Re: Is there a word for that?

2020-09-20 Thread Reg Harbeck
“Dynamically persistent”?

- Reg Harbeck
+1.403.605.7986
Upcoming IBM Systems Magazine webinar, Wed, October 21, 2020 2:00 PM CDT: “If 
It Ain’t Broke, Why Recompile COBOL?” | More info.

> On Sep 20, 2020, at 20:18, Gibney, Dave  wrote:
> 
> I suppose dynamic would work. Today, many more of the parmlib members 
> referenced by IEASYSxx can also be activated on the fly with seT. What I'd 
> like would be a nice table or list showing which ones can be seT. A similar 
> list for JES would be nice, but probably shorter to list those that can't be 
> so changed.
> 
>> -Original Message-
>> From: IBM Mainframe Discussion List  On
>> Behalf Of Jesse 1 Robinson
>> Sent: Sunday, September 20, 2020 12:01 PM
>> To: IBM-MAIN@LISTSERV.UA.EDU
>> Subject: Is there a word for that?
>> 
>> This is a question about categorizing JES2 commands. At one time, when we
>> were still buckling our knickerbockers above the knee, many/most JES2
>> configuration definitions could be modified only by some kind of restart
>> ranging from hot start to warm start to cold start. Some years ago JES2
>> developers got very busy and created command support for all kinds of
>> parameters that previously required some kind of disruption.
>> 
>> The result is that now most JES2 configuration parameters can be modified
>> via $T. In fact, most changes are generally *ignored* during JES2 restarts
>> other than cold start. So here's my question: is there a generally accepted
>> term for 'changeable by command'? It would facilitate communication
>> regarding all kinds of changes. This weekend we scheduled a JES2 change
>> involving layers of administrative rigmarole that was 'implemented' by 
>> editing
>> the JES2 init deck. We eventually issued a $T command after noticing that the
>> desired change did not take effect at IPL. I've heard 'volatile' suggested 
>> for
>> 'changeable by command', but I don't find documentation to support that.
>> Any ideas?
>> 
>> .
>> .
>> J.O.Skip Robinson
>> Southern California Edison Company
>> Electric Dragon Team Paddler
>> SHARE MVS Program Co-Manager
>> 323-715-0595 Mobile
>> 626-543-6132 Office <= NEW
>> robin...@sce.com
>> 
>> 
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is there a word for that?

2020-09-20 Thread Gibney, Dave
I suppose dynamic would work. Today, many more of the parmlib members 
referenced by IEASYSxx can also be activated on the fly with seT. What I'd like 
would be a nice table or list showing which ones can be seT. A similar list for 
JES would be nice, but probably shorter to list those that can't be so changed.

> -Original Message-
> From: IBM Mainframe Discussion List  On
> Behalf Of Jesse 1 Robinson
> Sent: Sunday, September 20, 2020 12:01 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Is there a word for that?
> 
> This is a question about categorizing JES2 commands. At one time, when we
> were still buckling our knickerbockers above the knee, many/most JES2
> configuration definitions could be modified only by some kind of restart
> ranging from hot start to warm start to cold start. Some years ago JES2
> developers got very busy and created command support for all kinds of
> parameters that previously required some kind of disruption.
> 
> The result is that now most JES2 configuration parameters can be modified
> via $T. In fact, most changes are generally *ignored* during JES2 restarts
> other than cold start. So here's my question: is there a generally accepted
> term for 'changeable by command'? It would facilitate communication
> regarding all kinds of changes. This weekend we scheduled a JES2 change
> involving layers of administrative rigmarole that was 'implemented' by editing
> the JES2 init deck. We eventually issued a $T command after noticing that the
> desired change did not take effect at IPL. I've heard 'volatile' suggested for
> 'changeable by command', but I don't find documentation to support that.
> Any ideas?
> 
> .
> .
> J.O.Skip Robinson
> Southern California Edison Company
> Electric Dragon Team Paddler
> SHARE MVS Program Co-Manager
> 323-715-0595 Mobile
> 626-543-6132 Office <= NEW
> robin...@sce.com
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is there a word for that?

2020-09-20 Thread Lizette Koehler
I would agree to Dynamic

Any JES2 change I make is called a dynamic change due to the use of $T
commands.  However, I always include - update the JES2 init deck so changes
are not lost across COLD starts

No change management person has bothered to tell me that is not valid


Lizette


-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of
Jesse 1 Robinson
Sent: Sunday, September 20, 2020 12:01 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Is there a word for that?

This is a question about categorizing JES2 commands. At one time, when we
were still buckling our knickerbockers above the knee, many/most JES2
configuration definitions could be modified only by some kind of restart
ranging from hot start to warm start to cold start. Some years ago JES2
developers got very busy and created command support for all kinds of
parameters that previously required some kind of disruption.

The result is that now most JES2 configuration parameters can be modified
via $T. In fact, most changes are generally *ignored* during JES2 restarts
other than cold start. So here's my question: is there a generally accepted
term for 'changeable by command'? It would facilitate communication
regarding all kinds of changes. This weekend we scheduled a JES2 change
involving layers of administrative rigmarole that was 'implemented' by
editing the JES2 init deck. We eventually issued a $T command after noticing
that the desired change did not take effect at IPL. I've heard 'volatile'
suggested for 'changeable by command', but I don't find documentation to
support that. Any ideas?

.
.
J.O.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler
SHARE MVS Program Co-Manager
323-715-0595 Mobile
626-543-6132 Office <= NEW
robin...@sce.com


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: rename a dataset in acs routine?

2020-09-20 Thread Lizette Koehler
I apologize if this has been discussed

The SYSTEM Symbols can be made available to JES2 batch jobs   The shop needs
to determine if they want that to happen

https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.1.0/com.ibm.zos.v2r1
.ieab600/jclsymstr.htm

The three types of symbols that can be used for JES2 in-stream substitution
are JCL Symbols, JES Symbols and System Symbols:

On a JES2 JOBCLASS definition, the field SYSSYM needs to be ALLOW rather
than DISALLOW



If there Is scheduling software available, it is possible it might provide
symbolic substitution at Submission time (I know CA Workload Manager ESP can
do that)

Otherwise, you might want to have something like s REXX be executed (or
language of your choice) to generate the JCL then submit into the Internal
Reader

ACS routines cannot do this type of function.

Best of luck

Lizette

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of
Seymour J Metz
Sent: Sunday, September 20, 2020 5:47 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: rename a dataset in acs routine?

ITYM IEFUJV; IEFUJI doesn't have the right interfaces. I'd probably use an
internal text exit.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3



From: IBM Mainframe Discussion List  on behalf of
Brian Westerman 
Sent: Saturday, September 19, 2020 12:14 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: rename a dataset in acs routine?

Actually I'm leaning towards the JES or SMF UJI exit as well.  File
tailoring doesn't help in this case because most of the JCL doesn't get
submitted via TSO.

Brian

On Fri, 18 Sep 2020 16:41:29 +, Seymour J Metz  wrote:

>Well, if they want to use a chainsaw to open a bag of peanuts, you could
write a JES exit, but the proper way to handle it is for the process that
creates the JCL to generate a unique name. If they're using ISPF it's super
easy to do it with File Tailoring, and many production control programs have
similar capabilities.

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3



From: IBM Mainframe Discussion List  on behalf of
Brian Westerman 
Sent: Friday, September 18, 2020 3:36 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: rename a dataset in acs routine?

Hi,

I was asked a question today that I honestly don't know how to answer.  The
programmer has a (very large) series of jobs that generate fiche tapes that
get created and have a expiration date but never are cataloged (because they
all have exactly the same DSN).  So over time, they ended up with about
30,000 tapes from the over 9,000 jobs that CA-1 keeps around until
expiration date.  Obviously, these are not the easiest datasets to use later
because they need to look up the tape volser every time.

The problem is that they want to know if there is a way to automatically
catalog datasets at creation time, to which I told them we could, but only 1
of them because you can't catalog two datasets with the same name.  But they
want to have "the system" which I'm guessing is me :), dynamically rename
these datasets at creation time to add a date and time, such as change
HLQ.FICHE.TAPE to which I would dynamically make it
HLQ.FICHE.TAPE.D091720.T1123, meaning today's date and the current time (if
it was 11:23am).

I can't think of a way to do that in an acs routine, or any other simple
way, and I'm hoping that someone has an idea that might apply here.  I think
I can alter almost anything about the dataset, except the name.  Is there
something I am missing?

Brian

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

>--
>For IBM-MAIN subscribe / signoff / archive access instructions, send 
>email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Caution: "Hacked" email caused the distribution of a potentially harmful attachment

2020-09-20 Thread Bob Bridges
My first thought is "you can telephone if you want, but email's ok too.  But
if you email, send a ~fresh~ email, addressing it from your own address
book".  Don't use the Reply function, because the spoofer can set the
reply-to option.

I once got a plea for emergency funds from an aunt, supposedly vacationing
in Portugal and needing money for a friend's operation there.  Unlike so
many spoofs, this one was fairly literate.  I didn't really believe it,
though, because it lacked the personal endearments I would have expected
from her, and (always a solid clue) the text included no dates.  I almost
replied, asking "is this you?".  Instead I started a fresh email, and only
then noticed that it came not from auntco...@aol.com but auntca...@aol.com -
a single transposed pair of letters that I didn't notice at first glance.
(That's not the actual address, but done like that.)

I guess if there's a real fear that the friend's account has been hijacked,
an email to that account may not prove anything.  ("Nobody here but us
chickens!")  But in many cases, as others here have pointed out, the account
wasn't hijacked, it was merely spoofed.

---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313

/* I much prefer life under the U.S. Government to life under the brutal
Chinese regime, because many of our freedoms have, after all, survived the
U.S. Government's efforts to whittle them away.  But this is not to say that
we owe those freedoms to our government  -Joseph Sobran, 2001-04-03 */

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Charles Mills
Sent: Sunday, September 20, 2020 14:13

The general rule is "don't open attachments that you were not expecting." If
in doubt, telephone -- do not e-mail -- the sender and ask if he or she
actually sent it.


-Original Message-
From: Tony Brown
Sent: Sunday, September 20, 2020 8:00 AM

Please be advised:

My email account was hacked while I was on vacation last week.  Generated
from my email address were two variations of emails with subjects of "Proof
of Payment" or "Receipt of Payment" each containing an "html" attachment.
If you receive either of these emails, please delete without opening the
attachment.

Apparently, there are a number of variations of this "hack" being circulated
with some type of reference to "payment" and/or "invoice"; please be
cautious with any similar emails that you receive.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Caution: "Hacked" email caused the distribution of a potentially harmful attachment

2020-09-20 Thread Paul Gilmartin
On Mon, 21 Sep 2020 00:39:21 +, Seymour J Metz wrote:

>Maybe, but it is more likely that someone is just putting your name and 
>address in the header.
>
LISTSERVs are a treasure trove.  IIRC someone once masquerading as an
IBM-MAIN subscriber sent a Spanish Prisoner message to other subscribers.
Mere human engineering; no attachments necessary.


From: IBM Mainframe Discussion List on behalf of Tony Brown
Sent: Sunday, September 20, 2020 11:00 AM

My email account was hacked while I was on vacation last week.  Generated from 
my email address were two variations of emails with subjects of "Proof of 
Payment" or "Receipt of Payment" each containing an "html" attachment.  If you 
receive either of these emails, please delete without opening the attachment.

Apparently, there are a number of variations of this "hack" being circulated 
with some type of reference to "payment" and/or "invoice"; please be cautious 
with any similar emails that you receive.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is there a word for that?

2020-09-20 Thread Phil Smith III
Dynamic?


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: rename a dataset in acs routine?

2020-09-20 Thread Seymour J Metz
ITYM IEFUJV; IEFUJI doesn't have the right interfaces. I'd probably use an 
internal text exit.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3



From: IBM Mainframe Discussion List  on behalf of 
Brian Westerman 
Sent: Saturday, September 19, 2020 12:14 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: rename a dataset in acs routine?

Actually I'm leaning towards the JES or SMF UJI exit as well.  File tailoring 
doesn't help in this case because most of the JCL doesn't get submitted via TSO.

Brian

On Fri, 18 Sep 2020 16:41:29 +, Seymour J Metz  wrote:

>Well, if they want to use a chainsaw to open a bag of peanuts, you could write 
>a JES exit, but the proper way to handle it is for the process that creates 
>the JCL to generate a unique name. If they're using ISPF it's super easy to do 
>it with File Tailoring, and many production control programs have similar 
>capabilities.

--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3



From: IBM Mainframe Discussion List  on behalf of 
Brian Westerman 
Sent: Friday, September 18, 2020 3:36 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: rename a dataset in acs routine?

Hi,

I was asked a question today that I honestly don't know how to answer.  The 
programmer has a (very large) series of jobs that generate fiche tapes that get 
created and have a expiration date but never are cataloged (because they all 
have exactly the same DSN).  So over time, they ended up with about 30,000 
tapes from the over 9,000 jobs that CA-1 keeps around until expiration date.  
Obviously, these are not the easiest datasets to use later because they need to 
look up the tape volser every time.

The problem is that they want to know if there is a way to automatically 
catalog datasets at creation time, to which I told them we could, but only 1 of 
them because you can't catalog two datasets with the same name.  But they want 
to have "the system" which I'm guessing is me :), dynamically rename these 
datasets at creation time to add a date and time, such as change HLQ.FICHE.TAPE 
to which I would dynamically make it HLQ.FICHE.TAPE.D091720.T1123, meaning 
today's date and the current time (if it was 11:23am).

I can't think of a way to do that in an acs routine, or any other simple way, 
and I'm hoping that someone has an idea that might apply here.  I think I can 
alter almost anything about the dataset, except the name.  Is there something I 
am missing?

Brian

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

>--
>For IBM-MAIN subscribe / signoff / archive access instructions,
>send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Caution: "Hacked" email caused the distribution of a potentially harmful attachment

2020-09-20 Thread Seymour J Metz
Maybe, but it is more likely that someone is just putting your name and address 
in the header.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3



From: IBM Mainframe Discussion List  on behalf of 
Tony Brown 
Sent: Sunday, September 20, 2020 11:00 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Caution: "Hacked" email caused the distribution of a potentially 
harmful attachment

Please be advised:

My email account was hacked while I was on vacation last week.  Generated from 
my email address were two variations of emails with subjects of "Proof of 
Payment" or "Receipt of Payment" each containing an "html" attachment.  If you 
receive either of these emails, please delete without opening the attachment.

Apparently, there are a number of variations of this "hack" being circulated 
with some type of reference to "payment" and/or "invoice"; please be cautious 
with any similar emails that you receive.

Regards,

Tony
--
Tony Brown
Software Development
Dino-Software Corporation


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Caution: "Hacked" email caused the distribution of a potentially harmful attachment

2020-09-20 Thread Seymour J Metz
The general rule is to look at the Received header fields to see where it 
really came from.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3



From: IBM Mainframe Discussion List  on behalf of 
Charles Mills 
Sent: Sunday, September 20, 2020 2:12 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Caution: "Hacked" email caused the distribution of a potentially 
harmful attachment

The general rule is "don't open attachments that you were not expecting." If
in doubt, telephone -- do not e-mail -- the sender and ask if he or she
actually sent it.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Tony Brown
Sent: Sunday, September 20, 2020 8:00 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Caution: "Hacked" email caused the distribution of a potentially
harmful attachment

Please be advised:

My email account was hacked while I was on vacation last week.  Generated
from my email address were two variations of emails with subjects of "Proof
of Payment" or "Receipt of Payment" each containing an "html" attachment.
If you receive either of these emails, please delete without opening the
attachment.

Apparently, there are a number of variations of this "hack" being circulated
with some type of reference to "payment" and/or "invoice"; please be
cautious with any similar emails that you receive.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Caution: "Hacked" email caused the distribution of a potentially harmful attachment

2020-09-20 Thread Charles Mills
The from address on an e-mail is exactly like the return address on an 
envelope. It may in fact bear no relation to the actual origin of the e-mail.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Steve Thompson
Sent: Sunday, September 20, 2020 2:23 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Caution: "Hacked" email caused the distribution of a potentially 
harmful attachment

Your account does not have to be “Hacked” to send emails that are made to look 
like your account was used to send them. 

>From time to time, based on what you said, I have sent extortion/blackmail 
>emails to myself

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Caution: "Hacked" email caused the distribution of a potentially harmful attachment

2020-09-20 Thread Steve Thompson
Your account does not have to be “Hacked” to send emails that are made to look 
like your account was used to send them. 

From time to time, based on what you said, I have sent extortion/blackmail 
emails to myself

Checking the headers, and tracking the ip addresses... I’ve been traveling the 
globe and didn’t realize it. 

Sent from my iPhone — small keyboarf, fat fungrs, stupd spell manglr. Expct 
mistaks 


> On Sep 20, 2020, at 11:00 AM, Tony Brown  wrote:
> 
> Please be advised:
> 
> My email account was hacked while I was on vacation last week.  Generated 
> from my email address were two variations of emails with subjects of "Proof 
> of Payment" or "Receipt of Payment" each containing an "html" attachment.  If 
> you receive either of these emails, please delete without opening the 
> attachment.
> 
> Apparently, there are a number of variations of this "hack" being circulated 
> with some type of reference to "payment" and/or "invoice"; please be cautious 
> with any similar emails that you receive.
> 
> Regards,
> 
> Tony
> --
> Tony Brown
> Software Development
> Dino-Software Corporation
> 
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Caution: "Hacked" email caused the distribution of a potentially harmful attachment

2020-09-20 Thread Jesse 1 Robinson
This sort of hack seems to have increased during the C-19 pandemic because 
people who are staying home a lot order more and more stuff online, making 
phony 'acknowledgments' harder to catch.  

.
.
J.O.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler 
SHARE MVS Program Co-Manager
323-715-0595 Mobile
626-543-6132 Office ⇐=== NEW
robin...@sce.com

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Charles Mills
Sent: Sunday, September 20, 2020 11:13 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: (External):Re: Caution: "Hacked" email caused the distribution of a 
potentially harmful attachment

CAUTION EXTERNAL EMAIL

The general rule is "don't open attachments that you were not expecting." If in 
doubt, telephone -- do not e-mail -- the sender and ask if he or she actually 
sent it.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Tony Brown
Sent: Sunday, September 20, 2020 8:00 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Caution: "Hacked" email caused the distribution of a potentially 
harmful attachment

Please be advised:

My email account was hacked while I was on vacation last week.  Generated from 
my email address were two variations of emails with subjects of "Proof of 
Payment" or "Receipt of Payment" each containing an "html" attachment.
If you receive either of these emails, please delete without opening the 
attachment.

Apparently, there are a number of variations of this "hack" being circulated 
with some type of reference to "payment" and/or "invoice"; please be cautious 
with any similar emails that you receive.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Is there a word for that?

2020-09-20 Thread Jesse 1 Robinson
This is a question about categorizing JES2 commands. At one time, when we were 
still buckling our knickerbockers above the knee, many/most JES2 configuration 
definitions could be modified only by some kind of restart ranging from hot 
start to warm start to cold start. Some years ago JES2 developers got very busy 
and created command support for all kinds of parameters that previously 
required some kind of disruption.

The result is that now most JES2 configuration parameters can be modified via 
$T. In fact, most changes are generally *ignored* during JES2 restarts other 
than cold start. So here's my question: is there a generally accepted term for 
'changeable by command'? It would facilitate communication regarding all kinds 
of changes. This weekend we scheduled a JES2 change involving layers of 
administrative rigmarole that was 'implemented' by editing the JES2 init deck. 
We eventually issued a $T command after noticing that the desired change did 
not take effect at IPL. I've heard 'volatile' suggested for 'changeable by 
command', but I don't find documentation to support that. Any ideas?

.
.
J.O.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler
SHARE MVS Program Co-Manager
323-715-0595 Mobile
626-543-6132 Office <= NEW
robin...@sce.com


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Caution: "Hacked" email caused the distribution of a potentially harmful attachment

2020-09-20 Thread Charles Mills
The general rule is "don't open attachments that you were not expecting." If
in doubt, telephone -- do not e-mail -- the sender and ask if he or she
actually sent it.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Tony Brown
Sent: Sunday, September 20, 2020 8:00 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Caution: "Hacked" email caused the distribution of a potentially
harmful attachment

Please be advised:

My email account was hacked while I was on vacation last week.  Generated
from my email address were two variations of emails with subjects of "Proof
of Payment" or "Receipt of Payment" each containing an "html" attachment.
If you receive either of these emails, please delete without opening the
attachment.

Apparently, there are a number of variations of this "hack" being circulated
with some type of reference to "payment" and/or "invoice"; please be
cautious with any similar emails that you receive.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: rename a dataset in acs routine?

2020-09-20 Thread Jonathan Quay
Maybe use a database like EOS to suck up all those uncataloged tapes and index 
them?  Hopefully, there is some kind of machine readable index data created 
when the fiche tape is created.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: BPXP018I message when STC cancelled

2020-09-20 Thread Charles Mills
I have always seen that message when one of my dubbed applications ends 
abnormally. I have never figured out exactly what the variables are. I never 
worried about it, because (a.) it's an "I" message so "nothing to worry about" 
and (b.) you're already in an ABEND situation: I focus on solving the ABEND, 
not on worrying about the side effects of the ABEND.

That said, what exactly does the message mean and how can you get rid of it? I 
always kind of figured -- without real evidence -- that the cause of the 
message was some "unfinished business" on the USS side of things: an open file, 
a running process, something of that sort. You might try making sure that every 
UNIX file has been closed and every UNIX process has ended.

I suppose one might try to create a test program that triggered the message 
even without an ABEND: what happens if you open a UNIX file and then end 
"normally" without closing it? Or starting up a UNIX process and ending 
"normally" without stopping the UNIX process?

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Pierre Fichaud
Sent: Saturday, September 19, 2020 12:49 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: BPXP018I message when STC cancelled

I have an authorized STC that shuts down normally when it is stopped (/P).
When I cancel the STC, my ESTAEs are driven from newest to oldest.
But I get the message shown below after the ESTAEs are finished.
I do TCP/IP calls using IEZASMI in 2 sub-tasks.
The 2 sub-tasks that do TCPIP cleanup and issue TERMAPI in their ESTAEs.
The thread id is for the JOB STEP TCB.

I'd like to undub my address space but don't know what to do.
The Unix Callable Services doesn't seem to have a function to do that.
I'd set a SLIP trap but this situation doesn't seem slipable.
Any help would be appreciated.
Thanks in advance, Pierre.

14.33.43 STC00663  BPXP018I THREAD 1B216000, IN PROCESS 33620001, ENDED 
 039
   039 WITHOUT BEING UNDUBBED WITH COMPLETION CODE 40222000
   039 , AND REASON CODE .

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Searching MLPA module

2020-09-20 Thread Peter Relson

So MLPA module can be loaded using SETPROG LPA ?


No. I don't know how what I wrote would have given you that impression.

MLPA is what is identified by the IEALPAxx parmlib member.
SETPROG LPA is used to add to dynamic LPA.

PLPA, MLPA, FLPA, and dynamic LPA comprise LPA.

Peter Relson
z/OS Core Technology Design


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN