Re: OT: Digital? Cloud? Modern And Cost-Effective? Surprise! It's The Mainfra...

2015-03-31 Thread Paul Gilmartin
On Mon, 30 Mar 2015 21:06:52 -0400, Shmuel Metz (Seymour J.)  wrote:

This is one main reason why I prefer the UNIX fork() philosophy
rather than threading.

That philosophy led to the insanity that a command can't pass back an
environment variable to its caller.
 
Much alleviated by the mechanism of command substitution.

And hauntingly similar to the JCL insanity that one job step can't
pass back a JCL variable to be used in the PARM to a subsequent
step.  And nothing similar to command substitution available as
an alternative.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: OT: Digital? Cloud? Modern And Cost-Effective? Surprise! It's The Mainfra...

2015-03-31 Thread Shmuel Metz (Seymour J.)
In
CAAJSdjgcPHDb60=apm36kvymoddqmd2fiefavq6my5zuqxw...@mail.gmail.com,
on 03/30/2015
   at 08:34 AM, John McKown john.archie.mck...@gmail.com said:

This is one main reason why I prefer the UNIX fork() philosophy
rather than threading.

That philosophy led to the insanity that a command can't pass back an
environment variable to its caller.

But I still like the isolation of protect keys.

What isolation? With everybody and his brother running key 8, the
storage key mechanism is worthless for shared memory.

Ignorance of Multics considered harmful
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: OT: Digital? Cloud? Modern And Cost-Effective? Surprise! It's The Mainfra...

2015-03-31 Thread John McKown
On Mon, Mar 30, 2015 at 8:06 PM, Shmuel Metz (Seymour J.)
shmuel+ibm-m...@patriot.net wrote:
 In
 CAAJSdjgcPHDb60=apm36kvymoddqmd2fiefavq6my5zuqxw...@mail.gmail.com,
 on 03/30/2015
at 08:34 AM, John McKown john.archie.mck...@gmail.com said:

This is one main reason why I prefer the UNIX fork() philosophy
rather than threading.

 That philosophy led to the insanity that a command can't pass back an
 environment variable to its caller.

OTOH, it stops the child from corrupting the parent's environment
variable space. And I do have a technique which can do _something_
about that. A short example would be to run the following in a UNIX
shell.

$(echo export BUBBA=bubba) # run the stdout of the enclosed command as
commands in the parent shell.

Yes, this is simplistic, but it results in the environment variable
BUBBA being set to bubba in the parent's shell. Of course, the
application needs to be written with this approach in mind. It can't
just use the setenv() or putenv() function.


But I still like the isolation of protect keys.

 What isolation? With everybody and his brother running key 8, the
 storage key mechanism is worthless for shared memory.

The fact that programmers are too lazy to use protect keys does not
make them worthless. If _I_ were writing APF code which required me
to store data in _common_ memory (ECSA for example), then I would most
definitely _not_ use key 8. Given that I'm a paranoid person, I would
likely use fetch protected key 10 storage. Of course, I imagine that
we'd both agree that using a data space and AR mode would be superior.
The problem with that _might_ be if the data truly needed to be,
potentially, addressable in _every_ address space. That could be quite
tricky to do. Or at least a bit complicated compared to ECSA
storage.


 Ignorance of Multics considered harmful

 --
  Shmuel (Seymour J.) Metz, SysProg and JOAT

-- 
If you sent twitter messages while exploring, are you on a textpedition?

He's about as useful as a wax frying pan.

10 to the 12th power microphones = 1 Megaphone

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: OT: Digital? Cloud? Modern And Cost-Effective? Surprise! It's The Mainfra...

2015-03-31 Thread Rob Schramm
XES  XCF for advances

PDSE - mixed bag .. Mostly advances.. And some .. Well ... just plain weird.

zFS over HFS - advance

Open Edition / unix system services / USS  / z/unix. - Mixed bag - b2 to c2
bad, TCPIP good,  ported tools/open source good, java jrio - blunder, java
jzos - advance.

Rob Schramm
On Mar 31, 2015 10:12 AM, John McKown john.archie.mck...@gmail.com
wrote:

 On Mon, Mar 30, 2015 at 8:06 PM, Shmuel Metz (Seymour J.)
 shmuel+ibm-m...@patriot.net wrote:
  In
  CAAJSdjgcPHDb60=apm36kvymoddqmd2fiefavq6my5zuqxw...@mail.gmail.com,
  on 03/30/2015
 at 08:34 AM, John McKown john.archie.mck...@gmail.com said:
 
 This is one main reason why I prefer the UNIX fork() philosophy
 rather than threading.
 
  That philosophy led to the insanity that a command can't pass back an
  environment variable to its caller.

 OTOH, it stops the child from corrupting the parent's environment
 variable space. And I do have a technique which can do _something_
 about that. A short example would be to run the following in a UNIX
 shell.

 $(echo export BUBBA=bubba) # run the stdout of the enclosed command as
 commands in the parent shell.

 Yes, this is simplistic, but it results in the environment variable
 BUBBA being set to bubba in the parent's shell. Of course, the
 application needs to be written with this approach in mind. It can't
 just use the setenv() or putenv() function.

 
 But I still like the isolation of protect keys.
 
  What isolation? With everybody and his brother running key 8, the
  storage key mechanism is worthless for shared memory.

 The fact that programmers are too lazy to use protect keys does not
 make them worthless. If _I_ were writing APF code which required me
 to store data in _common_ memory (ECSA for example), then I would most
 definitely _not_ use key 8. Given that I'm a paranoid person, I would
 likely use fetch protected key 10 storage. Of course, I imagine that
 we'd both agree that using a data space and AR mode would be superior.
 The problem with that _might_ be if the data truly needed to be,
 potentially, addressable in _every_ address space. That could be quite
 tricky to do. Or at least a bit complicated compared to ECSA
 storage.

 
  Ignorance of Multics considered harmful
 
  --
   Shmuel (Seymour J.) Metz, SysProg and JOAT

 --
 If you sent twitter messages while exploring, are you on a textpedition?

 He's about as useful as a wax frying pan.

 10 to the 12th power microphones = 1 Megaphone

 Maranatha! 
 John McKown

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: OT: Digital? Cloud? Modern And Cost-Effective? Surprise! It's The Mainfra...

2015-03-31 Thread Tony Harminc
On 31 March 2015 at 10:11, John McKown john.archie.mck...@gmail.com wrote:

 The fact that programmers are too lazy to use protect keys does not
 make them worthless. If _I_ were writing APF code which required me
 to store data in _common_ memory (ECSA for example), then I would most
 definitely _not_ use key 8. Given that I'm a paranoid person, I would
 likely use fetch protected key 10 storage.

Then you would likely get a B78-5C abend. Key 10 is a user key. Surely
most shops run with ALLOWUSERKEYCSA(NO) these days.

 Of course, I imagine that we'd both agree that using a data space and AR mode 
 would be superior.

Perhaps... Though some have compared it to the Intel 286 (and others)
segmented architecture that's long gone in modern ia systems.

 The problem with that _might_ be if the data truly needed to be,
 potentially, addressable in _every_ address space. That could be quite
 tricky to do. Or at least a bit complicated compared to ECSA
 storage.

There's Above The Bar shared storage (not to be confused with ATB
common, which might also be applicable).

Tony H.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: OT: Digital? Cloud? Modern And Cost-Effective? Surprise! It's The Mainfra...

2015-03-30 Thread John McKown
On Mon, Mar 30, 2015 at 8:07 AM, Paul Gilmartin
000433f07816-dmarc-requ...@listserv.ua.edu wrote:
 On Mon, 30 Mar 2015 06:54:57 -0500, John McKown wrote:


To me, one of the biggest pluses is the hardware memory key. As now
used by z/OS, it really helps with reliability because, properly used,
it enforces separation of authority (ability to write) by major OS
subsystem.  E.g. JES2 code can't step on VTAM memory in common
storage.

 Certainly an effective accommodation to the single address space limitation
 of its time.  but consider the gyrations the TSO TMP performs to run
 a mixture of privileged and unprivileged tasks in a single address space.
 (It might be better if all authorized programs had the discipline to
 obtain storage only in system key and unauthorized were restricted to
 user key, and if instead of JSCBAUTH there were a similar flag, but
 with TCB rather than job step scope so subtasks could be dispatched in
 suitable PSW keys.  Alas, no one anticipated,)

Well, with APF code, you could create a new JSCB to be used with the
ATTACHX macro. The new JSCB would be associated with the new TCB and
have the JSCBAUTH bit OFF. Unfortunately, this still has a security
hole due to the fact that the APF code and the non-APF code are
running in the same address space and likely both going to be running
in key 8. And so the unauthorized code could possibly corrupt (perhaps
maliciously) the memory of the APF code, causing it to do bad
things.

This is one main reason why I prefer the UNIX fork() philosophy rather
than threading. At least when the other code is not under my
personal control. Too bad that creating a new z/OS address space is so
expensive compared to something like Linux. Of course, one reason is
due to the fact that a z/OS address space has a lot of system level
TCBs set up inside it before the user code is even looked at. Which
explains the use of the BPXAS UNIX initiator address spaces.


 Nowadays, isn't segment protection with multiple address spaces a better
 approach?

That doesn't protect memory in COMMON storage such as ECSA. It is
significantly better than MVT's use of different keys 1..15 to
separate memory for regions in real memory. Of course, IBM has done
some really good things to reduce use of COMMON storage, such as dual
address space, and especially AR mode. But I still like the isolation
of protect keys. Maybe I'm just old fashioned in this regard .


 -- gil

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



-- 
If you sent twitter messages while exploring, are you on a textpedition?

He's about as useful as a wax frying pan.

10 to the 12th power microphones = 1 Megaphone

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: OT: Digital? Cloud? Modern And Cost-Effective? Surprise! It's The Mainfra...

2015-03-30 Thread Paul Gilmartin
On Mon, 30 Mar 2015 06:54:57 -0500, John McKown wrote:

On Mon, Mar 30, 2015 at 4:36 AM, Ed Finnell wrote:
 Good, bad or indifferent IBM-Main is coming up on 29 yrs( in June).
 
Only 29?  I thought OS/MVT/ASP, the focus of the drift, was quite
obsolescent 29 years ago.

Let's all thank Mark Post for supplying interesting, relevant, timely 
information.

 Be interesting to see a survey of biggest advances, or biggest  blunders
 since we started.

Channeling gil: EBCDIC!
 
The classic:
http://www.bobbemer.com/P-BIT.HTM

(I wonder who has been maintaining the site for the last 11 years?)

To me, one of the biggest pluses is the hardware memory key. As now
used by z/OS, it really helps with reliability because, properly used,
it enforces separation of authority (ability to write) by major OS
subsystem.  E.g. JES2 code can't step on VTAM memory in common
storage.
 
Certainly an effective accommodation to the single address space limitation
of its time.  but consider the gyrations the TSO TMP performs to run
a mixture of privileged and unprivileged tasks in a single address space.
(It might be better if all authorized programs had the discipline to
obtain storage only in system key and unauthorized were restricted to
user key, and if instead of JSCBAUTH there were a similar flag, but
with TCB rather than job step scope so subtasks could be dispatched in
suitable PSW keys.  Alas, no one anticipated,)

Nowadays, isn't segment protection with multiple address spaces a better
approach?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: OT: Digital? Cloud? Modern And Cost-Effective? Surprise! It's The Mainfra...

2015-03-30 Thread Mohammad Khan
On Mon, 30 Mar 2015 08:07:02 -0500, Paul Gilmartin paulgboul...@aim.com wrote:


To me, one of the biggest pluses is the hardware memory key. As now
used by z/OS, it really helps with reliability because, properly used,
it enforces separation of authority (ability to write) by major OS
subsystem.  E.g. JES2 code can't step on VTAM memory in common
storage.
 
Certainly an effective accommodation to the single address space limitation
of its time.  but consider the gyrations the TSO TMP performs to run
a mixture of privileged and unprivileged tasks in a single address space.
(It might be better if all authorized programs had the discipline to
obtain storage only in system key and unauthorized were restricted to
user key, and if instead of JSCBAUTH there were a similar flag, but
with TCB rather than job step scope so subtasks could be dispatched in
suitable PSW keys.  Alas, no one anticipated,)

Nowadays, isn't segment protection with multiple address spaces a better
approach?


Yes, but only to a certain extent as different address spaces still have some 
common areas. Moreover application servers ( CICS, WAS ) running transactions 
on behalf of multiple users in the same address space are conceptually not that 
different from MVT.

Mohammad

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: OT: Digital? Cloud? Modern And Cost-Effective? Surprise! It's The Mainfra...

2015-03-30 Thread Shmuel Metz (Seymour J.)
In 39bc7.33e0233e.424a7...@aol.com, on 03/30/2015
   at 05:36 AM, Ed Finnell
000248cce9f3-dmarc-requ...@listserv.ua.edu said:

Be interesting to see a survey of biggest advances, or biggest 
blunders since we started.

Sometimes they're the same, e.g., Project Stretch may have been the
most profitable failure IBM ever had.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: OT: Digital? Cloud? Modern And Cost-Effective? Surprise! It's The Mainfra...

2015-03-30 Thread Shmuel Metz (Seymour J.)
In
caajsdjhwaswhnq89sqoebd5bny1eccsiqrizzyyfg1rgkz3...@mail.gmail.com,
on 03/30/2015
   at 06:54 AM, John McKown john.archie.mck...@gmail.com said:

To me, one of the biggest pluses is the hardware memory key. 

Better than nothing, and available before S/360 supported virtual
memory, but inferior to other mechanisms. I'll take segment/ring-based
protection any day. Even block relocation is arguably better.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: OT: Digital? Cloud? Modern And Cost-Effective? Surprise! It's The Mainfra...

2015-03-30 Thread John McKown
On Mon, Mar 30, 2015 at 4:36 AM, Ed Finnell
000248cce9f3-dmarc-requ...@listserv.ua.edu wrote:
 Good, bad or indifferent IBM-Main is coming up on 29 yrs( in June).

 Be interesting to see a survey of biggest advances, or biggest  blunders
 since we started.

Channeling gil: EBCDIC!

To me, one of the biggest pluses is the hardware memory key. As now
used by z/OS, it really helps with reliability because, properly used,
it enforces separation of authority (ability to write) by major OS
subsystem.  E.g. JES2 code can't step on VTAM memory in common
storage.

-- 
If you sent twitter messages while exploring, are you on a textpedition?

He's about as useful as a wax frying pan.

10 to the 12th power microphones = 1 Megaphone

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN