Re: Defining a new Class in JES

2022-08-24 Thread kekronbekron
Look up 'JES2 automatic timers' to issue commands (ex: clear output) based on 
JES2 itself.
Yes, it's possible without IPL.

- KB

--- Original Message ---
On Thursday, August 25th, 2022 at 9:50 AM, Peter  wrote:


> Hello
> 
> I am trying to understand if it is possible to define a new JES class which
> can allow the output to remain in the queue for few minutes or an hour ?
> 
> Is it possible? Or if someone has already attempted and can we do this
> without an IPL ?
> 
> Peter
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Defining a new Class in JES

2022-08-24 Thread Peter
Hello

I am trying to understand if it is possible to define a new JES class which
can allow the output to remain in the queue for few minutes or an hour ?

Is it possible? Or if someone has already attempted and can we do this
without an IPL ?

Peter

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: How to use LISTDSI from Rexx under Unix shell?

2022-08-24 Thread Nobuhiko Furuya

How about the following ?

  /* REXX */
   X = LISTDSI("'SYS1.MODGEN'" DIRECTORY)
   SAY 'FUNCTION CODE FROM LISTDSI IS: ' X
   SAY 'THE DATA SET NAME IS:  ' SYSDSNAME
   SAY 'THE DEVICE UNIT ON WHICH THE VOLUME RESIDES IS:' SYSUNIT
   SAY 'THE RECORD FORMAT IS:  ' SYSRECFM
   SAY 'THE LOGICAL RECORD LENGTH IS:  ' SYSLRECL
   SAY 'THE BLOCK SIZE IS: ' SYSBLKSIZE
   SAY 'THE ALLOCATION IN SPACE UNITS IS:  ' SYSALLOC
   SAY 'TYPE OF RACF PROTECTION IS:    ' SYSRACFA
   SAY 'THE NUMBER OF ALLOCATED BLOCKS IS: ' SYSADIRBLK
   SAY 'THE NUMBER OF USED BLOCKS IS:  ' SYSUDIRBLK
   SAY 'THE NUMBER OF MEMBER IS:   ' SYSMEMBERS

The result is as folows.

 FUNCTION CODE FROM LISTDSI IS:  0
 THE DATA SET NAME IS:   SYS1.MODGEN
 THE DEVICE UNIT ON WHICH THE VOLUME RESIDES IS: 3390
 THE RECORD FORMAT IS:   FB
 THE LOGICAL RECORD LENGTH IS:   80
 THE BLOCK SIZE IS:  27920
 THE ALLOCATION IN SPACE UNITS IS:   567
 TYPE OF RACF PROTECTION IS: NONE
 THE NUMBER OF ALLOCATED BLOCKS IS:  57
 THE NUMBER OF USED BLOCKS IS:   47
 THE NUMBER OF MEMBER IS:    723

Best regards,

Nobuhiko Furuya(古谷信彦)
V-SOL Inc.

On 2022/08/25 12:44, Farley, Peter x23353 wrote:

Posted earlier today on MVS-OE but got no responses there.

I know this has probably been discussed previously but I can't seem to get the 
Marist MVS-OE archive search to work for me.

Is there any way to use the LISTDSI TSO external function from "address tso" in 
a Rexx program run under the Unix shell?

I can only get it to return RC = -3, "routine not found".  Sample code below.

RTFM seems to indicate that "address tso" in a REXX program run under the Unix 
shell will run a TSO TMP in a separate address space, which is OK, I can capture the 
output from that as needed, but I am not getting any execution of LISTDSI at all.

Peter

Sample code to get LISTDSI information on 'profilename.EXEC':

/* Rexx */
Address tso
Myrc = LISTDSI('EXEC')
Say 'RC='Myrc',reason='SYSREASON


This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


How to use LISTDSI from Rexx under Unix shell?

2022-08-24 Thread Farley, Peter x23353
Posted earlier today on MVS-OE but got no responses there.

I know this has probably been discussed previously but I can't seem to get the 
Marist MVS-OE archive search to work for me.

Is there any way to use the LISTDSI TSO external function from "address tso" in 
a Rexx program run under the Unix shell?

I can only get it to return RC = -3, "routine not found".  Sample code below.

RTFM seems to indicate that "address tso" in a REXX program run under the Unix 
shell will run a TSO TMP in a separate address space, which is OK, I can 
capture the output from that as needed, but I am not getting any execution of 
LISTDSI at all.

Peter

Sample code to get LISTDSI information on 'profilename.EXEC':

/* Rexx */
Address tso
Myrc = LISTDSI('EXEC')
Say 'RC='Myrc',reason='SYSREASON


This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Connect CDC SQDATA VSAM

2022-08-24 Thread kekronbekron
Hi both,

Check out https://virtualzcomputing.com/.
I'm happy to recommend it just because they are transparent about the pricing - 
$100k/yr for a petabyte shuttled.

Don't know if it does IMS logs, but it does VSAM, PDS(E), etc.
They do this by running their own NFS v4 on Z (runs on zIIP), and then any 
system can access that data via NFS.
Having said that, I did see them installing a separate NFS client, even on 
Windows... if they're on the list, they can explain.

- KB

--- Original Message ---
On Thursday, August 25th, 2022 at 12:26 AM, Salah Balboul  
wrote:


> Carmen,
> 
> Thanks for the reply. Ours is for VSAM only.
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: rexx and IDCAMS functions

2022-08-24 Thread Hobart Spitz
I missed the "authorized" part the first time around.

I don't think anyone has mentioned the TSOEXEC command.  It runs an
authorized command (authorized) from an unauthorized environment.  (No, I
didn't leave out a blank.  TSOEXEC is the full 7 character command name.
Google it.)




OREXXMan
Q: What do you call the residence of the ungulate with the largest antlers?
A: A moose pad.
:-D
Would you rather pass data in move mode (*nix piping) or locate mode
(Pipes) or via disk (JCL)?  Why do you think you rarely see *nix commands
with more than a dozen filters, while Pipelines specifications are commonly
over 100s of stages, and 1000s of stages are not uncommon.
REXX is the new C.


On Wed, Aug 24, 2022 at 1:08 PM Walt Farrell  wrote:

> On Mon, 22 Aug 2022 16:16:06 -0500, Paul Gilmartin 
> wrote:
>
> >Why is there an AUTHPGM NAMES list at all?  Why shouldn't it just be
> >* (everything)
> >???
> >
> >I can imagine several reasons:  Even some authorized programs might not
> >be trusted not to modify the WAITing TSO task (IKJEFTT09?), perhaps by
> >ALLOCATE REUS of a file TSO uses.  Or by modifying TSO storage.  Or
> >by monopolizing a scarce resource (such as a tape drive) during
> programmers'
> >think time.  BTDT; alas no distinction is made between real tapes and
> virtual
> >tapes which are more likely to be plentiful.
> >
> >Is the motive one of these, or something similar?
>
> I cannot provide a definitive answer to that, as I was not involved in any
> of the design for that function.
>
> I can, though, guess that they did not want to assume that every
> APF-authorized program would behave properly when invoked authorized but in
> an unexpected environment, and therefore chose to restrict them unless IBM
> or a customer had specifically listed them as "safe".
>
> >
> >This feels like something that should be programmer-specific , such as a
> RACF
> >profile allowing Lizette but not me the facility.
> >
>
> I don't see a need for saying "program X can run APF-authorized under TSO
> if Lizette runs it, but not if Paul runs it. That is not a function that
> exists when you run a program in batch, for example, and if it were to be
> meaningful in TSO it would also be meaningful in batch.
>
> You can control which users can run which programs (PROGRAM control in
> RACF, though that came later than AUTHPGM), and if an APF-authorized
> program is doing something that should be restricted further, it can do its
> own restource checking (as AMASPZAP does when zapping a VTO).
>
> --
> Walt
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: S23E abend

2022-08-24 Thread Joe Monk
Reason code 00 is a storage key mismatch.

Joe

On Wed, Aug 24, 2022 at 3:19 PM Brian Westerman <
brian_wester...@syzygyinc.com> wrote:

> The "normal" reason this happens (at least to me) is because the task
> isn't authorized to issue the detach.  It has nothing to do with whether or
> not the task was able to start, because the task may not have needed to be
> authorized when it started, but needs it to perform a specific function and
> that function happens to be a detach.  This is almost always because of an
> error in the APF list, or an error that you didn't link the module
> correctly.  Since you said you have not changed anything except that it's a
> DR test, then I have to assume your problem is APF.
>
> It really doesn't cost you anything to check your APF datasets are really
> authorized int he right place, there is a health check that does it for you
> and I think there is even a SDSF screen that allows you to see that
> information now.
>
> Brian
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: S23E abend

2022-08-24 Thread Brian Westerman
The "normal" reason this happens (at least to me) is because the task isn't 
authorized to issue the detach.  It has nothing to do with whether or not the 
task was able to start, because the task may not have needed to be authorized 
when it started, but needs it to perform a specific function and that function 
happens to be a detach.  This is almost always because of an error in the APF 
list, or an error that you didn't link the module correctly.  Since you said 
you have not changed anything except that it's a DR test, then I have to assume 
your problem is APF.

It really doesn't cost you anything to check your APF datasets are really 
authorized int he right place, there is a health check that does it for you and 
I think there is even a SDSF screen that allows you to see that information now.

Brian

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Connect CDC SQDATA VSAM

2022-08-24 Thread Salah Balboul
Carmen,

Thanks for the reply. Ours is for VSAM only.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: GLOBAL OPERCMDS ACTIVATION

2022-08-24 Thread Walt Farrell
On Wed, 24 Aug 2022 09:55:56 -0500, Michael Babcock  
wrote:

>I’m trying to define the MVS.MCSOPER.*/READ profile global class.
>
>I issued the following in batch:
>
> RDEF GLOBAL OPERCMDS OWNER(PXX) UACC(NONE)
>ADDMEM(MVS.MCSOPER.*/READ)
>
>READY
>
> SETROPTS GLOBAL(OPERCMDS)
>REFRESH
>
>ICH14016I CANNOT REFRESH OPERCMDS, GLOBAL ACCESS CHECKING
>INACTIVE.
>
>OPERCMDS doesn’t show up in the GLOBAL CHECKING CLASSES either.
>
>I do have the GLOBAL DATASET class active
>
>What am I doing wrong?

Sounds like you do not have GLOBAL OPERCMDS active: SETR GLOBAL(OPERCMDS)

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: rexx and IDCAMS functions

2022-08-24 Thread Walt Farrell
On Mon, 22 Aug 2022 16:16:06 -0500, Paul Gilmartin  wrote:

>Why is there an AUTHPGM NAMES list at all?  Why shouldn't it just be
>* (everything)
>???
>
>I can imagine several reasons:  Even some authorized programs might not
>be trusted not to modify the WAITing TSO task (IKJEFTT09?), perhaps by
>ALLOCATE REUS of a file TSO uses.  Or by modifying TSO storage.  Or
>by monopolizing a scarce resource (such as a tape drive) during programmers' 
>think time.  BTDT; alas no distinction is made between real tapes and virtual
>tapes which are more likely to be plentiful.
>
>Is the motive one of these, or something similar?

I cannot provide a definitive answer to that, as I was not involved in any of 
the design for that function. 

I can, though, guess that they did not want to assume that every APF-authorized 
program would behave properly when invoked authorized but in an unexpected 
environment, and therefore chose to restrict them unless IBM or a customer had 
specifically listed them as "safe".

>
>This feels like something that should be programmer-specific , such as a RACF
>profile allowing Lizette but not me the facility.
>

I don't see a need for saying "program X can run APF-authorized under TSO if 
Lizette runs it, but not if Paul runs it. That is not a function that exists 
when you run a program in batch, for example, and if it were to be meaningful 
in TSO it would also be meaningful in batch.

You can control which users can run which programs (PROGRAM control in RACF, 
though that came later than AUTHPGM), and if an APF-authorized program is doing 
something that should be restricted further, it can do its own restource 
checking (as AMASPZAP does when zapping a VTO).

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Connect CDC SQDATA VSAM

2022-08-24 Thread Carmen Vitullo
Well - we are to replicate IMS / DB2 , maybe MQ data to an open systems 
Oracle Engine, for us it's a CPU hog when the DBA's or the Data 
Warehouse folks decide to stop replication for hours, then decide to 
start it up. we don't use any  CF structures that I can see, I don't 
support the product, we're looking to sunset the product soon.


we also use Infosphere CDC from IBM for DB2 replication

Carmen

On 8/24/2022 12:00 PM, Salah wrote:

Hello list,

Wondering if anyone is using Connect CDC SQDATA for VSAM from Precisely. 
Product is used to replicate changes to VSAM on MF host to a Unix/Linux server.

The product utilizes LOGREPLICATE on VSAM along with LOGSTREAM to capture 
changes made to VSAM and publish changes on LINUX/UNIX server via IP 
connection. Nothing too fancy.

I ask because we are doing a POC, and the product seem to pause during sending 
changes to Linux. Each pause is 82 seconds for some odd reason.

I checked the LOGSTREAM definition, CF Structure, all is good. MAXBUFSIZE, 
AVGBUSIZE, LS_SIZE, REPTD, AUTODELETE all look fine.

Thanks,

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Connect CDC SQDATA VSAM

2022-08-24 Thread Salah
Hello list,

Wondering if anyone is using Connect CDC SQDATA for VSAM from Precisely. 
Product is used to replicate changes to VSAM on MF host to a Unix/Linux server.

The product utilizes LOGREPLICATE on VSAM along with LOGSTREAM to capture 
changes made to VSAM and publish changes on LINUX/UNIX server via IP 
connection. Nothing too fancy.

I ask because we are doing a POC, and the product seem to pause during sending 
changes to Linux. Each pause is 82 seconds for some odd reason.

I checked the LOGSTREAM definition, CF Structure, all is good. MAXBUFSIZE, 
AVGBUSIZE, LS_SIZE, REPTD, AUTODELETE all look fine.

Thanks,

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is there a mathematician in the house?

2022-08-24 Thread Bob Bridges
I'm just starting the chapter on what it calls "cryptology", so I don't
know yet whether it'll be part of the discussion.  And as for the rest of
the book, I'll glance through it eventually but my interest in number
theory in general is very casual - not non-existent, but it wanes quickly
after the first hour or so.

---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313

/* Perhaps the most valuable result of all education is the ability to make
yourself to do the thing you have to do when it ought to be done whether
you like it or not.  -Thomas Huxley (British biologist) */

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of
Seymour J Metz
Sent: Wednesday, August 24, 2022 08:48

Does the book get into the connection with Complex Analysis (roughly,
Calculus on complex numbers)?


From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of
Bob Bridges [robhbrid...@gmail.com]
Sent: Tuesday, August 23, 2022 4:50 PM

I got to talking with a church friend about encryption, and at lunch
yesterday he lent me a book on number theory that has a chapter on
asymmetric encryption.  Cryptography has long been a hobby of mine, but
it's only recently that I came to understand a little of how asymmetric
encryption can work.

The chapter I'm perusing will get into asymmetric encryption eventually,
but it's starting with simple rotational ciphers.  Expanding on the simple
rotation, it then talks about something it calls "affine transformations",
which introduce an additional term into the formula used to encrypt or
decrypt the text:

  C ≡ P+ (mod 26) 0 ≤ C ≤ 25

...where, it specifies, "(a, 26) = 1".  Here's where I pause:  What
operation is indicated by "(m, n)"?

It goes on to say that for 26 letters in the cipher, "there are ф(26) = 12
choices for ".  I can see that  and 26 must have no factors in common
for this to work, and without actually working out how many choices there
are I can easily believe the answer is 12, but what function is implied by
phi?

Someone here probably knows, wouldn't you think?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


GLOBAL OPERCMDS ACTIVATION

2022-08-24 Thread Michael Babcock
I’m trying to define the MVS.MCSOPER.*/READ profile global class.

I issued the following in batch:

 RDEF GLOBAL OPERCMDS OWNER(PXX) UACC(NONE)
ADDMEM(MVS.MCSOPER.*/READ)

READY

 SETROPTS GLOBAL(OPERCMDS)
REFRESH

ICH14016I CANNOT REFRESH OPERCMDS, GLOBAL ACCESS CHECKING
INACTIVE.

OPERCMDS doesn’t show up in the GLOBAL CHECKING CLASSES either.

I do have the GLOBAL DATASET class active

What am I doing wrong?
-- 
Michael Babcock
OneMain Financial
z/OS Systems Programmer, Lead

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Linklist and Syncsort confusion

2022-08-24 Thread Pommier, Rex
Thank you, everybody, for correcting my understanding of what the LNKLST 
UNALLOCATE/ALLOCATE does and doesn't do.  

Rex

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Peter Relson
Sent: Tuesday, August 23, 2022 6:41 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [EXTERNAL] Re: Linklist and Syncsort confusion

Once more into the breach.

All of this has been covered multiple times, but searching archives is no one's 
favorite thing to do and often it's too hard to find what you want.

Use of LNKLST ALLOCATE/UNALLOCATE is solely provided so that you can access 
uncataloged datasets of the same name as a LNKLST dataset.
It has no effect on an active LNKLST.

Stopping VLF is not of any help.

The right approach, as was mentioned, is to define a new LNKLST set (and 
activate it). For things to work, there needs to be a DCB with a new DEB that 
tracks to the new dataset. Only LNKLST ACTIVATE will do that.

For example,
LNKLST DEFINE NAME(xx) COPYFROM(CURRENT) LNKLST ACTIVATE NAME(xx)

This approach works too if you have a LNKLST dataset that was allocated in such 
a way that it could extend into secondary extents and then, because of your 
actions, did.

If you want to get rid of the old dataset, you need to get everyone from using 
the current (and any old) LNKLST sets. This is unpredictably dangerous and can 
result in absolutely anything, from "no problem" to "wait state". But if you 
must (such as if the alternative is "IPL anyway"), then SETPROG LNKLST UPDATE 
JOB(*).

The safe approach is to leave the old dataset and use the new name.
LNKLST DEFINE NAME(xx) COPYFROM(CURRENT) LNKLST DELETE NAME(xx) DSN(yyy) LNKLST 
ADD NAME(xx) DSN(yyy) LNKLST ACTIVATE NAME(xx) And then decide if you have 
existing jobs that actually need the new dataset. If you don't, then no LNKLST 
UPDATE is needed, and no problems will occur.
LLA does not need to be stopped or refreshed.

Peter Relson
z/OS Core Technology Design


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
The information contained in this message is confidential, protected from 
disclosure and may be legally privileged. If the reader of this message is not 
the intended recipient or an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that any disclosure, 
distribution, copying, or any action taken or action omitted in reliance on it, 
is strictly prohibited and may be unlawful. If you have received this 
communication in error, please notify us immediately by replying to this 
message and destroy the material in its entirety, whether in electronic or hard 
copy format. Thank you.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IWS Scheduling

2022-08-24 Thread Jack Zukt
Thank you Philippe
Regards,
Jack

On Wed, 24 Aug 2022 at 09:06, Philippe TESSIER  wrote:

> Hi Jack
>
>
> -- MODIFYING A RULE
> --- .
> Command ===>
>   .
>
>   .
> Enter the GENDAYS command to display the dates generated by this rule
>  .
> Enter the E command to specify EVERY options
>   .
> Enter S and user data in the fields below to define a rule
>   .
>
>   .
> Application   : TEST
>   .
> Rule  : R1
>   .
>
>   .
>  --- Frequency --- --- Day ------ Cycle Specification ---
>  .
> ---
> .
> S Only  !  _ Day   !  _ Week   _ January_
> July  .
> _ Every !  _ Free day  !  S Month  _ February   _
> August.
> !  _ Work day  !  _ Year   _ March  _
> September .
>  _ First _ Last !  _ Monday!   _ April  _
> October   .
>  S Second_ 2nd Last !  _ Tuesday   !   _ May_
> November  .
>  _ Third _ 3rd Last !  _ Wednesday !   _ June   _
> December  .
>  _ Fourth_ 4th Last !  _ Thursday  !  Week number  __ __ __ __ __ __
>   .
>  _ Fifth _ 5th Last !  _ Friday!  Period/RG 
>   .
>___ ___ ___ ___  !  S Saturday  !  name  
>   .
>___ ___ ___ ___  !  _ Sunday!
>   .
>___ ___ ___ ___  !  !  Shift default origin by  ___
> days .
>
>
>
> And
>
>  - RUN CYCLES - Row 1 to 1
> of 1
>  Command ===>  Scroll ===>
> CSR
>
>  Enter/Change data in the rows, and/or enter any of the following
>
>  row commands:
>
>  I(nn) - Insert, R(nn),RR(nn) - Repeat, D(nn),DD - Delete
>
>  S - Specify run days/Modify rule
>
>
>  Application: TEST
>
>   Name of rg/In   Out of
>
>  Row  period/rule Input Deadline   F day effect   Effect   Variable
> table
>  cmd  HH.MM day HH.MM Type rule  CCYYMMDD CCYYMMDD
>
>   R1__10.00 __  _ R3 20210725 20711231
> 
>   Text : __
>
>   Shift: __-4  Shift Day Type: D
>
>
>
>
> The LTP gives the following date
>
> 06 sept 22
> 04 oct 22
> 08 nov 22
> 06 dec 22
>
> Good luck
>
> Philippe
>
>
>
>
>
> > Le 23 août 2022 à 18:05, Jack Zukt  a écrit :
> >
> > Hi all,
> >
> > I need to execute a job every Thursday that takes place before the second
> > Saturday of each month which, unfortunately, is not the second Thursday
> of
> > each month. Is there a way to do this using IWS? From what I have
> gathered
> > so far, I can only use relative days for a future date, not for a
> previous
> > one.
> > Your help will be greatly appreciated.
> > Regards
> > Jack
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is there a mathematician in the house?

2022-08-24 Thread Seymour J Metz
Does the book get into the connection with Complex Analysis (roughly, Calculus 
on complex numbers)?


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of Bob 
Bridges [robhbrid...@gmail.com]
Sent: Tuesday, August 23, 2022 4:50 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Is there a mathematician in the house?

I got to talking with a church friend about encryption, and at lunch yesterday 
he lent me a book on number theory that has a chapter on asymmetric encryption. 
 Cryptography has long been a hobby of mine, but it's only recently that I came 
to understand a little of how asymmetric encryption can work.

The chapter I'm perusing will get into asymmetric encryption eventually, but 
it's starting with simple rotational ciphers.  Expanding on the simple 
rotation, it then talks about something it calls "affine transformations", 
which introduce an additional term into the formula used to encrypt or decrypt 
the text:

  C ≡ P+ (mod 26) 0 ≤ C ≤ 25

...where, it specifies, "(a, 26) = 1".  Here's where I pause:  What operation 
is indicated by "(m, n)"?

It goes on to say that for 26 letters in the cipher, "there are ф(26) = 12 
choices for ".  I can see that  and 26 must have no factors in common for 
this to work, and without actually working out how many choices there are I can 
easily believe the answer is 12, but what function is implied by phi?

Someone here probably knows, wouldn't you think?

---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313

/* The national budget must be balanced.  The public debt must be reduced; the 
arrogance of the authorities must be moderated and controled.  Payments to 
foreign governments must be reduced, if the nation is not to go bankrupt.  
People must again learn to work, instead of living on public assistance.  
-Marcus Tullius Cicero, 55 BC */

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is there a mathematician in the house?

2022-08-24 Thread Seymour J Metz
No,  "(a, 26) = 1" is just another way of specifying that a and 26 are 
relatively prime. The reason that φ(26) is 12 is that there are 12 such values 
of a in range.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of Bob 
Bridges [robhbrid...@gmail.com]
Sent: Tuesday, August 23, 2022 6:45 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Is there a mathematician in the house?

Comment from another knowledgeable cove:

"In number theory, Euler's totient function counts the positive integers up to 
a given integer n that are relatively prime to n. It is written using the Greek 
letter phi as φ(n) or ϕ(n), and may also be called Euler's phi function. In 
other words, it is the number of integers k in the range 1 ≤ k ≤ n for which 
the greatest common divisor gcd(n, k) is equal to 1. The integers k of this 
form are sometimes referred to as totatives of n."

First of all, yeah, "relatively prime", not "mutually prime" as I wrote below.  
It didn't seem quite right even at the time, though I suppose it was clear 
enough.

So "(a, 26) = 1", I guess, is just another way of specifying why φ(26) is 12.  
I can take up the chapter again, now.

---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313

/* Canada could have had the culture of France, the entrepreneurial spirit of 
the US and the British tradition of tolerance.  Instead it got the culture of 
the US, the entrepreneurial spirit of Britain and the French tradition of 
tolerance. */

-Original Message-
From: robhbrid...@gmail.com 
Sent: Tuesday, August 23, 2022 17:12

Ah, so "(a, 26) = 1" simply states what I had already figured out, that there 
must be no common factors between them.  (Not counting 1 itself, of course.)  I 
think I read once that another way of saying that is " and 26 are mutually 
prime".  Thanks, Horacio.

I'm thinking that in one sense there are actually an infinite number of values 
that will work for , but once you get to 26 and past they're simply 
repeating previous values.  For instance, if you use 3 (and I'll pretend b=0 
just for simplicity here) then the ciphertext numbers are 3, 6, 9, 12, 15, 18, 
21, 24, 1, 4, 7, 10, 13, 16, 19, 22, 25, 2, 5, 8, 11, 14, 17, 20, 23, 26.  I 
could also use a=29, 55, 81 and so on, but the ciphertext sequence is identical 
so there's no point.

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Horacio Luis Villa
Sent: Tuesday, August 23, 2022 17:01

(m,n) is the great common divisor between m and n.
Can't tell what phi(26)=12 is, but I would say is something like "there are
12 coprimes among the 26 first natural numbers".


De: IBM Mainframe Discussion List  en nombre de Bob 
Bridges 
Enviado: martes, 23 de agosto de 2022 17:50

I got to talking with a church friend about encryption, and at lunch yesterday 
he lent me a book on number theory that has a chapter on asymmetric encryption. 
 Cryptography has long been a hobby of mine, but it's only recently that I came 
to understand a little of how asymmetric encryption can work.

The chapter I'm perusing will get into asymmetric encryption eventually, but 
it's starting with simple rotational ciphers.  Expanding on the simple 
rotation, it then talks about something it calls "affine transformations", 
which introduce an additional term into the formula used to encrypt or decrypt 
the text:

  C ≡ P+ (mod 26) 0 ≤ C ≤ 25

...where, it specifies, "(a, 26) = 1".  Here's where I pause:  What operation 
is indicated by "(m, n)"?

It goes on to say that for 26 letters in the cipher, "there are ф(26) = 12 
choices for ".  I can see that  and 26 must have no factors in common for 
this to work, and without actually working out how many choices there are I can 
easily believe the answer is 12, but what function is implied by phi?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IWS Scheduling

2022-08-24 Thread Philippe TESSIER
Hi Jack


-- MODIFYING A RULE --- 
.
Command ===>
.

.
Enter the GENDAYS command to display the dates generated by this rule   
.
Enter the E command to specify EVERY options
.
Enter S and user data in the fields below to define a rule  
.

.
Application   : TEST
.
Rule  : R1  
.

.
 --- Frequency --- --- Day ------ Cycle Specification ---   
.
--- 
.
S Only  !  _ Day   !  _ Week   _ January_ July  
.
_ Every !  _ Free day  !  S Month  _ February   _ August
.
!  _ Work day  !  _ Year   _ March  _ September 
.
 _ First _ Last !  _ Monday!   _ April  _ October   
.
 S Second_ 2nd Last !  _ Tuesday   !   _ May_ November  
.
 _ Third _ 3rd Last !  _ Wednesday !   _ June   _ December  
.
 _ Fourth_ 4th Last !  _ Thursday  !  Week number  __ __ __ __ __ __
.
 _ Fifth _ 5th Last !  _ Friday!  Period/RG 
.
   ___ ___ ___ ___  !  S Saturday  !  name  
.
   ___ ___ ___ ___  !  _ Sunday!
.
   ___ ___ ___ ___  !  !  Shift default origin by  ___ days 
.



And 

 - RUN CYCLES - Row 1 to 1 of 1 
 
 Command ===>  Scroll ===> CSR  
 

 
 Enter/Change data in the rows, and/or enter any of the following   
 
 row commands:  
 
 I(nn) - Insert, R(nn),RR(nn) - Repeat, D(nn),DD - Delete   
 
 S - Specify run days/Modify rule   
 

 
 Application: TEST  
 
  Name of rg/In   Out of
 
 Row  period/rule Input Deadline   F day effect   Effect   Variable table   
 
 cmd  HH.MM day HH.MM Type rule  CCYYMMDD CCYYMMDD  
 
  R1__10.00 __  _ R3 20210725 20711231  
 
  Text : __ 
 
  Shift: __-4  Shift Day Type: D
 

 


The LTP gives the following date

06 sept 22
04 oct 22
08 nov 22
06 dec 22

Good luck

Philippe





> Le 23 août 2022 à 18:05, Jack Zukt  a écrit :
> 
> Hi all,
> 
> I need to execute a job every Thursday that takes place before the second
> Saturday of each month which, unfortunately, is not the second Thursday of
> each month. Is there a way to do this using IWS? From what I have gathered
> so far, I can only use relative days for a future date, not for a previous
> one.
> Your help will be greatly appreciated.
> Regards
> Jack
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Using the IPL date on DFSORT comparisons

2022-08-24 Thread Jack Zukt
Hi Kolusu,

I have this include cond,

INCLUDE COND=(DCURCTYP,EQ,DCUDATAT,AND,  * Type = Data type
  DSN5,NE,C'OMVS.',&,* Exclude OMVS.** files
  DSN5,NE,C'SYS1.',&,* Exclude SYS1.** FILES
  DSN5,NE,C'SYS2.',&,* Exclude SYS2.** FILES
  DCDCREDT,LT,DATE3P-30,&,   * Created < currdate - 30
  DCDLSTRF,LT,DATE3P-30,&,   * LastRef < currdate - 30
  DCDSTGRP,GT,C' ')  * Stor grp name not blank

which you helped me set. Now I would like to exclude all the files that
have been created since the last ipl. In order to do that I would have to
add a line like this:

DCDCREDT,LT,ipldate,&,   * Created < IPL date

As far as I could gather I do not have such a variable either from DFSORT
or System Symbols. I do not want to resort to rexx (or other language)
programming to do that. It would be quite easy  and, a few years ago, I
would generate all the JCL by rexx programming and submit it from within
the rexx. However, I want to have this done only with straightforward IBM
products, so I can pass it to other teams that do not have programming
skills.
Do you think that there is a way to achieve this?
Thank you very much for your assistance,
Best Regards
Jack



On Tue, 23 Aug 2022 at 17:02, Jack Zukt  wrote:

> Hi Kolusu,
>
> I was hoping that DFSORT might have a way to use it directly as I want the
> JCL to be simple to read and maintain. But if I can use a STEP with a /D
> IPLINFO to get it, it would solve my problem.
>
> Regards
> Jack
>
> On Tue, 23 Aug 2022 at 16:56, Sri h Kolusu  wrote:
>
>> >> there a way to use the IPL date on a date comparison on the
>> INCLUDE/OMIT fields?
>>
>> Jack,
>>
>> How do you plan to get the IPL date?  Are you going to use /D IPLINFO ?
>> We can generate dynamic symbol for the date parsing that information which
>> can use in your INCLUDE/OMIT
>>
>>
>> Thanks,
>> Kolusu
>>
>> --
>> For IBM-MAIN subscribe / signoff / archive access instructions,
>> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>>
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN