Re: Sort Question

2017-07-16 Thread Sri h Kolusu
>>>Thanks!… I would never have gotten that without a lot of testing. Also 
I did not know the first “field” was limited to 30. I learned several 
things today. 

Edward,

As retired mainframer pointed out, it was MY assumption about the length 
being 30. You can have whatever you want. Just change the FIXLEN=30 to 
whatever you want and change the positions of OVERLAY and SORT fields 
according to your desired length.

>>Also, the first part of the address can contain "." characters, so the 
second parse will not work correctly in all cases. 

Walt,

Not really. It does not matter as to how many "." you have before "@", the 
first field parse will ignore the ".". So as long as the string as has "@" 
character the first parse will be active and only the contents AFTER the 
"@" will be parsed by the 2nd parse field for the domain.

For example if you had a.b@email.com the first parse field for "@" 
will get the entire string a.b.c.d and the 2nd parse field for "." will 
get the email

However your scenario for "." is true for domain. As some email address 
may contain "." for domain. like for example walt.farr...@yahoo.co.uk

In the above case the name will be parsed as walt.farrell and the domain 
is ONLY parsed to yahoo instead of yahoo.co.uk 

So if OP's has various combos of records with multiple characters of "." 
in the domain name, then he needs to account for them which isn't that 
hard given that he had a template to start with. I just coded it on a 
saturday night with a sample data shown and it is an untested version.

Thanks,
Kolusu

IBM Mainframe Discussion List  wrote on 
07/16/2017 06:33:44 AM:

> From: Walt Farrell 
> To: IBM-MAIN@LISTSERV.UA.EDU
> Date: 07/16/2017 06:34 AM
> Subject: Re: Sort Question
> Sent by: IBM Mainframe Discussion List 
> 
> On Sat, 15 Jul 2017 22:52:47 -0500, Edward Gould 
>  wrote:
> 
> >> On Jul 15, 2017, at 10:39 PM, Sri h Kolusu  
wrote:
> >> 
> >> Edward, 
> >> 
> >> Here is a  DFSORT JCL which will give you the desired results. I 
assumed 
> >> that your input file is FB and 80 bytes in length. I also assumed 
that 
> >> your name and domain names are each 30 bytes in length.
> >> 
> >> //STEP0100 EXEC PGM=SORT 
> >> //SYSOUT   DD SYSOUT=* 
> >> //SORTIN   DD * 
> >> x...@bbb.com  
> >> aa...@aaa.com  
> >> b...@aa.com  
> >> n...@example.com  
> >> exampleem...@domain.in  
> >> //SORTOUT  DD SYSOUT=* 
> >>  INREC PARSE=(%01=(ENDBEFR=C'@',FIXLEN=30),   $ GET FIELD BEFORE @ 
> >>   %02=(ENDBEFR=C'.',FIXLEN=30)),  $ GETFIELD BEFORE . 
> >>   OVERLAY=(081:%01,   $ PUT NAME AT 81 
> >>111:%02)   $ PUT DOMAIN AT 111 
> >> 
> >>  SORT FIELDS=(081,30,CH,A,$ NAME 
> >>   111,30,CH,A),EQUALS $ DOMAIN 
> >> 
> >>  OUTREC BUILD=(1,80)  $ REMOVE TEMP FIELDS 
> >> /* 
> >> 
> >> The output from this field is
> >> 
> >> aa...@aaa.com  
> >> b...@aa.com  
> >> exampleem...@domain.in  
> >> n...@example.com  
> >> x...@bbb.com  
> >> 
> >> Further if you have questions please let me know
> >> 
> >> Thanks,
> >> Kolusu
> >> DFSORT Development
> >> IBM Corporation
> >> 
> >
> >Thanks!… I would never have gotten that without a lot of testing. 
> Also I did not know the first “field” was limited to 30. I learned 
> >several things today.
> 
> The part of the email address before the @ is NOT limited to 30 
> characters. Nor is the part after the @. Also, the first part of the
> address can contain "." characters, so the second parse will not 
> work correctly in all cases. 
> 
> If you can guarantee that the  part will always
> be present, then it might be safer to parse that part, looking for 
> the text between "". But in
> any case you will risk truncating the part before the @ unless you 
> allow for the possibility of it being much longer.
> 
> -- 
> Walt
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Sort Question

2017-07-16 Thread Paul Gilmartin
On Sun, 16 Jul 2017 07:38:36 -0700, Sri h Kolusu wrote:

>>>... all challenges for DFSORT; some not algorithmically solvable.
>'
>Can you send me a sample of data with all the challenging scenarios and I 
>will *try* to see if I can solve it. For a fully tested solution it would 
>be only on Monday.
> 
Sent a few off-list; certainly not all.

Hmmm.  Does z/OS (or another OS) allow "@" in user IDs?  Then:
To: Nuisance User <"TSO@ID"@Example.com>

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Sort Question

2017-07-16 Thread Paul Gilmartin
On Sat, 15 Jul 2017 14:18:41 -0500, Edward Gould wrote:

>One of my users asked me this question and I am not quite clear on how to 
>respond.
>Given an email address aaa...@bbb.com  (example)
>
>He just wants to sort on the field before the @ and then for a secondary sort 
>the bbb field. Both fields are variable in length (not sure what the max is).
>Any suggestions on how to do this? I have tried RTFM but maybe I am not 
>looking at the question correctly .
>
(From RFC 822:
 addr-spec   =  local-part "@" domain; global address )

The domain is specified (Internet standard) to be case-insensitive.

The interpretation of the local-part is left entirely up to the server,
which may treat it as case-sensitive or insensitive.

If the local-part contains special characters, it must be surrounded by
quotation marks.  If there are no special characters, the quotation
marks are optional.

Mappings may make domains equivalent.  For example, my domain
may be written as "AIM.com" or "AOL.Com"

Some servers (not all) accept userID"+"subaccount as a local-part,
delivering mail to userID and allowing rules in userID's MUA to
sort messages into folders.

And a comment may be profided as a "phrase" in "mailbox"

 mailbox =  addr-spec; simple address
 /  phrase route-addr; name & addr-spec

 route-addr  =  "<" [route] addr-spec ">"

... all challenges for DFSORT; some not algorithmically solvable.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


CICS Logstreams

2017-07-16 Thread Mohamed Gomaa
I am locking for setting CICS log stream using structure in sysplex and for 
recovery purpose we want to  use staging dataset.
I am locking for policy sample to define it

Thanks
Mohamed Juma
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Sort Question

2017-07-16 Thread Sri h Kolusu
>>... all challenges for DFSORT; some not algorithmically solvable.

Paul,
'
Can you send me a sample of data with all the challenging scenarios and I 
will *try* to see if I can solve it. For a fully tested solution it would 
be only on Monday.

Thanks,
Kolusu

IBM Mainframe Discussion List  wrote on 
07/16/2017 07:28:19 AM:

> From: Paul Gilmartin <000433f07816-dmarc-requ...@listserv.ua.edu>
> To: IBM-MAIN@LISTSERV.UA.EDU
> Date: 07/16/2017 07:28 AM
> Subject: Re: Sort Question
> Sent by: IBM Mainframe Discussion List 
> 
> On Sat, 15 Jul 2017 14:18:41 -0500, Edward Gould wrote:
> 
> >One of my users asked me this question and I am not quite clear on 
> how to respond.
> >Given an email address aaa...@bbb.com  (example)
> >
> >He just wants to sort on the field before the @ and then for a 
> secondary sort the bbb field. Both fields are variable in length 
> (not sure what the max is).
> >Any suggestions on how to do this? I have tried RTFM but maybe I am
> not looking at the question correctly .
> >
> (From RFC 822:
>  addr-spec   =  local-part "@" domain; global address )
> 
> The domain is specified (Internet standard) to be case-insensitive.
> 
> The interpretation of the local-part is left entirely up to the server,
> which may treat it as case-sensitive or insensitive.
> 
> If the local-part contains special characters, it must be surrounded by
> quotation marks.  If there are no special characters, the quotation
> marks are optional.
> 
> Mappings may make domains equivalent.  For example, my domain
> may be written as "AIM.com" or "AOL.Com"
> 
> Some servers (not all) accept userID"+"subaccount as a local-part,
> delivering mail to userID and allowing rules in userID's MUA to
> sort messages into folders.
> 
> And a comment may be profided as a "phrase" in "mailbox"
> 
>  mailbox =  addr-spec; simple address
>  /  phrase route-addr; name & addr-spec
> 
>  route-addr  =  "<" [route] addr-spec ">"
> 
> ... all challenges for DFSORT; some not algorithmically solvable.
> 
> -- gil
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: CICS Logstreams

2017-07-16 Thread Lizette Koehler
I think you mean looking not locking

User your favorite internet browser and use the phrase

cics logstream define installation




You will find what you need.

Lizette


> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Mohamed Gomaa
> Sent: Sunday, July 16, 2017 9:50 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: CICS Logstreams
> 
> I am locking for setting CICS log stream using structure in sysplex and for
> recovery purpose we want to  use staging dataset.
> I am locking for policy sample to define it
> 
> Thanks
> Mohamed Juma

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Need Hep with HIDS and z/OS

2017-07-16 Thread esst...@juno.com
Charles Mills wrote
 
>"log user actions and tie said actions back to that user via a unique
>identifier"

>That is not intrusion detection. Intrusion detection is a good thing, but it
>is basically looking for outsiders trying to get in. (Loosely speaking.) Not
>known users doing good and occasionally bad things.
 

Do I understand this correctly
Intrusion detection deals with Outsiders trying to access a system ?

Where as Logging user actions and coordinating a users activity using a unique 
identifier
validates in-house or business users activities.

Do I understand the difference ? 


Paul D'Angelo
 

-- Original Message --
From: Charles Mills 
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Need Hep with HIDS and z/OS
Date: Fri, 14 Jul 2017 17:37:03 -0700

"log user actions and tie said actions back to that user via a unique
identifier"

That is not intrusion detection. Intrusion detection is a good thing, but it
is basically looking for outsiders trying to get in. (Loosely speaking.) Not
known users doing good and occasionally bad things.



https://correlog.com/mainframe-security-solutions/sas-correlog-mainframe/ 
+
https://correlog.com/software/download-czdash-rcpt.html 

Does exactly what you describe. In real time. With alerts for the bad things
to your cell phone or BMC Remedy, etc.

See it live in action with "Soldier of Fortran" Phil Young:
https://correlog.com/correlog-events/ (scroll down to the second section)



Charles

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of esst...@juno.com
Sent: Friday, July 14, 2017 3:28 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Need Hep with HIDS and z/OS

 
Hello, 
 

I'm not a security person. 
Need some help with HIDS and z/OS-
What is HIDS You ask ?
HIDS  stands for Host Intrusion Detection System
*
I'm researching an issue for a business unit.
I really know nothing about HIDS.

.
There requirement
What they are looking for here is essentially a tool that has the
functionality to log user actions and tie said actions back to that user via
a unique identifier.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Need Hep with HIDS and z/OS

2017-07-16 Thread esst...@juno.com
Thanks to all who responded

.
As a novice in this area, I have many questions.

What is the increase in CPU with any intrusion detection product ?
.
When is intrusion detected ?
Meaning in real time when the event happens or is it logged/posted later on a 
some report ? 

  



-- Original Message --
From: Charles Mills 
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Need Hep with HIDS and z/OS
Date: Sat, 15 Jul 2017 13:00:33 -0700

Wow. Sorry. Server must have been having a bad day. I just clicked on the
link that you re-posted and it works for me. I use Chrome, but I believe it
is tested will all the usual suspects. Can you try again?

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Edward Gould
Sent: Saturday, July 15, 2017 10:31 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Need Hep with HIDS and z/OS

> On Jul 14, 2017, at 7:37 PM, Charles Mills  wrote:
> 
> "log user actions and tie said actions back to that user via a unique 
> identifier"
> 
> That is not intrusion detection. Intrusion detection is a good thing, 
> but it is basically looking for outsiders trying to get in. (Loosely 
> speaking.) Not known users doing good and occasionally bad things.
> 
> 
> 
> https://correlog.com/mainframe-security-solutions/sas-correlog-mainfra
> me/ 
>  ame/>
> +
> https://correlog.com/software/download-czdash-rcpt.html 
> 
> 
> Does exactly what you describe

Charles,

I went to the url you
supplied:https://correlog.com/mainframe-security-solutions/sas-correlog-main
frame/


and got this:

Internal Server Error

The server encountered an internal error or misconfiguration and was unable
to complete your request.

Please contact the server administrator at webmas...@correlog.com to inform
them of the time this error occurred, and the actions you performed just
before this error.

More information about this error may be available in the server error log.

Additionally, a 500 Internal Server Error error was encountered while trying
to use an ErrorDocument to handle the request.


 


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Sort Question

2017-07-16 Thread Walt Farrell
On Sat, 15 Jul 2017 22:52:47 -0500, Edward Gould  
wrote:

>> On Jul 15, 2017, at 10:39 PM, Sri h Kolusu  wrote:
>> 
>> Edward, 
>> 
>> Here is a  DFSORT JCL which will give you the desired results. I assumed 
>> that your input file is FB and 80 bytes in length. I also assumed that 
>> your name and domain names are each 30 bytes in length.
>> 
>> //STEP0100 EXEC PGM=SORT 
>> //SYSOUT   DD SYSOUT=* 
>> //SORTIN   DD * 
>> x...@bbb.com  
>> aa...@aaa.com  
>> b...@aa.com  
>> n...@example.com  
>> exampleem...@domain.in  
>> //SORTOUT  DD SYSOUT=* 
>>  INREC PARSE=(%01=(ENDBEFR=C'@',FIXLEN=30),   $ GET FIELD BEFORE @ 
>>   %02=(ENDBEFR=C'.',FIXLEN=30)),  $ GETFIELD BEFORE . 
>>   OVERLAY=(081:%01,   $ PUT NAME AT 81 
>>111:%02)   $ PUT DOMAIN AT 111 
>> 
>>  SORT FIELDS=(081,30,CH,A,$ NAME 
>>   111,30,CH,A),EQUALS $ DOMAIN 
>> 
>>  OUTREC BUILD=(1,80)  $ REMOVE TEMP FIELDS 
>> /*  
>> 
>> The output from this field is
>> 
>> aa...@aaa.com  
>> b...@aa.com  
>> exampleem...@domain.in  
>> n...@example.com  
>> x...@bbb.com  
>> 
>> Further if you have questions please let me know
>> 
>> Thanks,
>> Kolusu
>> DFSORT Development
>> IBM Corporation
>> 
>
>Thanks!… I would never have gotten that without a lot of testing. Also I did 
>not know the first “field” was limited to 30. I learned >several things today.

The part of the email address before the @ is NOT limited to 30 characters. Nor 
is the part after the @. Also, the first part of the address can contain "." 
characters, so the second parse will not work correctly in all cases. 

If you can guarantee that the  part will always be 
present, then it might be safer to parse that part, looking for the text 
between "". But in any case you will 
risk truncating the part before the @ unless you allow for the possibility of 
it being much longer.

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: CICS Logstreams

2017-07-16 Thread Mohamed Gomaa
I think you mean use your favorite not user 

Thanks 

Sent from my iPhone

> On Jul 16, 2017, at 8:03 PM, Lizette Koehler  wrote:
> 
> I think you mean looking not locking
> 
> User your favorite internet browser and use the phrase
> 
> cics logstream define installation
> 
> 
> 
> 
> You will find what you need.
> 
> Lizette
> 
> 
>> -Original Message-
>> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
>> Behalf Of Mohamed Gomaa
>> Sent: Sunday, July 16, 2017 9:50 AM
>> To: IBM-MAIN@LISTSERV.UA.EDU
>> Subject: CICS Logstreams
>> 
>> I am locking for setting CICS log stream using structure in sysplex and for
>> recovery purpose we want to  use staging dataset.
>> I am locking for policy sample to define it
>> 
>> Thanks
>> Mohamed Juma
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


IBM Unveils New IBM Z with Pervasive Encryption

2017-07-16 Thread Timothy Sipples
IBM's press release is available here:

https://www.ibm.com/press/us/en/pressrelease/52805.wss


Timothy Sipples
IT Architect Executive, Industry Solutions, IBM z Systems, AP/GCG/MEA
E-Mail: sipp...@sg.ibm.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IBM Unveils New IBM Z with Pervasive Encryption

2017-07-16 Thread Timothy Sipples
IBM's announcement letters for July 17, 2017, are now going live across the
time zones, starting with Asia-Pacific and Japan. (Presumably over the next
few hours the versions of these announcements for other geographies will go
live.) Please watch the wrap! There's a great deal to absorb here, and I'll
likely have some comments and answers to offer quite soon.

Index to All IBM Announcement Letters for July 17, 2017
http://www.ibm.com/common/ssi/ShowDoc.wss?docURL=/common/ssi/rep_ca/0/872/ENUSAL17-0030/index.html_locale=en

Here are the direct links to the PDF versions of today's AP announcements:

IBM z14
https://www.ibm.com/common/ssi/rep_ca/4/872/ENUSAG17-0044/ENUSAG17-0044.PDF

IBM z/OS Version 2.3
https://www.ibm.com/common/ssi/rep_ca/9/872/ENUSAP17-0239/ENUSAP17-0239.PDF

IBM Open Data Analytics for z/OS Version 1.1 (Apache Spark, Python,
Anaconda)
https://www.ibm.com/common/ssi/rep_ca/5/872/ENUSAP17-0225/ENUSAP17-0225.PDF

Sub-Capacity Pricing Terms for z/VM
https://www.ibm.com/common/ssi/rep_ca/9/872/ENUSAP17-0259/ENUSAP17-0259.PDF

IBM Security zSecure Version 2.3 Suite
https://www.ibm.com/common/ssi/rep_ca/7/872/ENUSAP17-0357/ENUSAP17-0357.PDF

IBM Application Delivery Foundation for z Systems Version 3.1
https://www.ibm.com/common/ssi/rep_ca/0/872/ENUSAP17-0350/ENUSAP17-0350.PDF

IBM Developer for z Systems Version 14.1
https://www.ibm.com/common/ssi/rep_ca/9/872/ENUSAP17-0349/ENUSAP17-0349.PDF

IBM z Systems Development and Test Environment Version 11
https://www.ibm.com/common/ssi/rep_ca/8/872/ENUSAP17-0328/ENUSAP17-0328.PDF

IBM SDK for Node.js on z/OS Version 6.0
https://www.ibm.com/common/ssi/rep_ca/6/872/ENUSAP17-0356/ENUSAP17-0356.PDF

IBM Enterprise COBOL Version 6.2
https://www.ibm.com/common/ssi/rep_ca/3/872/ENUSAP17-0313/ENUSAP17-0313.PDF

IBM Enterprise COBOL Version 6.2 Value Unit Edition
https://www.ibm.com/common/ssi/rep_ca/4/872/ENUSAP17-0344/ENUSAP17-0344.PDF

IBM Enterprise COBOL Version 6.2 Developer Trial
https://www.ibm.com/common/ssi/rep_ca/5/872/ENUSAP17-0345/ENUSAP17-0345.PDF

IBM Automatic Binary Optimizer Version 1.3
https://www.ibm.com/common/ssi/rep_ca/1/872/ENUSAP17-0311/ENUSAP17-0311.PDF

IBM Record Generator for Java Version 3.0
https://www.ibm.com/common/ssi/rep_ca/7/872/ENUSAP17-0287/ENUSAP17-0287.PDF

IBM Enterprise PL/I Version 5.2
https://www.ibm.com/common/ssi/rep_ca/2/872/ENUSAP17-0342/ENUSAP17-0342.PDF

IBM Enterprise PL/I Version 5.2 Value Unit Edition
https://www.ibm.com/common/ssi/rep_ca/1/872/ENUSAP17-0341/ENUSAP17-0341.PDF

IBM Financial Transaction Manager for z/OS Statement of Direction
https://www.ibm.com/common/ssi/rep_ca/8/872/ENUSAP17-0358/ENUSAP17-0358.PDF

Technology Transition Offerings for the IBM z14
https://www.ibm.com/common/ssi/rep_ca/5/872/ENUSAP17-0265/ENUSAP17-0265.PDF

IBM Service Management Suite for z/OS Version 1.5 and IBM OMEGAMON
Performance Management Suite for z/OS Version 5.5
https://www.ibm.com/common/ssi/rep_ca/2/872/ENUSAP17-0262/ENUSAP17-0262.PDF


Timothy Sipples
IT Architect Executive, Industry Solutions, IBM z Systems, AP/GCG/MEA
E-Mail: sipp...@sg.ibm.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Any IBM pSeries gurus out there?

2017-07-16 Thread Steve Estle
Mike,

I sent you separate email.  Contact me offline.

Thanks,
Steve Estle

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: CICS Logstreams

2017-07-16 Thread scott Ford
Remember terminology for us here on the Listserv is important.
Wrong words can be misleading..


On Sun, Jul 16, 2017 at 2:20 PM Mohamed Gomaa <
00cefc9a9b79-dmarc-requ...@listserv.ua.edu> wrote:

> I think you mean use your favorite not user
>
> Thanks
>
> Sent from my iPhone
>
> > On Jul 16, 2017, at 8:03 PM, Lizette Koehler 
> wrote:
> >
> > I think you mean looking not locking
> >
> > User your favorite internet browser and use the phrase
> >
> > cics logstream define installation
> >
> >
> >
> >
> > You will find what you need.
> >
> > Lizette
> >
> >
> >> -Original Message-
> >> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On
> >> Behalf Of Mohamed Gomaa
> >> Sent: Sunday, July 16, 2017 9:50 AM
> >> To: IBM-MAIN@LISTSERV.UA.EDU
> >> Subject: CICS Logstreams
> >>
> >> I am locking for setting CICS log stream using structure in sysplex and
> for
> >> recovery purpose we want to  use staging dataset.
> >> I am locking for policy sample to define it
> >>
> >> Thanks
> >> Mohamed Juma
> >
> > --
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
-- 
Scott Ford
IDMWORKS
z/OS Development

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Running unsupported is dangerous was Re: AW: Re: LE strikes again

2017-07-16 Thread Timothy Sipples
Scott Ford wrote:
>But from a application point of view, if the application is using AT/TLS
>and there are Pagent protection policies for PORTS/IP addresses and the
>application is using encryption, where's the risk ???

There's plenty of risk when running an unsupported, unpatched release. Even
leaving that important point aside, you're assuming a fact not in evidence.
z/OS 1.4 didn't have AT-TLS. AT-TLS debuted in z/OS 1.7:

https://www.ibm.com/common/ssi/rep_ca/7/897/ENUS205-167/ENUS205-167.PDF

Notably, z/OS 1.4 was Generally Available on September 27, 2002. TLS 1.1
was not even defined until April, 2006 (RFC 4346), never mind TLS 1.2 (RFC
5246 in August, 2008, and RFC 6176 in March, 2011).

FYI, the PCI Council requires an absolute minimum of TLS 1.1 (if configured
according to NIST Special Publication 800-52 Revision 1) to comply with
their Data Security Standard (DSS) Version 3.1.

A lot has happened in the past decade and a half, never mind what's soon to
happen. The "soon to happen" is also important. You simply cannot defend
yourself if you're cut off from vendor supplies of security patches or if
you don't follow a reasonable preventive maintenance program.


Timothy Sipples
IT Architect Executive, Industry Solutions, IBM z Systems, AP/GCG/MEA
E-Mail: sipp...@sg.ibm.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Sort Question

2017-07-16 Thread retired mainframer
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Edward Gould
> Sent: Saturday, July 15, 2017 8:53 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: Sort Question
> 
> > On Jul 15, 2017, at 10:39 PM, Sri h Kolusu  wrote:
> >
> > Edward,
> >
> > Here is a  DFSORT JCL which will give you the desired results. I assumed
> > that your input file is FB and 80 bytes in length. I also assumed that
> > your name and domain names are each 30 bytes in length.



> Thanks!… I would never have gotten that without a lot of testing. Also I did 
> not know the
> first “field” was limited to 30. I learned several things today.

The 30 character limit is an assumption.  Use whatever values make sense for 
the data you are processing

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN