of havoc.
>
> So - I find that I simply turn it off as much as possible.
>
> I usually use C3270 for my emulator ("txt" mode  in a terminal window) 
> and I've
> set the terminal window's touch bar to display the function keys... they 
> work just
> fine (except for accidently bumping into them.)
>
> I haven't tried setting them up with the X3270 port I use on the mac... 
> I'm sure it's
> possible... but, I've just been so put-off by the touch-bar that I want 
> it to just go
> away.
>
> As soon as Apple comes out with a new MacBook without the touch bar, I 
> will be
> opting for that.
>
> - Dave Rivers -

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SYSLOG processing to JES Output product

2018-02-27 Thread jdoll.a0...@gmail.com IBM-Main

Been retired for Almost two years now but from what I recall:


Two Different SysPlex:  One has 2 MVS Systems,  Other has 6 MVS Systems

The Smaller one was in the 900K lines per day,  Larger one in the 5M lines 
per day

They were both accessed Daily
Kept on Online for 45 days, with HSM backups for 400+ Days more
Every Hours they logs would be "switched" , Automation would grab them from 
the output queue they were written to and Mod'ed them to that day's DASD 
Syslog datasets.
Don't remember how much space was given to them, they were just like any 
other dataset in the TECH Dasd Pool.

I think they were in SYSLOG Format.
The System's Group was the "Owner" of the datasets,
I think they were readable to just about everyone. (But not sure, What the 
security rules were around them), I know I could read them...)





- Original Message - 
From: "Lizette Koehler" 

Newsgroups: bit.listserv.ibm-main
To: 
Sent: Tuesday, February 27, 2018 1:36 PM
Subject: Re: SYSLOG processing to JES Output product


So

How many lines of output are on SYSLOG Daily/Hourly/Weekly/Monthly

How often will you need to access the archive syslog?

How long will you need to maintain SYSLOG (months/years)

How much storage (DASD or TAPE) can you dedicate to SYSLOG archive?

are you using OPERLOG or native SYSLOG?


Everything is shop dependent

If you use it a lot and can afford to leave on SPOOL Longer, or is it needed 
to offload to dasd as soon as possible


Who the users are will dictate what to do with SYSLOG

Just SYSTEM Folks or all Folks


Lizette



-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Peter
Sent: Tuesday, February 27, 2018 5:16 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: SYSLOG processing to JES Output product

Hi

Just wanted to get an idea on how you are all processing your syslog to an
JES output management Products (could be anything).

Are you running SYSLOG offload everyday , weekends ? How long you keep the
SYSLOG data online and what are the retention period etc.. ?

I am trying to set the same thing in my shop but just wanted to know some
best practices from you all.

Peter

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email 
to

lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Product license key program

2018-02-27 Thread Charles Mills
Our product originally did not have "keys." We got beat up by a customer for 
THAT! "How the heck are we supposed to know what LPARs we can run it on if it 
doesn't tell us?"

Don't beat me up -- I'm just repeating what the customer said.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Schuffenhauer, Mark
Sent: Tuesday, February 27, 2018 3:40 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Product license key program

My thought is simply, license keys make it easier (but not always 100%) to 
protect the intellectual property that belongs to the owner.  It in most cases 
prevents the expense of having to resort to investigation and litigation of 
something.  

I think its great Tony takes the time to properly account in his example. 

 Some people are careless, some are less rigorous, and some people are 
criminal.  License keys and other items that reduce simplicity in product 
installation and maintenance are a bit to avoid the first two items, and aimed 
squarely at the criminals.  

>From a non-legal standpoint, but from an impacted person standpoint, I 
>understand where owners of all intellectual/copyrighted property are coming 
>from.  At times it's a pain below my back, but I get it. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE

2018-02-27 Thread Ira Nelson
Look at DASDGRID on the CBttape

Sent from my iPad

> On Feb 27, 2018, at 4:27 PM, Seymour J Metz  wrote:
> 
> CONSOLE has been around since Old Man Noach cornered the market in Gopher 
> Wood, well before V2R10. 
> 
> 
> --
> Shmuel (Seymour J.) Metz
> http://mason.gmu.edu/~smetz3
> 
> 
> From: IBM Mainframe Discussion List  on behalf of 
> Carmen Vitullo 
> Sent: Tuesday, February 27, 2018 11:57 AM
> To: IBM-MAIN@listserv.ua.edu
> Subject: Re: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE
> 
> I was thinking that also, but I was not sure that feature was available in 
> OS/390 2.10
> 
> 
> 
> 
> Carmen Vitullo
> 
> - Original Message -
> 
> From: "Lionel B. Dyck (TRA)" 
> To: IBM-MAIN@LISTSERV.UA.EDU
> Sent: Tuesday, February 27, 2018 10:54:26 AM
> Subject: Re: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE
> 
> If you are authorized to use the TSO CONSOLE command then you can also use it 
> to capture the output of your command
> 
> "CONSPROF SOLDISP(no) SOLNUM(400) UNSOLDISP(yes)"
> "CONSOLE ACTIVATE"
> "CONSOLE SYSCMD(D M=CONFIG(P1)) "
> rc = GETMSG('t.','sol',,,30)
> "CONSOLE DEACTIVATE"
> 
> --
> Lionel B. Dyck <
> Mainframe Systems Programmer - TRA
> 
> 
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
> Behalf Of Carmen Vitullo
> Sent: Tuesday, February 27, 2018 10:46 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE
> 
> do you have SDSF or IOF, you can capture the output from console command in 
> the output SYSTSPRT ?
> some examples come to mind
> 
> 
> 
> //TSO EXEC PGM=IKJEFT01,REGION=0M,
> // DYNAMNBR=99
> //SYSTSPRT DD SYSOUT=*
> //SYSTSIN DD *
> SDSF
> //ISFIN DD *
> SET DELAY 40
> W/RO PROD,D M=CONFIG(P1)
> ULOG
> //ISFOUT DD SYSOUT=*
> 
> 
> 
> 
> or
> 
> 
> 
> 
> 
> //SDSF EXEC PGM=ISFAFD
> //SYSTSPRT DD SYSOUT=*
> //ISFIN DD *
> /D LOGGER,LOGSTREAM
> //ISFOUT DD SYSOUT=*
> 
> Carmen Vitullo
> 
> - Original Message -
> 
> From: "Tony Thigpen" 
> To: IBM-MAIN@LISTSERV.UA.EDU
> Sent: Tuesday, February 27, 2018 10:18:31 AM
> Subject: capture output from DS QD,TYPE=ALL,ONLINE
> 
> I need to capture the output from a DS QD,TYPE=ALL,ONLINE on an OS/390
> 2.10 system. (Yep, before some of the current tools.)
> 
> Any thoughts?
> 
> --
> Tony Thigpen
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
> lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
> lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Product license key program

2018-02-27 Thread Seymour J Metz
I understand where the vendors are coming from, but that does not mean that I'm 
willing to assume a risk for their convenience. Given two products of 
comparable cost and functionality, I'll always opt for the one without keys, 
except in the unlikely case of a vendor willing to contractually guaranty 
indemnification when the key software interferes with legitimate use. Tony 
seems to be unable to see things from the customer's perspective.

I will confess that in my callow youth I did write code to protect my 
intellectual property. The first time that it caused problems for an authorized 
user in an unexpected environment, I saw the error of my ways and didn't do it 
again.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
Schuffenhauer, Mark 
Sent: Tuesday, February 27, 2018 6:40 PM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: Product license key program

My thought is simply, license keys make it easier (but not always 100%) to 
protect the intellectual property that belongs to the owner.  It in most cases 
prevents the expense of having to resort to investigation and litigation of 
something.

I think its great Tony takes the time to properly account in his example.

 Some people are careless, some are less rigorous, and some people are 
criminal.  License keys and other items that reduce simplicity in product 
installation and maintenance are a bit to avoid the first two items, and aimed 
squarely at the criminals.

>From a non-legal standpoint, but from an impacted person standpoint, I 
>understand where owners of all intellectual/copyrighted property are coming 
>from.  At times it's a pain below my back, but I get it.

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Seymour J Metz
Sent: Tuesday, February 27, 2018 3:24 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Product license key program

No.

The relevant difference between copying the sheet music and singing it has 
nothing to do with the equipment used, but with what that equipment is used to 
do. Making copies not covered by fair use or license is a violation regardless 
of the hardware used. The Devil is in the details.

Let's take your copier claim. A copier contains a scanner and a printer.  
Scanning a song is in a very different category from printing the canned song. 
If I am licensed to play the song and have software that will play it from the 
scanned image, that performance is legal.

As to recording the service, that again is not a question of what equipment you 
use but of what you use it for. The legal issues are the same whether you make 
a wire recording, a tape recording or a digital recording.

Maybe you should go back to law school and take a refresher course.

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
Tony Thigpen 
Sent: Tuesday, February 27, 2018 2:22 PM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: Product license key program

Seymour,

You knowledge of music copyright is incorrect. In many cases it *does* matter 
what equipment.

I am involved with the copyright issues with songs at our church. I have to 
account separately for:

1) A pre-printed copy of the song, such as a hymnal
2) A 'copy' of the song printed locally on a printer or copier
2) The display of the song on a projector during the service

And, if I record the worship services, I have to account for:
1) Did the audio recording of our people singing the song get recorded>
2) Did the video of the service actually capture display of the song by the 
projector on the screen?

And, as for the recordings,
1) If I play back the audio or video to a assembly, then that is another item 
to be accounted for.
2) If I make a DVD and send it to someone outside our congergation, then it has 
to be accounted for.

Tony Thigpen

Seymour J Metz wrote on 02/26/2018 12:48 PM:
> It's fair when the vendor assumes the risk. It's not fair when the customer 
> has bee left holding the bag. "product keys are just any other license 
> enforcement" is not even close. If I license, e.g., a copyrighted song for 
> use in a movie, it doesn't matter what equipment I use to play the song or to 
> record it in the movie. The enforcement is via legal proceedings that the 
> vendor does not invoke capriciously, but only when he has good reason to 
> believe that I am in violation of the license terms.
>
> Software keys, OTOH, can and have caused problems for legitimate users. Some 
> are more reliable than others, but I see nothing wrong with a shop refusing 
> to use a product because they are not willing to assume the risk. If you are 
> really confident that there is no risk, add an indemnification clause to your 
> contract and I'll 

Re: Product license key program

2018-02-27 Thread Schuffenhauer, Mark
My thought is simply, license keys make it easier (but not always 100%) to 
protect the intellectual property that belongs to the owner.  It in most cases 
prevents the expense of having to resort to investigation and litigation of 
something.  

I think its great Tony takes the time to properly account in his example. 

 Some people are careless, some are less rigorous, and some people are 
criminal.  License keys and other items that reduce simplicity in product 
installation and maintenance are a bit to avoid the first two items, and aimed 
squarely at the criminals.  

From a non-legal standpoint, but from an impacted person standpoint, I 
understand where owners of all intellectual/copyrighted property are coming 
from.  At times it's a pain below my back, but I get it. 

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Seymour J Metz
Sent: Tuesday, February 27, 2018 3:24 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Product license key program

No. 

The relevant difference between copying the sheet music and singing it has 
nothing to do with the equipment used, but with what that equipment is used to 
do. Making copies not covered by fair use or license is a violation regardless 
of the hardware used. The Devil is in the details.

Let's take your copier claim. A copier contains a scanner and a printer.  
Scanning a song is in a very different category from printing the canned song. 
If I am licensed to play the song and have software that will play it from the 
scanned image, that performance is legal.

As to recording the service, that again is not a question of what equipment you 
use but of what you use it for. The legal issues are the same whether you make 
a wire recording, a tape recording or a digital recording.

Maybe you should go back to law school and take a refresher course.

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
Tony Thigpen 
Sent: Tuesday, February 27, 2018 2:22 PM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: Product license key program

Seymour,

You knowledge of music copyright is incorrect. In many cases it *does* matter 
what equipment.

I am involved with the copyright issues with songs at our church. I have to 
account separately for:

1) A pre-printed copy of the song, such as a hymnal
2) A 'copy' of the song printed locally on a printer or copier
2) The display of the song on a projector during the service

And, if I record the worship services, I have to account for:
1) Did the audio recording of our people singing the song get recorded>
2) Did the video of the service actually capture display of the song by the 
projector on the screen?

And, as for the recordings,
1) If I play back the audio or video to a assembly, then that is another item 
to be accounted for.
2) If I make a DVD and send it to someone outside our congergation, then it has 
to be accounted for.

Tony Thigpen

Seymour J Metz wrote on 02/26/2018 12:48 PM:
> It's fair when the vendor assumes the risk. It's not fair when the customer 
> has bee left holding the bag. "product keys are just any other license 
> enforcement" is not even close. If I license, e.g., a copyrighted song for 
> use in a movie, it doesn't matter what equipment I use to play the song or to 
> record it in the movie. The enforcement is via legal proceedings that the 
> vendor does not invoke capriciously, but only when he has good reason to 
> believe that I am in violation of the license terms.
>
> Software keys, OTOH, can and have caused problems for legitimate users. Some 
> are more reliable than others, but I see nothing wrong with a shop refusing 
> to use a product because they are not willing to assume the risk. If you are 
> really confident that there is no risk, add an indemnification clause to your 
> contract and I'll take your confidence seriously. If you don't trust it 
> enough to have such a clause, why should a potential customer trust it?
>
>
> --
> Shmuel (Seymour J.) Metz
> http://mason.gmu.edu/~smetz3
>
> 
> From: IBM Mainframe Discussion List  on 
> behalf of ITschak Mugzach 
> Sent: Monday, February 26, 2018 12:37 PM
> To: IBM-MAIN@listserv.ua.edu
> Subject: Re: Product license key program
>
> Shmuel,
>
> Vendors are busy in developing products, not in tracing/tracking their 
> clients. product keys are just any other license enforcement (eg.
> electricity, water and any product that you pay per use. Capacity is 
> just another way to limit q measure usage. Sound fair to me.
>
> ITschak
>
> On Mon, Feb 26, 2018 at 7:11 PM, Seymour J Metz  wrote:
>
>> And vendors using keys sometimes victimize honest customers. BTDT,GTS.
>>
>> For all of you vendors: it is a fact of life that most vendors have 
>> 

Re: Product license key program

2018-02-27 Thread Charles Mills
And many years ago (~1997?), there was some movement to get multiple vendors 
onto the same page. It fell apart due to anti-trust considerations. If CA and 
BMC and Compuware all got together and licensed their software "the same way" 
it would be a combination in restraint of trade. Anti-trust law sees it as a 
benefit if customers have choices. As we know from many fields -- have you 
re-evaluated how you purchase TV programming recently? -- too many choices is 
often a problem of its own.

Your supposition is amusing but employee mobility is probably a more likely 
explanation. "And then we issue a STCKF in the exit routine" just does not make 
for very romantic pillow talk. IMHO. Your mileage may vary.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Jesse 1 Robinson
Sent: Tuesday, February 27, 2018 2:18 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Product license key program

There's the rub. No two vendors manage keys the same way. This creates a 
micro-specialty in every shop for every vendor. Maybe more than one if 
different products are managed differently. 

If you should find the same technology inhabiting two vendor's suites, you can 
be sure that someone's spouse has been diddling someone else's spouse. Pillow 
talk. 

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Product license key program

2018-02-27 Thread Jesse 1 Robinson
There's the rub. No two vendors manage keys the same way. This creates a 
micro-specialty in every shop for every vendor. Maybe more than one if 
different products are managed differently. 

If you should find the same technology inhabiting two vendor's suites, you can 
be sure that someone's spouse has been diddling someone else's spouse. Pillow 
talk. 

.
.
J.O.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler 
SHARE MVS Program Co-Manager
323-715-0595 Mobile
626-543-6132 Office ⇐=== NEW
robin...@sce.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Charles Mills
Sent: Tuesday, February 27, 2018 1:03 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: (External):Re: Product license key program

> And please, let's not start the whole "to key or not to key" 
> discussion again

I tried. :-(

The OP's question was not "are software keys popular, a good idea, or fair?" 
The OP's question was about technology.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Charles Mills
Sent: Sunday, February 25, 2018 9:47 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Product license key program

As the author of such software, let me confirm what others have said: each 
vendor does things its own way -- or perhaps not at all. CA has a central 
"server" program for administering licenses; the software I am responsible for 
has the licensing embedded in the program itself.

The exact technology is proprietary and a trade secret. To say "we do X and Y 
and Z" would be to facilitate its defeat by a dishonest customer.

[And please, let's not start the whole "to key or not to key" discussion again. 
Vendor keys are a fact of life. Yes, they can be a PITA. Most customers are 
honest -- beyond honest to the point of paranoia -- but a few are not. And 
honest customers sometimes make honest mistakes.]

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: (MBP and) macbook air and keyboard emulation

2018-02-27 Thread Pew, Curtis G
On Feb 27, 2018, at 2:41 PM, Martin Packer  wrote:
> 
> Where did you get a version of c3270 from for Mac? And how up to date is 
> it relative to Development versions?

It looks like c3270 is available from MacPorts, version 3.3.15ga9. From the 
x3270 site, it looks like 3.6ga5 was just released. (I sometimes use x3270 
installed from MacPorts, so I know that works.)


-- 
Pew, Curtis G
curtis@austin.utexas.edu
ITS Systems/Core/Administrative Services

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: (MBP and) macbook air and keyboard emulation

2018-02-27 Thread Thomas David Rivers

Martin Packer wrote:

Where did you get a version of c3270 from for Mac? And how up to date is 
it relative to Development versions?


Thanks, Martin

Martin Packer

zChampion, Systems Investigator & Performance Troubleshooter, IBM

+44-7802-245-584

email: martin_pac...@uk.ibm.com

 


I don't have a c3270 version for the mac;  I wind up using telnet
(or ssh) to a UNIX box at work and invoke c3270 there.

So - on the mac - it's just a "terminal window".

 - Dave R. -


--
riv...@dignus.comWork: (919) 676-0847
Get your mainframe programming tools at http://www.dignus.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Hardware upgrade z13 to z14....Yikes

2018-02-27 Thread Jesse 1 Robinson
It's been a while since we in a position do a straight upgrade. If your 
(re)seller tells you that you'll have the same serial number, that should be 
the case. But if so, the original box should have been transformed into a new 
one, so I don't see how there would be any opportunity to connect them 
together. Seller will need to explain that. 

HMC is technically a part number of a CEC complex, so if new HMC hardware is 
needed, it should be included in the upgrade. You ought to be able to have a 
fully capable HMC with software already in place before the CEC upgrade.

Again, I don't think you can have two boxes side by side with the same serial 
number. Please get your seller to clarify that.  

.
.
J.O.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler 
SHARE MVS Program Co-Manager
323-715-0595 Mobile
626-543-6132 Office ⇐=== NEW
robin...@sce.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Alan(GMAIL)Watthey
Sent: Monday, February 26, 2018 10:19 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: (External):Re: Hardware upgrade z13 to z14Yikes

We are in the early stages of doing an 'upgrade' and we have been told that 
this means the serial number does not change (obviously the model number does). 
 An 'upgrade' is much cheaper allegedly.

Same serial number CPCs must apparently never see each other so I've set up a 
VLAN on the HMCLAN just for this new CPC and it's HMC.  We've put one of the 
new HMCs on the prod LAN and one on the segregated LAN.  We'll switch them both 
to the prod LAN when the old CPC is disconnected.

Also your existing HMCs (if you keep any) may not be able to see the new CPC 
without a software upgrade which their hardware may not be able to support.
The new HMCs will see the old CPCs (if you have any) without issue (once on the 
same LAN).

Some software checks the model number when doing a serial number check so even 
when the serial number stays the same they will need a new code.

We plan to test the new box and then change over to it in its entirety in one 
go.  We have a few spare ports on our Ficon Directors but nowhere near enough 
to connect new and old in their entirety so I'm connecting a few CHPIDs up 
front to give access and then moving the rest over during the changeover.  
They'll already all be in the IO defs everywhere as I'll change the port 
address (old to new) on the Ficon Director as I swap the cables.

Regards,
Alan Watthey

-Original Message-
From: Ward, Mike S [mailto:mw...@ssfcu.org]
Sent: 26 February 2018 7:28 pm
Subject: Re: Hardware upgrade z13 to z14Yikes

What also comes to mind, if you have 3rd party software make sure to contact 
them about the new CPU. Even if it's a 1 to 1 swap they may want to charge an 
upgrade fee. You also have a new CPU serial number so make sure any 3rd party 
software that requires a specific cpu serial number is updated.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Product license key program

2018-02-27 Thread Seymour J Metz
You can, and did, misrepresent the position of those who object to license 
keys. The issue isn't protecting the  software; the issue is the means used to 
do so and the collateral damage from those means.

If you have someone willing to steal your product, then he will also be willing 
to patch it to bypass the license check? Illegal, sure, and I hope that you 
nail anybody who does so, but still inevitable.

As for support of stolen copies, that's a separate issue from preventing the 
product from running. Use of keys et al in the support process doesn't have the 
same potential for collateral damage.

Microsoft? They have a vested interest in lying about their reasons; they want 
to force bundling, and have been very successful at it.

Of course, after inventing straw dummies and openly being facetious  you ar 
likely to get sarcastic replies; if you didn't want sarcasm then you should 
have used honest and polite argument.

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
Brian Westerman 
Sent: Monday, February 26, 2018 9:27 PM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: Product license key program

If someone violates a copyright, there are legal and I think criminal 
penalties.  But I doubt the FBI will get involved if you decided not to pay CA 
for using Panvalet.

You can't over simplify the issue and decide categorically that all vendors 
that want to "protect" their software are bad.  Just like people, there are 
indeed some bad vendors, whether or not they have product "protection" doesn't 
enter into the equation.

How would a vendor even know that someone didn't take a "personal" copy of 
their unprotected code from site A to site B?  Does that happen, it sure does.

Microsoft did a study several years back on how much time they spent fixing 
problems and helping people who had pirated copies of their code, and it was 
something on the order of 38%.  That didn't mean that 38% of the people running 
Windows were running pirated copies, just that during their study, 38% of the 
people who called gave pirated copy codes.

They were losing more money on the support of the code for the pirated versions 
than was deemed "acceptable".  The same problem can (and likely is) true for 
other vendors.  Several of our Syzygy products come with parts that are not 
protected by keys or code.  We frequently get calls from people who are not out 
customers to fix (usually the same problem over and over again) problems with 
the unprotected code who are not very happy when we inform them that we can't 
offer them support for the code without them being an actual client, but that 
doesn't stop them from trying.

We had a person, just a few months ago, (who is a member of this list and knows 
who I am talking about), who called with a "problem" for our SyzInfo program 
(it's a small program we send to sites to display their site information, CPU, 
LPAR, SYSPLEX, MEMORY info, etc., a lot of interesting information) because 
they just got a z13 and our code supposedly didn't support it yet.  It worked, 
but didn't give "completely valid" results.  We actually added support for the 
box over 18 months before it came out, so we were fairly perplexed.  When asked 
for his site-ID, he gave it, (it turned out to be one from his old site) and we 
emailed him the new code for his whole product matrix (4 complete products and 
support modules).  Then we received a call from him to tell us that the new 
products would "no longer" operate on his CPU.  When we asked for the CPU type 
and serial, he gave us his old serial from the old shop, so the client support 
people re-verified and sent out a new copy even though there was no real 
changes made.  He told us that it still didn't work so we asked him to execute 
SyzInfo and send a screen print of the results.  Instead of the screen print, 
he "supposedly" cut/pasted the results which showed that the product thought 
exactly what was running was what we shipped.  He escalated the problem (which 
sent it to me), to be resolved, and I asked him to re-execute SyzInfo for the 
screen print and got the same cut/paste thing, but it was different from the 
original one he sent the day before.  The new one had several of the values 
transposed and the CPU was now a EC12 not a z13 as he had originally reported 
having the problem with in the first place.  I called him and got one of his 
co-workers who told me that they were not running our code, and he had no idea 
what I was talking about.  It turned out that they were running a z13 and never 
had a EC12 (they upgraded from a z10 recently).  I explained what had just 
happened and was told that he would talk to his boss and that they would handle 
the "problem".

We never heard back from the person or that site again, but they still 
participate on this site.  When I contacted 

Re: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE

2018-02-27 Thread Seymour J Metz
CONSOLE has been around since Old Man Noach cornered the market in Gopher Wood, 
well before V2R10. 


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
Carmen Vitullo 
Sent: Tuesday, February 27, 2018 11:57 AM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE

I was thinking that also, but I was not sure that feature was available in 
OS/390 2.10




Carmen Vitullo

- Original Message -

From: "Lionel B. Dyck (TRA)" 
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Tuesday, February 27, 2018 10:54:26 AM
Subject: Re: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE

If you are authorized to use the TSO CONSOLE command then you can also use it 
to capture the output of your command

"CONSPROF SOLDISP(no) SOLNUM(400) UNSOLDISP(yes)"
"CONSOLE ACTIVATE"
"CONSOLE SYSCMD(D M=CONFIG(P1)) "
rc = GETMSG('t.','sol',,,30)
"CONSOLE DEACTIVATE"

--
Lionel B. Dyck <
Mainframe Systems Programmer - TRA


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Carmen Vitullo
Sent: Tuesday, February 27, 2018 10:46 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE

do you have SDSF or IOF, you can capture the output from console command in the 
output SYSTSPRT ?
some examples come to mind



//TSO EXEC PGM=IKJEFT01,REGION=0M,
// DYNAMNBR=99
//SYSTSPRT DD SYSOUT=*
//SYSTSIN DD *
SDSF
//ISFIN DD *
SET DELAY 40
W/RO PROD,D M=CONFIG(P1)
ULOG
//ISFOUT DD SYSOUT=*




or





//SDSF EXEC PGM=ISFAFD
//SYSTSPRT DD SYSOUT=*
//ISFIN DD *
/D LOGGER,LOGSTREAM
//ISFOUT DD SYSOUT=*

Carmen Vitullo

- Original Message -

From: "Tony Thigpen" 
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Tuesday, February 27, 2018 10:18:31 AM
Subject: capture output from DS QD,TYPE=ALL,ONLINE

I need to capture the output from a DS QD,TYPE=ALL,ONLINE on an OS/390
2.10 system. (Yep, before some of the current tools.)

Any thoughts?

--
Tony Thigpen

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: BPX mvssigsetup, the SIR, and ignoring Signal #9 (SIGKILL)

2018-02-27 Thread Denis
Defering to indefinite is probably the same as ignore...

https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.3.0/com.ibm.zos.v2r3.bpxb100/bpx2cr_Delayed_signal_delivery.htm

-Original Message-
From: John McKown 
To: IBM-MAIN 
Sent: Tue, Feb 27, 2018 10:05 PM
Subject: Re: BPX mvssigsetup, the SIR, and ignoring Signal #9 (SIGKILL)


On Tue, Feb 27, 2018 at 2:39 PM, Thomas David Rivers riv...@dignus.com>
wrote:

> On a typical UNIX platform, the operating system enforces the rule that
> signal #9 cannot be blocked, and that a process that receives
> that signal will be removed from the process table (and thus "killed".)
>
> I've been setting up a BPX signal handler in some ASM code; using the BPX
> mvssigsetup() function, writing a SIR, etc...
>
> What I have discovered is that there seems to be nothing in z/OS that
> enforces the "signal #9 can't be intercepted" rule... my routines can't
> block that signal, but they are totally happy to receive it, ignore it
> and return back to the executing program.   The program isn't summarily
> "killed".
>
> I can't seem to find any particular documentation on the point, but I
> suppose
> in the event my program receives signal #9 - it's up to the program itself
> to die (perhaps horribly?) and it's not a function of the operating system?
>
> Because I'm not processing signal #9 and just returning to the point
> of the signal; I've essentially created an unkillable process... which
> could
> be a denial-of-service if nothing else.  Seems like you could easily fork()
> (which can create an unassociated task) and just catch signal #9 all day
> long.  I suppsoe the operator can still cancel the task somehow...  You can
> send my process a signal #9 all day long, and merrily continues on.
>
> But - a UNIX programmer would certainly be quite "flummoxed" at this
> behavior.
>
> Does anyone have any pointers about this?
>

​How about some more confusion.

On this page about mvssigsetup()"
https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.3.0/com.ibm.zos.v2r3.bpxb100/mss.htm;
 
target="_blank">https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.3.0/com.ibm.zos.v2r3.bpxb100/mss.htm
​
[quote]

Default_override_signal_setSupplied parameterType:Character stringCharacter
set:No restrictionLength:8 bytes

The name of an 8-byte area containing a 64-bit mask of signals that the SIR
processes when their respective default actions take place. The leftmost
bit represents signal number 1, and the rightmost bit represents signal
number 64. The signals SIGSTOP, SIGDUMP, and SIGTRACE cannot be
intercepted. The bit positions that represent these signals are ignored.

[/quote]

On this page about BPXYSIGH
https://www.ibm.com/support/knowledgecenter/SSLTBW_2.3.0/com.ibm.zos.v2r3.bpxb100/ysigh.htm;
 
target="_blank">https://www.ibm.com/support/knowledgecenter/SSLTBW_2.3.0/com.ibm.zos.v2r3.bpxb100/ysigh.htm

[quote]

 BPXYSIGH   ,
** BPXYSIGH: Component signal definition
**  Used By: KIL SIA SPM
*
* Signals with default action ABNORMAL TERMINATION
SIGKILL#   EQU   9   Termination (cannot be caught or ignored)
SIGDUMP#   EQU  39   Take a SYSMDUMP
* Signals with default action STOP
SIGSTOP#   EQU   7   Stop (cannot be caught or ignored)
SIGTHSTOP# EQU  34   Thread stop (cannot be caught or blocked or
SIGTHCONT# EQU  35   Thread continue (cannot be caught or blocked or
*ignored)



[/quote]

​The two pages disagree on what cannot be caught or ignored.​




>
> And - on receipt of signal #9 - what is the "good and proper" way to
> terminate
> the program?  BPX _exit() or something else?
>

​"good and proper"? I don't really know. How about the old stand by ABEND ?
To be really nasty, CALLRTM TYPE=MEMTERM ​



>  - Thanks -
>  - Dave Rivers -
>
> --
> mailto:riv...@dignus.com;>riv...@dignus.com  
>  Work: (919) 676-0847
> Get your mainframe programming tools at http://www.dignus.com; 
> target="_blank">http://www.dignus.com
>
>

-- 
I have a theory that it's impossible to prove anything, but I can't prove
it.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to mailto:lists...@listserv.ua.edu;>lists...@listserv.ua.edu with the 
message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Product license key program

2018-02-27 Thread Seymour J Metz
No. 

The relevant difference between copying the sheet music and singing it has 
nothing to do with the equipment used, but with what that equipment is used to 
do. Making copies not covered by fair use or license is a violation regardless 
of the hardware used. The Devil is in the details.

Let's take your copier claim. A copier contains a scanner and a printer.  
Scanning a song is in a very different category from printing the canned song. 
If I am licensed to play the song and have software that will play it from the 
scanned image, that performance is legal.

As to recording the service, that again is not a question of what equipment you 
use but of what you use it for. The legal issues are the same whether you make 
a wire recording, a tape recording or a digital recording.

Maybe you should go back to law school and take a refresher course.

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
Tony Thigpen 
Sent: Tuesday, February 27, 2018 2:22 PM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: Product license key program

Seymour,

You knowledge of music copyright is incorrect. In many cases it *does*
matter what equipment.

I am involved with the copyright issues with songs at our church. I have
to account separately for:

1) A pre-printed copy of the song, such as a hymnal
2) A 'copy' of the song printed locally on a printer or copier
2) The display of the song on a projector during the service

And, if I record the worship services, I have to account for:
1) Did the audio recording of our people singing the song get recorded>
2) Did the video of the service actually capture display of the song by
the projector on the screen?

And, as for the recordings,
1) If I play back the audio or video to a assembly, then that is another
item to be accounted for.
2) If I make a DVD and send it to someone outside our congergation, then
it has to be accounted for.

Tony Thigpen

Seymour J Metz wrote on 02/26/2018 12:48 PM:
> It's fair when the vendor assumes the risk. It's not fair when the customer 
> has bee left holding the bag. "product keys are just any other license 
> enforcement" is not even close. If I license, e.g., a copyrighted song for 
> use in a movie, it doesn't matter what equipment I use to play the song or to 
> record it in the movie. The enforcement is via legal proceedings that the 
> vendor does not invoke capriciously, but only when he has good reason to 
> believe that I am in violation of the license terms.
>
> Software keys, OTOH, can and have caused problems for legitimate users. Some 
> are more reliable than others, but I see nothing wrong with a shop refusing 
> to use a product because they are not willing to assume the risk. If you are 
> really confident that there is no risk, add an indemnification clause to your 
> contract and I'll take your confidence seriously. If you don't trust it 
> enough to have such a clause, why should a potential customer trust it?
>
>
> --
> Shmuel (Seymour J.) Metz
> http://mason.gmu.edu/~smetz3
>
> 
> From: IBM Mainframe Discussion List  on behalf of 
> ITschak Mugzach 
> Sent: Monday, February 26, 2018 12:37 PM
> To: IBM-MAIN@listserv.ua.edu
> Subject: Re: Product license key program
>
> Shmuel,
>
> Vendors are busy in developing products, not in tracing/tracking their
> clients. product keys are just any other license enforcement (eg.
> electricity, water and any product that you pay per use. Capacity is just
> another way to limit q measure usage. Sound fair to me.
>
> ITschak
>
> On Mon, Feb 26, 2018 at 7:11 PM, Seymour J Metz  wrote:
>
>> And vendors using keys sometimes victimize honest customers. BTDT,GTS.
>>
>> For all of you vendors: it is a fact of life that most vendors have
>> competitors and that some shops will give their money to the vendor that
>> does not treat them like criminals. Of course, if you are willing to sign a
>> contract with big penalty clauses for a malfunctioning key checking routine
>> or key delivery system, that will help to reduce the competitive edge, but
>> I won't hold my breathe.
>>
>>
>> --
>> Shmuel (Seymour J.) Metz
>> http://mason.gmu.edu/~smetz3
>>
>> 
>> From: IBM Mainframe Discussion List  on behalf
>> of Charles Mills 
>> Sent: Sunday, February 25, 2018 12:47 PM
>> To: IBM-MAIN@listserv.ua.edu
>> Subject: Re: Product license key program
>>
>> As the author of such software, let me confirm what others have said: each
>> vendor does things its own way -- or perhaps not at all. CA has a central
>> "server" program for administering licenses; the software I am responsible
>> for has the licensing embedded in the program itself.
>>
>> The exact technology is proprietary and a trade 

Re: BPX mvssigsetup, the SIR, and ignoring Signal #9 (SIGKILL)

2018-02-27 Thread John McKown
On Tue, Feb 27, 2018 at 2:39 PM, Thomas David Rivers 
wrote:

> On a typical UNIX platform, the operating system enforces the rule that
> signal #9 cannot be blocked, and that a process that receives
> that signal will be removed from the process table (and thus "killed".)
>
> I've been setting up a BPX signal handler in some ASM code; using the BPX
> mvssigsetup() function, writing a SIR, etc...
>
> What I have discovered is that there seems to be nothing in z/OS that
> enforces the "signal #9 can't be intercepted" rule... my routines can't
> block that signal, but they are totally happy to receive it, ignore it
> and return back to the executing program.   The program isn't summarily
> "killed".
>
> I can't seem to find any particular documentation on the point, but I
> suppose
> in the event my program receives signal #9 - it's up to the program itself
> to die (perhaps horribly?) and it's not a function of the operating system?
>
> Because I'm not processing signal #9 and just returning to the point
> of the signal; I've essentially created an unkillable process... which
> could
> be a denial-of-service if nothing else.  Seems like you could easily fork()
> (which can create an unassociated task) and just catch signal #9 all day
> long.  I suppsoe the operator can still cancel the task somehow...  You can
> send my process a signal #9 all day long, and merrily continues on.
>
> But - a UNIX programmer would certainly be quite "flummoxed" at this
> behavior.
>
> Does anyone have any pointers about this?
>

​How about some more confusion.

On this page about mvssigsetup()"
https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.3.0/com.ibm.zos.v2r3.bpxb100/mss.htm
​
[quote]

Default_override_signal_setSupplied parameterType:Character stringCharacter
set:No restrictionLength:8 bytes

The name of an 8-byte area containing a 64-bit mask of signals that the SIR
processes when their respective default actions take place. The leftmost
bit represents signal number 1, and the rightmost bit represents signal
number 64. The signals SIGSTOP, SIGDUMP, and SIGTRACE cannot be
intercepted. The bit positions that represent these signals are ignored.

[/quote]

On this page about BPXYSIGH
https://www.ibm.com/support/knowledgecenter/SSLTBW_2.3.0/com.ibm.zos.v2r3.bpxb100/ysigh.htm

[quote]

BPXYSIGH   ,
** BPXYSIGH: Component signal definition
**  Used By: KIL SIA SPM
*
* Signals with default action ABNORMAL TERMINATION
SIGKILL#   EQU   9   Termination (cannot be caught or ignored)
SIGDUMP#   EQU  39   Take a SYSMDUMP
* Signals with default action STOP
SIGSTOP#   EQU   7   Stop (cannot be caught or ignored)
SIGTHSTOP# EQU  34   Thread stop (cannot be caught or blocked or
SIGTHCONT# EQU  35   Thread continue (cannot be caught or blocked or
*ignored)



[/quote]

​The two pages disagree on what cannot be caught or ignored.​




>
> And - on receipt of signal #9 - what is the "good and proper" way to
> terminate
> the program?  BPX _exit() or something else?
>

​"good and proper"? I don't really know. How about the old stand by ABEND ?
To be really nasty, CALLRTM TYPE=MEMTERM ​



>  - Thanks -
>  - Dave Rivers -
>
> --
> riv...@dignus.comWork: (919) 676-0847
> Get your mainframe programming tools at http://www.dignus.com
>
>

-- 
I have a theory that it's impossible to prove anything, but I can't prove
it.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Product license key program

2018-02-27 Thread Charles Mills
> And please, let's not start the whole "to key or not to key" discussion again

I tried. :-(

The OP's question was not "are software keys popular, a good idea, or fair?" 
The OP's question was about technology.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Charles Mills
Sent: Sunday, February 25, 2018 9:47 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Product license key program

As the author of such software, let me confirm what others have said: each 
vendor does things its own way -- or perhaps not at all. CA has a central 
"server" program for administering licenses; the software I am responsible for 
has the licensing embedded in the program itself.

The exact technology is proprietary and a trade secret. To say "we do X and Y 
and Z" would be to facilitate its defeat by a dishonest customer.

[And please, let's not start the whole "to key or not to key" discussion again. 
Vendor keys are a fact of life. Yes, they can be a PITA. Most customers are 
honest -- beyond honest to the point of paranoia -- but a few are not. And 
honest customers sometimes make honest mistakes.]

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Hillgang - Last Call

2018-02-27 Thread Neale Ferguson
Last call for registrations for Thursday’s Hillgang meeting in Herndon 
Virginia. Logistics and abstracts: http://www.vm.ibm.com/events/HILL0318.PDF

Registration at: https://doodle.com/poll/fvg86gk7hdkwk6f2

Neale

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: (MBP and) macbook air and keyboard emulation

2018-02-27 Thread Martin Packer
Where did you get a version of c3270 from for Mac? And how up to date is 
it relative to Development versions?

Thanks, Martin

Martin Packer

zChampion, Systems Investigator & Performance Troubleshooter, IBM

+44-7802-245-584

email: martin_pac...@uk.ibm.com

Twitter / Facebook IDs: MartinPacker

Blog: 
https://www.ibm.com/developerworks/mydeveloperworks/blogs/MartinPacker

Podcast Series (With Marna Walle): https://developer.ibm.com/tv/mpt/or 
  
https://itunes.apple.com/gb/podcast/mainframe-performance-topics/id1127943573?mt=2


Youtube channel: https://www.youtube.com/channel/UCu_65HaYgksbF6Q8SQ4oOvA



From:   Thomas David Rivers 
To: IBM-MAIN@LISTSERV.UA.EDU
Date:   27/02/2018 20:14
Subject:Re: (MBP and) macbook air and keyboard emulation
Sent by:IBM Mainframe Discussion List 



Paul Gilmartin wrote:

>On Sun, 25 Feb 2018 10:21:43 +0200, Itschak Mugzach wrote:
> 
>
>>I am using macbook to connect to our (and client's) mainframes. I do not
>>want to change the keyboard map in the emulation product. what is the
>>keyboard mapping for enter, ph11 and pf12?
>>
>> 
>>
>Related question:
>
>I'm considering an MBP.  But can the touch bar be configured to 
transparently
>provide (P)F keys for emulators, X11, VirtualBox, ...
>
>On my old MB I used Keyboard Preferences so I can use F1-F12 without 
using
>a modifier key.
>
>I never mastered PF13-PF24, so that's not a concern.
>
>Thanks,
>gil
>
> 
>
I switched to the latest MacBook pro late last year.

The touch bar is an abomination;  it is simply too easy to accidently
bump into and cause all sorts of havoc.

So - I find that I simply turn it off as much as possible.

I usually use C3270 for my emulator ("txt" mode  in a terminal window) 
and I've
set the terminal window's touch bar to display the function keys... they 
work just
fine (except for accidently bumping into them.)

I haven't tried setting them up with the X3270 port I use on the mac... 
I'm sure it's
possible... but, I've just been so put-off by the touch-bar that I want 
it to just go
away.

As soon as Apple comes out with a new MacBook without the touch bar, I 
will be
opting for that.

- Dave Rivers -

-- 
riv...@dignus.comWork: (919) 676-0847
Get your mainframe programming tools at 
https://urldefense.proofpoint.com/v2/url?u=http-3A__www.dignus.com=DwICaQ=jf_iaSHvJObTbx-siA1ZOg=BsPGKdq7-Vl8MW2-WOWZjlZ0NwmcFSpQCLphNznBSDQ=WN9-3XYebNOL-DDL26zTxHApwGy9sjKpZp-W25v7db0=qXGpvs0h4m0fRO3izwKxbvR0yMXxX9u5KYEZEJ0ARsA=


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN




Unless stated otherwise above:
IBM United Kingdom Limited - Registered in England and Wales with number 
741598. 
Registered office: PO Box 41, North Harbour, Portsmouth, Hampshire PO6 3AU

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


BPX mvssigsetup, the SIR, and ignoring Signal #9 (SIGKILL)

2018-02-27 Thread Thomas David Rivers

On a typical UNIX platform, the operating system enforces the rule that
signal #9 cannot be blocked, and that a process that receives
that signal will be removed from the process table (and thus "killed".)

I've been setting up a BPX signal handler in some ASM code; using the BPX
mvssigsetup() function, writing a SIR, etc...

What I have discovered is that there seems to be nothing in z/OS that
enforces the "signal #9 can't be intercepted" rule... my routines can't
block that signal, but they are totally happy to receive it, ignore it
and return back to the executing program.   The program isn't summarily
"killed".

I can't seem to find any particular documentation on the point, but I 
suppose

in the event my program receives signal #9 - it's up to the program itself
to die (perhaps horribly?) and it's not a function of the operating system?

Because I'm not processing signal #9 and just returning to the point
of the signal; I've essentially created an unkillable process... which could
be a denial-of-service if nothing else.  Seems like you could easily fork()
(which can create an unassociated task) and just catch signal #9 all day
long.  I suppsoe the operator can still cancel the task somehow...  You can
send my process a signal #9 all day long, and merrily continues on.

But - a UNIX programmer would certainly be quite "flummoxed" at this
behavior.

Does anyone have any pointers about this?

And - on receipt of signal #9 - what is the "good and proper" way to 
terminate
the program?  BPX _exit() or something else?  


 - Thanks -
 - Dave Rivers -

--
riv...@dignus.comWork: (919) 676-0847
Get your mainframe programming tools at http://www.dignus.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: (MBP and) macbook air and keyboard emulation

2018-02-27 Thread Thomas David Rivers

Paul Gilmartin wrote:


On Sun, 25 Feb 2018 10:21:43 +0200, Itschak Mugzach wrote:
 


I am using macbook to connect to our (and client's) mainframes. I do not
want to change the keyboard map in the emulation product. what is the
keyboard mapping for enter, ph11 and pf12?

   


Related question:

I'm considering an MBP.  But can the touch bar be configured to transparently
provide (P)F keys for emulators, X11, VirtualBox, ...

On my old MB I used Keyboard Preferences so I can use F1-F12 without using
a modifier key.

I never mastered PF13-PF24, so that's not a concern.

Thanks,
gil

 


I switched to the latest MacBook pro late last year.

The touch bar is an abomination;  it is simply too easy to accidently
bump into and cause all sorts of havoc.

So - I find that I simply turn it off as much as possible.

I usually use C3270 for my emulator ("txt" mode  in a terminal window) 
and I've
set the terminal window's touch bar to display the function keys... they 
work just

fine (except for accidently bumping into them.)

I haven't tried setting them up with the X3270 port I use on the mac...  
I'm sure it's
possible... but, I've just been so put-off by the touch-bar that I want 
it to just go

away.

As soon as Apple comes out with a new MacBook without the touch bar, I 
will be

opting for that.

   - Dave Rivers -

--
riv...@dignus.comWork: (919) 676-0847
Get your mainframe programming tools at http://www.dignus.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Data sets incorrectly cataloged to HSM MIGRAT2

2018-02-27 Thread Jesse 1 Robinson
I thought AUDIT USER CATALOG was the way to go. Did I mention that I'm not the 
(even a) storage guy? OTOH why use a rapier when a broad sword will clear the 
arena? So all umpty-ump thousand miscreants were erased from the catalog, and 
CSI now looks quite civilized. As Seymour would say, HSM is not my dog.  

.
.
J.O.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler 
SHARE MVS Program Co-Manager
323-715-0595 Mobile
626-543-6132 Office ⇐=== NEW
robin...@sce.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of retired mainframer
Sent: Tuesday, February 27, 2018 1:41 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: (External):Re: Data sets incorrectly cataloged to HSM MIGRAT2

While it may not fix the error, AUDIT MASTER CATALOG (or USERCATALOG) will 
identify datasets cataloged as migrated which have been recalled or for which 
there is no entry.

> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] 
> On Behalf Of Jeremy Schilke
> Sent: Tuesday, February 27, 2018 12:47 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: Data sets incorrectly cataloged to HSM MIGRAT2
> 
> Unfortunately, HSM does not provide an audit to do what you need.  All 
> of their audits are CDS centric (meaning they start at the CDS and then look 
> at the catalog).


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SYSLOG processing to JES Output product

2018-02-27 Thread Jesse 1 Robinson
We capture system logs--both operlog and syslog--by writing a GDG(+1). Syslog 
is written using PGM=IASXWR00, while operlog is written using PGM=IEAMDBLG. 
Both processes occur around midnight every day of the year. 

One GDG on tape is kept for a long time. Meanwhile we *also* create a disk copy 
with limited retention to allow browsing for recent issues within a few days 
(<=10) of occurrence. 

The reason for writing and keeping both syslog and operlog is partly personal 
comfort zone. Operlog for a sizable sysplex can get pretty cluttered; or so 
some folks think. It's easier to keep both logs than to cram all critters down 
the same rabbit hole. 

.
.
J.O.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler 
SHARE MVS Program Co-Manager
323-715-0595 Mobile
626-543-6132 Office ⇐=== NEW
robin...@sce.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Lizette Koehler
Sent: Tuesday, February 27, 2018 10:37 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: (External):Re: SYSLOG processing to JES Output product

So 

How many lines of output are on SYSLOG Daily/Hourly/Weekly/Monthly

How often will you need to access the archive syslog?

How long will you need to maintain SYSLOG (months/years)

How much storage (DASD or TAPE) can you dedicate to SYSLOG archive?

are you using OPERLOG or native SYSLOG?


Everything is shop dependent

If you use it a lot and can afford to leave on SPOOL Longer, or is it needed to 
offload to dasd as soon as possible

Who the users are will dictate what to do with SYSLOG

Just SYSTEM Folks or all Folks


Lizette


> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] 
> On Behalf Of Peter
> Sent: Tuesday, February 27, 2018 5:16 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: SYSLOG processing to JES Output product
> 
> Hi
> 
> Just wanted to get an idea on how you are all processing your syslog 
> to an JES output management Products (could be anything).
> 
> Are you running SYSLOG offload everyday , weekends ? How long you keep 
> the SYSLOG data online and what are the retention period etc.. ?
> 
> I am trying to set the same thing in my shop but just wanted to know 
> some best practices from you all.
> 
> Peter


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Product license key program

2018-02-27 Thread John McKown
On Tue, Feb 27, 2018 at 1:22 PM, Tony Thigpen  wrote:

> Seymour,
>
> You knowledge of music copyright is incorrect. In many cases it *does*
> matter what equipment.
>
> I am involved with the copyright issues with songs at our church. I have
> to account separately for:
>
> 1) A pre-printed copy of the song, such as a hymnal
> 2) A 'copy' of the song printed locally on a printer or copier
> 2) The display of the song on a projector during the service
>
> And, if I record the worship services, I have to account for:
> 1) Did the audio recording of our people singing the song get recorded>
> 2) Did the video of the service actually capture display of the song by
> the projector on the screen?
>
> And, as for the recordings,
> 1) If I play back the audio or video to a assembly, then that is another
> item to be accounted for.
> 2) If I make a DVD and send it to someone outside our congergation, then
> it has to be accounted for.
>
> Tony Thigpen
>
>
​You bring up good points. I remember reading in a UK site that a person in
London was charged with copyright infringement for a "unlicensed public
performance" of a song simply by singing it out load as he walked down the
street.


-- 
I have a theory that it's impossible to prove anything, but I can't prove
it.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: MQ series - "view" the messages in a QUEUE?

2018-02-27 Thread John McKown
On Tue, Feb 27, 2018 at 1:17 PM, Mark Regan  wrote:

> John,
>
> There is a MQ users web site at http://www.mqseries.net that might be of
> future help to you.
>

​Thanks. I bookmarked it.​



>
>
> On Tue, Feb 27, 2018 at 1:30 PM John McKown 
> wrote:
>
> > On Tue, Feb 27, 2018 at 12:04 PM, John McKown <
> > john.archie.mck...@gmail.com>
> > wrote:
> >
> > > I'm am currently busy trying to read the  manuals on z/OS MQ
> > > Series (release 6.0, believe it or not - and we're not upgrading). What
> > we
> > > have happening is a number of messages going to the APP_ERROR queue. We
> > > only noticed this because on a smaller instance, the "page set" is
> > filling
> > > up with this garbage. Nobody is left who knows MQ at all. So, of
> course,
> > I
> > > am appointed the "instant expert" (we need somebody who know this -
> > you're
> > > appointed - why haven't you got an answer yet?). So, while I'm perusing
> > the
> > > books, does anyone know of an IBM supplied program that I can use which
> > > will "unload" the messages in a QUEUE to a data set? Something like:
> > >
> > > //UNLOADQ EXEC PGM=MAGIC,PARM='QMGR,NAME_OF_QUEUE'
> > > //MESSAGES DD 
> > >
> > > Thanks for any pointers.
> > >
> >
> > ​I managed to find CSQUTIL and the COPY command. That seems to be what I
> > need in this case. I would sincerely like to slap the  who wrote
> > the MQ manuals. I found the CSQUTIL and COPY on one page and _no_
> > documentation on how to use the COPY command or a link to a page
> describing
> > how to use the COPY command. Neither is there a "go to next page" link. I
> > need to have the "contents" displayed on the left side of the page. And,
> > then - infuriatingly, when I click on a URL on the left, the entire page
> > (include the contents portion on the left) scrolls around (because the
> > nimnull who made the site didn't understand iframes?), thus loosing me my
> > place in the contents. I could literal scream! Luckily the KC search
> helped
> > me find what I needed.​
> >
> >
> >
> > >
> > > --
> > > I have a theory that it's impossible to prove anything, but I can't
> prove
> > > it.
> > >
> > > Maranatha! <><
> > > John McKown
> > >
> >
> >
> >
> > --
> > I have a theory that it's impossible to prove anything, but I can't prove
> > it.
> >
> > Maranatha! <><
> > John McKown
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
> --
>
> Regards,
>
> Mark T. Regan
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>



-- 
I have a theory that it's impossible to prove anything, but I can't prove
it.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Product license key program

2018-02-27 Thread Tony Thigpen

Seymour,

You knowledge of music copyright is incorrect. In many cases it *does* 
matter what equipment.


I am involved with the copyright issues with songs at our church. I have 
to account separately for:


1) A pre-printed copy of the song, such as a hymnal
2) A 'copy' of the song printed locally on a printer or copier
2) The display of the song on a projector during the service

And, if I record the worship services, I have to account for:
1) Did the audio recording of our people singing the song get recorded>
2) Did the video of the service actually capture display of the song by 
the projector on the screen?


And, as for the recordings,
1) If I play back the audio or video to a assembly, then that is another 
item to be accounted for.
2) If I make a DVD and send it to someone outside our congergation, then 
it has to be accounted for.


Tony Thigpen

Seymour J Metz wrote on 02/26/2018 12:48 PM:

It's fair when the vendor assumes the risk. It's not fair when the customer has bee left 
holding the bag. "product keys are just any other license enforcement" is not 
even close. If I license, e.g., a copyrighted song for use in a movie, it doesn't matter 
what equipment I use to play the song or to record it in the movie. The enforcement is 
via legal proceedings that the vendor does not invoke capriciously, but only when he has 
good reason to believe that I am in violation of the license terms.

Software keys, OTOH, can and have caused problems for legitimate users. Some 
are more reliable than others, but I see nothing wrong with a shop refusing to 
use a product because they are not willing to assume the risk. If you are 
really confident that there is no risk, add an indemnification clause to your 
contract and I'll take your confidence seriously. If you don't trust it enough 
to have such a clause, why should a potential customer trust it?


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of ITschak 
Mugzach 
Sent: Monday, February 26, 2018 12:37 PM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: Product license key program

Shmuel,

Vendors are busy in developing products, not in tracing/tracking their
clients. product keys are just any other license enforcement (eg.
electricity, water and any product that you pay per use. Capacity is just
another way to limit q measure usage. Sound fair to me.

ITschak

On Mon, Feb 26, 2018 at 7:11 PM, Seymour J Metz  wrote:


And vendors using keys sometimes victimize honest customers. BTDT,GTS.

For all of you vendors: it is a fact of life that most vendors have
competitors and that some shops will give their money to the vendor that
does not treat them like criminals. Of course, if you are willing to sign a
contract with big penalty clauses for a malfunctioning key checking routine
or key delivery system, that will help to reduce the competitive edge, but
I won't hold my breathe.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf
of Charles Mills 
Sent: Sunday, February 25, 2018 12:47 PM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: Product license key program

As the author of such software, let me confirm what others have said: each
vendor does things its own way -- or perhaps not at all. CA has a central
"server" program for administering licenses; the software I am responsible
for has the licensing embedded in the program itself.

The exact technology is proprietary and a trade secret. To say "we do X
and Y and Z" would be to facilitate its defeat by a dishonest customer.

[And please, let's not start the whole "to key or not to key" discussion
again. Vendor keys are a fact of life. Yes, they can be a PITA. Most
customers are honest -- beyond honest to the point of paranoia -- but a few
are not. And honest customers sometimes make honest mistakes.]

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Peter
Sent: Sunday, February 25, 2018 3:55 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Product license key program

Generally which assembler macro or program sets the expiration ?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN





--
ITschak Mugzach
*|** IronSphere Platform* *|* *Information Security Contiguous Monitoring
for Legacy **|  *

--
For IBM-MAIN subscribe / signoff 

Re: SYSLOG processing to JES Output product

2018-02-27 Thread Edward Finnell
IIRC daily house keeping did a Writelog L then s syslog and a print odsn to a 
daily gdg. This was rolled into a monthly and monthly's were rolled into 
yearly's. SYSLOG was kept forever. Production Control and SYSTEMS had access to 
daily's and monthly's. Only SYSTEMS for anything else.
 
Also part of daily house keeping was >$OQ All,a=7,cancel 


In a message dated 2/27/2018 12:36:51 PM Central Standard Time, 
stars...@mindspring.com writes:

 
If you use it a lot and can afford to leave on SPOOL Longer, or is it needed to 
offload to dasd as soon as possible


Who the users are will dictate what to do with SYSLOG

Just SYSTEM Folks or all Folks

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: (MBP and) macbook air and keyboard emulation

2018-02-27 Thread Paul Gilmartin
On Sun, 25 Feb 2018 10:21:43 +0200, Itschak Mugzach wrote:
>
>I am using macbook to connect to our (and client's) mainframes. I do not
>want to change the keyboard map in the emulation product. what is the
>keyboard mapping for enter, ph11 and pf12?
>
Related question:

I'm considering an MBP.  But can the touch bar be configured to transparently
provide (P)F keys for emulators, X11, VirtualBox, ...

On my old MB I used Keyboard Preferences so I can use F1-F12 without using
a modifier key.

I never mastered PF13-PF24, so that's not a concern.

Thanks,
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: MQ series - "view" the messages in a QUEUE?

2018-02-27 Thread Mark Regan
John,

There is a MQ users web site at http://www.mqseries.net that might be of
future help to you.


On Tue, Feb 27, 2018 at 1:30 PM John McKown 
wrote:

> On Tue, Feb 27, 2018 at 12:04 PM, John McKown <
> john.archie.mck...@gmail.com>
> wrote:
>
> > I'm am currently busy trying to read the  manuals on z/OS MQ
> > Series (release 6.0, believe it or not - and we're not upgrading). What
> we
> > have happening is a number of messages going to the APP_ERROR queue. We
> > only noticed this because on a smaller instance, the "page set" is
> filling
> > up with this garbage. Nobody is left who knows MQ at all. So, of course,
> I
> > am appointed the "instant expert" (we need somebody who know this -
> you're
> > appointed - why haven't you got an answer yet?). So, while I'm perusing
> the
> > books, does anyone know of an IBM supplied program that I can use which
> > will "unload" the messages in a QUEUE to a data set? Something like:
> >
> > //UNLOADQ EXEC PGM=MAGIC,PARM='QMGR,NAME_OF_QUEUE'
> > //MESSAGES DD 
> >
> > Thanks for any pointers.
> >
>
> ​I managed to find CSQUTIL and the COPY command. That seems to be what I
> need in this case. I would sincerely like to slap the  who wrote
> the MQ manuals. I found the CSQUTIL and COPY on one page and _no_
> documentation on how to use the COPY command or a link to a page describing
> how to use the COPY command. Neither is there a "go to next page" link. I
> need to have the "contents" displayed on the left side of the page. And,
> then - infuriatingly, when I click on a URL on the left, the entire page
> (include the contents portion on the left) scrolls around (because the
> nimnull who made the site didn't understand iframes?), thus loosing me my
> place in the contents. I could literal scream! Luckily the KC search helped
> me find what I needed.​
>
>
>
> >
> > --
> > I have a theory that it's impossible to prove anything, but I can't prove
> > it.
> >
> > Maranatha! <><
> > John McKown
> >
>
>
>
> --
> I have a theory that it's impossible to prove anything, but I can't prove
> it.
>
> Maranatha! <><
> John McKown
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
-- 

Regards,

Mark T. Regan

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SYSLOG processing to JES Output product

2018-02-27 Thread Lizette Koehler
So 

How many lines of output are on SYSLOG Daily/Hourly/Weekly/Monthly

How often will you need to access the archive syslog?

How long will you need to maintain SYSLOG (months/years)

How much storage (DASD or TAPE) can you dedicate to SYSLOG archive?

are you using OPERLOG or native SYSLOG?


Everything is shop dependent

If you use it a lot and can afford to leave on SPOOL Longer, or is it needed to 
offload to dasd as soon as possible

Who the users are will dictate what to do with SYSLOG

Just SYSTEM Folks or all Folks


Lizette


> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Peter
> Sent: Tuesday, February 27, 2018 5:16 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: SYSLOG processing to JES Output product
> 
> Hi
> 
> Just wanted to get an idea on how you are all processing your syslog to an
> JES output management Products (could be anything).
> 
> Are you running SYSLOG offload everyday , weekends ? How long you keep the
> SYSLOG data online and what are the retention period etc.. ?
> 
> I am trying to set the same thing in my shop but just wanted to know some
> best practices from you all.
> 
> Peter
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send email to
> lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: MQ series - "view" the messages in a QUEUE?

2018-02-27 Thread John McKown
On Tue, Feb 27, 2018 at 12:04 PM, John McKown 
wrote:

> I'm am currently busy trying to read the  manuals on z/OS MQ
> Series (release 6.0, believe it or not - and we're not upgrading). What we
> have happening is a number of messages going to the APP_ERROR queue. We
> only noticed this because on a smaller instance, the "page set" is filling
> up with this garbage. Nobody is left who knows MQ at all. So, of course, I
> am appointed the "instant expert" (we need somebody who know this - you're
> appointed - why haven't you got an answer yet?). So, while I'm perusing the
> books, does anyone know of an IBM supplied program that I can use which
> will "unload" the messages in a QUEUE to a data set? Something like:
>
> //UNLOADQ EXEC PGM=MAGIC,PARM='QMGR,NAME_OF_QUEUE'
> //MESSAGES DD 
>
> Thanks for any pointers.
>

​I managed to find CSQUTIL and the COPY command. That seems to be what I
need in this case. I would sincerely like to slap the  who wrote
the MQ manuals. I found the CSQUTIL and COPY on one page and _no_
documentation on how to use the COPY command or a link to a page describing
how to use the COPY command. Neither is there a "go to next page" link. I
need to have the "contents" displayed on the left side of the page. And,
then - infuriatingly, when I click on a URL on the left, the entire page
(include the contents portion on the left) scrolls around (because the
nimnull who made the site didn't understand iframes?), thus loosing me my
place in the contents. I could literal scream! Luckily the KC search helped
me find what I needed.​



>
> --
> I have a theory that it's impossible to prove anything, but I can't prove
> it.
>
> Maranatha! <><
> John McKown
>



-- 
I have a theory that it's impossible to prove anything, but I can't prove
it.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


MQ series - "view" the messages in a QUEUE?

2018-02-27 Thread John McKown
I'm am currently busy trying to read the  manuals on z/OS MQ Series
(release 6.0, believe it or not - and we're not upgrading). What we have
happening is a number of messages going to the APP_ERROR queue. We only
noticed this because on a smaller instance, the "page set" is filling up
with this garbage. Nobody is left who knows MQ at all. So, of course, I am
appointed the "instant expert" (we need somebody who know this - you're
appointed - why haven't you got an answer yet?). So, while I'm perusing the
books, does anyone know of an IBM supplied program that I can use which
will "unload" the messages in a QUEUE to a data set? Something like:

//UNLOADQ EXEC PGM=MAGIC,PARM='QMGR,NAME_OF_QUEUE'
//MESSAGES DD 

Thanks for any pointers.

-- 
I have a theory that it's impossible to prove anything, but I can't prove
it.

Maranatha! <><
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: SMS/HSM QUESTION

2018-02-27 Thread Mike Schwab
The Track-managed deals with the first 64K cylinders.  The other one
deals with the EAV 21 Cylinder managed portion past the first 64K
cylinders.

On Tue, Feb 27, 2018 at 8:55 AM, willie bunter
<001409bd2345-dmarc-requ...@listserv.ua.edu> wrote:
> Good Day To All,
>
> I am trouble shooting a problem caused by space abends.  I looked at all of 
> the 54 SMS managed volumes
>
> (via ISPF 3.4) and  I found 2,930 dsns which are allocated on this specific 
> Storage Group which were created in Dec.2017 and have not been referenced 
> since their creation.
> According to the Management class, the dsns are to be deleted after 2 days of 
> non reference.  Primary and Secondary Space management are run daily on this 
> Storage Group.  Since the threshold requirements are being met, SMS does not 
> process some of these volumes.  I was thinking of lowering the threshold in 
> order to get SMS to select most of the volumes when Space management is run.
>
> My question is do I modify the Allocation/migration Threshold or the 
> Alloc/Migr Threshold Track-Managed.
>
> Below is threshold settings:
> Allocation/migration Threshold :   High85  
> (1-100)  Low . . 1   (0-99)
> Alloc/Migr Threshold Track-Managed:High85  
> (1-100)  Low . . 1   (0-99)
>
> Thanks in advance for your suggestions.
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



-- 
Mike A Schwab, Springfield IL USA
Where do Forest Rangers go to get away from it all?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: capture output from DS QD,TYPE=ALL,ONLINE

2018-02-27 Thread Tony Thigpen

Thanks. Got it working.

Tony Thigpen

Carmen Vitullo wrote on 02/27/2018 11:46 AM:

do you have SDSF or IOF, you can capture the output from console command in the 
output SYSTSPRT ?
some examples come to mind



//TSO EXEC PGM=IKJEFT01,REGION=0M,
// DYNAMNBR=99
//SYSTSPRT DD SYSOUT=*
//SYSTSIN DD *
SDSF
//ISFIN DD *
SET DELAY 40
W/RO PROD,D M=CONFIG(P1)
ULOG
//ISFOUT DD SYSOUT=*




or





//SDSF EXEC PGM=ISFAFD
//SYSTSPRT DD SYSOUT=*
//ISFIN DD *
/D LOGGER,LOGSTREAM
//ISFOUT DD SYSOUT=*

Carmen Vitullo

- Original Message -

From: "Tony Thigpen" 
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Tuesday, February 27, 2018 10:18:31 AM
Subject: capture output from DS QD,TYPE=ALL,ONLINE

I need to capture the output from a DS QD,TYPE=ALL,ONLINE on an OS/390
2.10 system. (Yep, before some of the current tools.)

Any thoughts?



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE

2018-02-27 Thread Dyck, Lionel B. (TRA)
The CONSOLE command has been around for a very long time - it should be there 
but you have to enable it.

--
Lionel B. Dyck <
Mainframe Systems Programmer - TRA


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Carmen Vitullo
Sent: Tuesday, February 27, 2018 10:58 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE

I was thinking that also, but I was not sure that feature was available in 
OS/390 2.10 




Carmen Vitullo 

- Original Message -

From: "Lionel B. Dyck (TRA)"  
To: IBM-MAIN@LISTSERV.UA.EDU 
Sent: Tuesday, February 27, 2018 10:54:26 AM 
Subject: Re: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE 

If you are authorized to use the TSO CONSOLE command then you can also use it 
to capture the output of your command 

"CONSPROF SOLDISP(no) SOLNUM(400) UNSOLDISP(yes)" 
"CONSOLE ACTIVATE" 
"CONSOLE SYSCMD(D M=CONFIG(P1)) " 
rc = GETMSG('t.','sol',,,30) 
"CONSOLE DEACTIVATE" 

-- 
Lionel B. Dyck < 
Mainframe Systems Programmer - TRA 


-Original Message- 
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Carmen Vitullo 
Sent: Tuesday, February 27, 2018 10:46 AM 
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE 

do you have SDSF or IOF, you can capture the output from console command in the 
output SYSTSPRT ? 
some examples come to mind 



//TSO EXEC PGM=IKJEFT01,REGION=0M, 
// DYNAMNBR=99 
//SYSTSPRT DD SYSOUT=* 
//SYSTSIN DD * 
SDSF 
//ISFIN DD * 
SET DELAY 40 
W/RO PROD,D M=CONFIG(P1) 
ULOG 
//ISFOUT DD SYSOUT=* 




or 





//SDSF EXEC PGM=ISFAFD 
//SYSTSPRT DD SYSOUT=* 
//ISFIN DD * 
/D LOGGER,LOGSTREAM 
//ISFOUT DD SYSOUT=* 

Carmen Vitullo 

- Original Message - 

From: "Tony Thigpen"  
To: IBM-MAIN@LISTSERV.UA.EDU 
Sent: Tuesday, February 27, 2018 10:18:31 AM 
Subject: capture output from DS QD,TYPE=ALL,ONLINE 

I need to capture the output from a DS QD,TYPE=ALL,ONLINE on an OS/390 
2.10 system. (Yep, before some of the current tools.) 

Any thoughts? 

-- 
Tony Thigpen 

-- 
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN 


-- 
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN 

-- 
For IBM-MAIN subscribe / signoff / archive access instructions, 
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE

2018-02-27 Thread Carmen Vitullo
I was thinking that also, but I was not sure that feature was available in 
OS/390 2.10 




Carmen Vitullo 

- Original Message -

From: "Lionel B. Dyck (TRA)"  
To: IBM-MAIN@LISTSERV.UA.EDU 
Sent: Tuesday, February 27, 2018 10:54:26 AM 
Subject: Re: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE 

If you are authorized to use the TSO CONSOLE command then you can also use it 
to capture the output of your command 

"CONSPROF SOLDISP(no) SOLNUM(400) UNSOLDISP(yes)" 
"CONSOLE ACTIVATE" 
"CONSOLE SYSCMD(D M=CONFIG(P1)) " 
rc = GETMSG('t.','sol',,,30) 
"CONSOLE DEACTIVATE" 

-- 
Lionel B. Dyck < 
Mainframe Systems Programmer - TRA 


-Original Message- 
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Carmen Vitullo 
Sent: Tuesday, February 27, 2018 10:46 AM 
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE 

do you have SDSF or IOF, you can capture the output from console command in the 
output SYSTSPRT ? 
some examples come to mind 



//TSO EXEC PGM=IKJEFT01,REGION=0M, 
// DYNAMNBR=99 
//SYSTSPRT DD SYSOUT=* 
//SYSTSIN DD * 
SDSF 
//ISFIN DD * 
SET DELAY 40 
W/RO PROD,D M=CONFIG(P1) 
ULOG 
//ISFOUT DD SYSOUT=* 




or 





//SDSF EXEC PGM=ISFAFD 
//SYSTSPRT DD SYSOUT=* 
//ISFIN DD * 
/D LOGGER,LOGSTREAM 
//ISFOUT DD SYSOUT=* 

Carmen Vitullo 

- Original Message - 

From: "Tony Thigpen"  
To: IBM-MAIN@LISTSERV.UA.EDU 
Sent: Tuesday, February 27, 2018 10:18:31 AM 
Subject: capture output from DS QD,TYPE=ALL,ONLINE 

I need to capture the output from a DS QD,TYPE=ALL,ONLINE on an OS/390 
2.10 system. (Yep, before some of the current tools.) 

Any thoughts? 

-- 
Tony Thigpen 

-- 
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN 


-- 
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN 

-- 
For IBM-MAIN subscribe / signoff / archive access instructions, 
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE

2018-02-27 Thread Dyck, Lionel B. (TRA)
If you are authorized to use the TSO CONSOLE command then you can also use it 
to capture the output of your command

"CONSPROF SOLDISP(no) SOLNUM(400) UNSOLDISP(yes)"
"CONSOLE ACTIVATE"
"CONSOLE SYSCMD(D M=CONFIG(P1)) "
rc = GETMSG('t.','sol',,,30)
"CONSOLE DEACTIVATE"

--
Lionel B. Dyck <
Mainframe Systems Programmer - TRA


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Carmen Vitullo
Sent: Tuesday, February 27, 2018 10:46 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [EXTERNAL] Re: capture output from DS QD,TYPE=ALL,ONLINE

do you have SDSF or IOF, you can capture the output from console command in the 
output SYSTSPRT ? 
some examples come to mind 



//TSO EXEC PGM=IKJEFT01,REGION=0M,
// DYNAMNBR=99
//SYSTSPRT DD SYSOUT=*
//SYSTSIN DD *
SDSF
//ISFIN DD *
SET DELAY 40
W/RO PROD,D M=CONFIG(P1)
ULOG
//ISFOUT DD SYSOUT=* 




or 





//SDSF EXEC PGM=ISFAFD
//SYSTSPRT DD SYSOUT=*
//ISFIN DD *
/D LOGGER,LOGSTREAM
//ISFOUT DD SYSOUT=* 

Carmen Vitullo 

- Original Message -

From: "Tony Thigpen" 
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Tuesday, February 27, 2018 10:18:31 AM
Subject: capture output from DS QD,TYPE=ALL,ONLINE 

I need to capture the output from a DS QD,TYPE=ALL,ONLINE on an OS/390
2.10 system. (Yep, before some of the current tools.) 

Any thoughts? 

--
Tony Thigpen 

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN 


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: capture output from DS QD,TYPE=ALL,ONLINE

2018-02-27 Thread Carmen Vitullo
do you have SDSF or IOF, you can capture the output from console command in the 
output SYSTSPRT ? 
some examples come to mind 



//TSO EXEC PGM=IKJEFT01,REGION=0M, 
// DYNAMNBR=99 
//SYSTSPRT DD SYSOUT=* 
//SYSTSIN DD * 
SDSF 
//ISFIN DD * 
SET DELAY 40 
W/RO PROD,D M=CONFIG(P1) 
ULOG 
//ISFOUT DD SYSOUT=* 




or 





//SDSF EXEC PGM=ISFAFD 
//SYSTSPRT DD SYSOUT=* 
//ISFIN DD * 
/D LOGGER,LOGSTREAM 
//ISFOUT DD SYSOUT=* 

Carmen Vitullo 

- Original Message -

From: "Tony Thigpen"  
To: IBM-MAIN@LISTSERV.UA.EDU 
Sent: Tuesday, February 27, 2018 10:18:31 AM 
Subject: capture output from DS QD,TYPE=ALL,ONLINE 

I need to capture the output from a DS QD,TYPE=ALL,ONLINE on an OS/390 
2.10 system. (Yep, before some of the current tools.) 

Any thoughts? 

-- 
Tony Thigpen 

-- 
For IBM-MAIN subscribe / signoff / archive access instructions, 
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


capture output from DS QD,TYPE=ALL,ONLINE

2018-02-27 Thread Tony Thigpen
I need to capture the output from a DS QD,TYPE=ALL,ONLINE on an OS/390 
2.10 system. (Yep, before some of the current tools.)


Any thoughts?

--
Tony Thigpen

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


SMS/HSM QUESTION

2018-02-27 Thread willie bunter
Good Day To All,

I am trouble shooting a problem caused by space abends.  I looked at all of the 
54 SMS managed volumes

(via ISPF 3.4) and  I found 2,930 dsns which are allocated on this specific 
Storage Group which were created in Dec.2017 and have not been referenced since 
their creation.  
According to the Management class, the dsns are to be deleted after 2 days of 
non reference.  Primary and Secondary Space management are run daily on this 
Storage Group.  Since the threshold requirements are being met, SMS does not 
process some of these volumes.  I was thinking of lowering the threshold in 
order to get SMS to select most of the volumes when Space management is run.  

My question is do I modify the Allocation/migration Threshold or the Alloc/Migr 
Threshold Track-Managed.

Below is threshold settings:  
Allocation/migration Threshold :   High85  (1-100)  
Low . . 1   (0-99)
Alloc/Migr Threshold Track-Managed:High85  (1-100)  
Low . . 1   (0-99)

Thanks in advance for your suggestions.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Problem moved to an outage by XCF recovery?

2018-02-27 Thread Vernooij, Kees (ITOPT1) - KLM
I opened a SR against XCF with IBM, which resulted in the conclusion, that 
there is no simple solution to avoid this situation. 

- Each XCF reacts individually on each CDS problem.
- In our situation, the errors were detected by the SITE2 XCFs accessing the 
Primary CDSs. But they could as well have been detected by the SITE1 XCFs 
accessing the Alternate CDSs in which case the outcome would have been the 
reverse of ours.
- There is no voting, like using SMF weights, to direct the XCF actions into a 
desired direction.

In short, this is how it works.

Kees.


> -Original Message-
> From: Vernooij, Kees (ITOPT1) - KLM
> Sent: 21 February, 2018 10:02
> To: 'IBM-MAIN@listserv.ua.edu' 
> Subject: Problem moved to an outage by XCF recovery?
> 
> Hello Group,
> 
> Last week we had a problem which ended in a full Sysplex outage.
> After extensive searching, I think it was XCF recovery that moved the
> Sysplex to the total outage.
> 
> We run a 2 site Sysplex, with PPRC mirroring between the sites, with
> Primary Dasd in SITE1, with our main production LPARs at SITE1 and GDPS
> to monitor the sites.
> 
> Due to a 'mistake' all Ficon connections between the 2 sites were
> removed, but the InfiniBand connections remained active. So DASD
> mirroring was interrupted, but XCF communication remained working.
> This result unexpectedly in: all SITE1 LPARs down and all SITE2 LPARs
> full with unrecoverable problems.
> 
> After analyzing all logs, we think the following happened:
> - After the last connection between the centers was removed, SITE1 LPARS
> still had access to the Primary Dasd and SITE2 LPARs lost access to the
> Primary Dasd. InfiniBand and XCF connections were not hit. There were
> several hang in applications, e.g. JES2 Checkpoint Locked etc., but
> nothing fatal yet.
> - GDPS declared a FREEZE AND GO. This did not change much, SITE1 still
> had access to the Primary Dasd and SITE2 remained disconnected from the
> Primary Dasd.
> 
> But then:
> - XCF on the SITE2 LPARs detected it lost access to the Primary CDSs and
> moved to the Alternate CDSs.
> - XCF on the SITE1 LPARs were notified of the CDS switches but since
> they had no access to the new Primary CDSs, they all loaded a Waitstate
> 0A2, reason code 010: XCF lost access to all couple data sets.
> Now we ended up with a situation, where our main SITE1 LPARs which still
> had access to the Primary Dasd were brought down and the SITE2 LPARs
> without access to Dasd were left over.
> The only thing remaining was to RESET all SITE2 LPARs and re-IPL the
> SITE1 LPARs.
> 
> Evaluating this makes us conclude that:
> - XCF helped the Sysplex into a total down, because of the SITE2
> reaction on the loss of access to the Primary CDSs.
> - In SFM we specify that our SITE1 LPARs have a much higher weight than
> the SITE2 LPARs, but XCF does not make an SFM analyses, but simply
> reacts directly to the CDS loss event.
> - If the Primary CDSs were located in SITE2, the opposite would have
> happened: SITE1 lost the Primary CDSs (in SITE2), switched to the
> Alternates (in SITE1), which were inaccessible to SITE2 LPARs and they
> would then load a Waitstate 0A2-010.
> This is the way we would have liked the situation was solved.
> 
> The GDPS manuals have some statements about the location of Primary and
> Alternate CDSs, but does not declare a hard recommendation, only a
> 'logical configuration'.
> However, in the GDPS CDS configuration panels, the NORMAL configuration
> defines the Primary CDSs at SITE1 and the Alternates at SITE2. We did
> not find how we can change this.
> Furthermore, GDPS Monitor1 checks the CDS orientation and from Hyperswap
> tests we know that it complains with GEO2643W if we do not change the
> CDS orientation after Hyperswap.
> 
> Should it become a CDS configuration requirement to locate the Primary
> CDSs at the Secondary Dasd site and Alternate CDSs at the Primary Dasd
> site?
> Did I overlook something?
> 
> Regards,
> Kees.
> 
> 


For information, services and offers, please visit our web site: 
http://www.klm.com. This e-mail and any attachment may contain confidential and 
privileged material intended for the addressee only. If you are not the 
addressee, you are notified that no part of the e-mail or any attachment may be 
disclosed, copied or distributed, and that any other action related to this 
e-mail or attachment is strictly prohibited, and may be unlawful. If you have 
received this e-mail by error, please notify the sender immediately by return 
e-mail, and delete this message. 

Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
employees shall not be liable for the incorrect or incomplete transmission of 
this e-mail or any attachments, nor responsible for any delay in receipt. 
Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
Airlines) is registered in Amstelveen, The 

Re: kc4z. I built it, will they come?

2018-02-27 Thread Carmen Vitullo
Good Morning Sue, I just opened a PMR for my issues, I'm sure I must had missed 
a step somewhere. 
thank you 



Carmen Vitullo 

- Original Message -

From: "Susan Shumway"  
To: IBM-MAIN@LISTSERV.UA.EDU 
Sent: Friday, February 23, 2018 8:02:03 PM 
Subject: Re: kc4z. I built it, will they come? 

Hi Carmen, 

Yes, that's probably your best bet. Feel free to report back here in 
case your solution benefits others, as well. 

Yours truly, 
Sue Shumway 


On 02/23/18 1:41 PM, Carmen Vitullo wrote: 
> Hi Susan, I've following this thread due to some issues I'm having with KC, 
> my KC web page on my test LPAR shows no contents after loading collection for 
> z/OS2.2 and CICS/TS 5.2. 
> I'll probably reach out and open a PMR next week since everything setup wise 
> looks ok. 
> 
> 
> 
> Carmen Vitullo 
> 
> - Original Message - 
> 
> From: "Susan Shumway"  
> To: IBM-MAIN@LISTSERV.UA.EDU 
> Sent: Friday, February 23, 2018 11:50:48 AM 
> Subject: Re: kc4z. I built it, will they come? 
> 
> Thanks for the question, Bart. We produce the z/OS KC4c plug-ins to 
> include all the products that are directly included in the z/OS product 
> documentation library. It's up to other products to produce their own 
> sets of plug-ins, so, if you don't see them listed, they likely don't 
> exist. We're also hoping that more products jump on the KC4z bandwagon, 
> so, if there's a product that you'd particularly like to see in that 
> format, ask your IBM rep to request it from the product team. We'll 
> cheer on an eventual complete set of z/OS KC4z content right along with you! 
> 
> While I have you, note that we're soon changing how we deliver z/OS KC4z 
> plug-ins. You'll obtain them nice and easy through FTP instead of 
> Softcopy Librarian. Watch for at least a Flash about it. 
> 
> Yours truly, 
> Sue Shumway 
> 
> 
> On 02/22/18 8:54 AM, van der Grijn, Bart , B wrote: 
>> I installed kc4z in our z/OS 2.3 sandbox system, started up Softcopy 
>> Librarian and downloaded the z/OS 2.3 collection. So far, so good. 
>> How do I get other KnowledgeCenter content? The default source URL 
>> (http://publib.boulder.ibm.com) only show z/OS, z/OS connect and CICS TS. 
>> Where do I find other IBM KC documentation for products like Omegamon and 
>> DB2 to access through kc4z? 
>> 
>> Thanks, 
>> Bart 
>> 
>> -- 
>> For IBM-MAIN subscribe / signoff / archive access instructions, 
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN 
>> 
> 

-- 
Sue Shumway 
z/OS Product Documentation Lead 
IBM Poughkeepsie 
chale...@us.ibm.com 

-- 
For IBM-MAIN subscribe / signoff / archive access instructions, 
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


SYSLOG processing to JES Output product

2018-02-27 Thread Peter
Hi

Just wanted to get an idea on how you are all processing your syslog to an
JES output management Products (could be anything).

Are you running SYSLOG offload everyday , weekends ? How long you keep the
SYSLOG data online and what are the retention period etc.. ?

I am trying to set the same thing in my shop but just wanted to know some
best practices from you all.

Peter

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Data sets incorrectly cataloged to HSM MIGRAT2

2018-02-27 Thread retired mainframer
While it may not fix the error, AUDIT MASTER CATALOG (or USERCATALOG) will 
identify datasets cataloged as migrated which have been recalled or for which 
there is no entry.

> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Jeremy Schilke
> Sent: Tuesday, February 27, 2018 12:47 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: Data sets incorrectly cataloged to HSM MIGRAT2
> 
> Unfortunately, HSM does not provide an audit to do what you need.  All of 
> their audits are
> CDS centric (meaning they start at the CDS and then look at the catalog).

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Data sets incorrectly cataloged to HSM MIGRAT2

2018-02-27 Thread Jeremy Schilke
Unfortunately, HSM does not provide an audit to do what you need.  All of their 
audits are CDS centric (meaning they start at the CDS and then look at the 
catalog).  
There are products out there that can easily do this for you (one at Dino 
Software and the other at Rocket).

I'm concerned with the HDELETE method.  You might delete some valid data sets 
that are migrated to ML2.  
I'd suggest running CSI to isolate the entries you want, then join that with 
DCOLLECT MIGRATEDATA.  You can delete the records based on how they match up.

Good luck!
Jeremy Schilke

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Hardware upgrade z13 to z14....Yikes

2018-02-27 Thread Parwez Hamid
This Redbook should be a good starting point:

http://www.redbooks.ibm.com/abstracts/sg248460.html?Open

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN