Howard,
what I always have on my desk is Appendix A (Component IDs for Elements
in z/OS) from Program Directory of my z/OS.
Take the component id from APAR and look up the id in Appendix A. The
last column shows the RETAIN release, which is the 3 chars id listed in
APARs.
Werner
Howard
Ron,
Are you using the BCM (Business Continuity Manager) Host software, or the
archaic PPRC commands?
As a GDPS PPRC site I believe we are stuck to PPRC commands.
Zaromil
--
For IBM-MAIN subscribe / signoff / archive access
If you use Shopzseries to download your service then you can just specify
the apar number and Shopzseries will select the correct ptf for your
system.
Jim McAlpine
On 3/9/06, Howard Rifkind [EMAIL PROTECTED] wrote:
I have an APAR number and I would like to know how to relate this to a PTF
-- snip --
Ron,
Are you using the BCM (Business Continuity Manager) Host software, or the
archaic PPRC commands?
As a GDPS PPRC site I believe we are stuck to PPRC commands.
-- snip -
By default yes.
You can write your own scripts, and could possibly intergrate the BCM
commands into GDPS.
I
If you are seeing an SB14 abend, there is usually a message IEC217I issued
which provides more information on the cause of the problem.
Bill
Neal Eckhardt wrote:
On 9 Mar 2006 00:38:20 -0800, [EMAIL PROTECTED] wrote:
i have a problem,when i edit some PDS member they tell me i/o error
,can
On 3/9/2006 12:42 AM, Bruce Hewson wrote:
To Shane, Walt and Chris,
Because it is the combination of
AUDITOR + RACF + ACCESS(ALTER) = many questions
We are asking BMC for more explanation.
My reading of the manual supplied to me did not give any indication that
ACCESS levels other than ALTER
On 3/9/2006 3:47 PM, Miklos Szigetvari wrote:
How can I start a subtask under another userid ?
Currently I make an ATTACH DISP=NO
RACINIT CREATE
copy the ACEE to TCBSENV
and aSTATUS RESET,ND
seems to have no effect
Off-hand it seems like that would work, if you
John,
Too true, but there's nothing to stop you using BCM for Shadowimage in a
GDPS environment.
In regards to the original question, let me have the weekend to think of it
in the context of a GDPS/PPRC environment with BCM. I'm assuming a USP for
the storage.
Ron
-Original Message-
Len,
How about storing them as Binary files on NFS mounted SATA?
You can access from Mainframe or Open System. You choose whether to store
metadata and file layouts with the files, or convert it to ASCII on the way
out.
Ron
-Original Message-
From: IBM Mainframe Discussion List
-Original Message-
From: IBM Mainframe Discussion List
[mailto:[EMAIL PROTECTED] On Behalf Of Ron and Jenny Hawkins
Sent: Friday, March 10, 2006 7:18 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Tape stacking, media conversion and data
archival past end of mainframe
Len,
How
Walt wrote:
The system does not provide propagation of the ACEE to subtasks during
ATTACH except for servers using WLM message queueing to process work
requests.
You will have to provide that propagation yourself, or ensure that your
code avoids multiple levels of subtasking.
I'm no security
Hi
I'm no security expert, but the impression I get from other products that
do security
checking on behalf of other users, is that, as someone earlier posted, a
RACROUTE is
performed using the subject's userid. It seems inappropriate to have to
muck with
the TCB.
You are propably
Hi,
You can also use the SRCHFOR command (since z/OS V1.6 ?) within a library,
then do a SORT PROMPT, and then go down to the members which don't have
the PROMPT.
Regards,
Date:Thu, 9 Mar 2006 12:16:24 -0500
From:Robert Pelletier [EMAIL PROTECTED]
Subject: USING ISPF OPTION 3.14 to
Yes, I've found that my past problems with COPYCAT were either corrected or due
to user error. COPYCAT wasn't cooperating with our SMS managed 3590 somewhere
in the forgotten past and I hadn't tried it again. I used a output unit that
was recognized by the ACS to set data class and it works.
Sí, yo comprendo, creo que si. Ass/u/me/ing you're just looking for
precedent, and for messages your product issues...
Many C/C++ compilers have a #pragma option (varies from compiler to
compiler, of course) that can suppress (and then unsuppress) messages. I
have had to use it before to
This may have changed...
But no. The very first SVC screening routine I wrote was to propagate
TCBSENV because of this very situation.
Contact me off-list for details.
Best regards,
Ray
-Original Message-
From: IBM Mainframe Discussion List
[mailto:[EMAIL PROTECTED] On Behalf Of
John,
Sometimes we have to think outside of the nine dots :)
Now, as to the medium to use. I don't really care. In my opinion, all
data should be periodically copied to new media at least every two
years.
This maybe necessary for media like tape, but does it really apply to disk.
The data
On 3/10/2006 9:25 AM, [EMAIL PROTECTED] wrote:
I'm no security expert, but the impression I get from other products that
do security checking on behalf of other users, is that, as someone earlier posted, a
RACROUTE is performed using the subject's userid. It seems inappropriate to have to
In a recent note, Ray Mullins said:
Date: Fri, 10 Mar 2006 07:08:05 -0800
Many C/C++ compilers have a #pragma option (varies from compiler to
compiler, of course) that can suppress (and then unsuppress) messages. I
Sometimes allowing the programmer to control the severity of
Hopefully someone can point me in the right direction
I'm look for a copy of IMS/VS Low-Level Code/Continuity Check DL/I
OS/VS Program Reference and Operations Manual
The last manual number that I can find for LLC/CC was SH20-9047
Jim Chappell
503 745-7841
503 349-5603(Cell)
In a recent note, Walt Farrell said:
Date: Fri, 10 Mar 2006 10:53:09 -0500
He is trying to establish a different security environment within his
server, in which all requests made by the system need to be processed as
a different user. He is not making a request on behalf of
When the security server checks for authorization, the following is used:
1 - The ACEE passed in the parmlist.
2 - If above is zero, the ACEE pointed to in TCBSENV
3 - If above is zero, the ACEE pointed to in ASXBSENV
As Walt mentioned, ACEE's are not propagated (in retrospect, might not have
Thanks.
Right, I've seen that C #pragma thing. That's exactly what I'm talking
about. I'll take a look at it again.
It is our own messages I'm talking about, not the invoked compilers, and as
you imply, it's probably most relevant to warning messages, because things
like can't open input dataset
Due to SOX and VISA security regulations, my company needs to encrypt credit
card sales data being sored in DB2 tables. We have tried both IBM's
Encryption for IMS DB2 product along with ASPG's Megacryption. Can anyone
recommend another vendor's product to encrypt DB2 data - preferably at the
We wrote a DB2 fieldproc exit that calls ICSF services to
encrypt/decrypt DB2 table data at the column level. It wasn't too hard
to write.
Mark Jacobs
Time Customer Service Inc.
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Harry Riedel
It is our own messages I'm talking about, not the invoked compilers,
and
as
you imply, it's probably most relevant to warning messages, because
things
like can't open input dataset are hard to ignore.
For functions (programs) running on our infrastructure, every function
return passes through
On 3/10/2006 11:04 AM, [EMAIL PROTECTED] wrote:
In a recent note, Walt Farrell said:
Date: Fri, 10 Mar 2006 10:53:09 -0500
He is trying to establish a different security environment within his
server, in which all requests made by the system need to be processed as
a different user.
On 3/10/2006 11:08 AM, Wayne Driscoll wrote:
As Walt mentioned, ACEE's are not propagated (in retrospect, might not have
been the best choice, but its way to late in the game to change).
We changed it in the WLM server environment, where we felt we could
safely make such a change.
The
Sometimes allowing the programmer to control the severity of
selected messages by specific message code.
Good idea, hadn't thought of that. Thanks. Maybe we can turn eights into
fours as well as turning fours into zeroes.
if this capability is provided in PARM (one plausible
implementation) it
Have you asked on IMS-L?
-Original Message-
From: IBM Mainframe Discussion List
[mailto:[EMAIL PROTECTED] On Behalf Of James Chappell
Sent: Friday March 10 2006 08:00
To: IBM-MAIN@BAMA.UA.EDU
Subject: IMS -- Old Manual
Hopefully someone can point me in the right direction
Jousma, David wrote:
All,
I'm trying to figure something out here. We have OAM running to support
our 3494 and VTS tape libraries. However, I cannot see where we have
done anything to enable OAM's use of DB2. Is it possible that OAM can
be used without DB2? We don't any 3995's installed, and
We use a company called Protegrity - We went live in production not long
ago on MLK's birthday. They have a piece called DTP that allows transfers
between z/OS DB2 and Open Systems that we use. we use a combination of
views/triggers/UDFs in DB2. I believe views are used as well on the smaller
Anyone know the platform of the system that was hacked? Inquiring minds
want to know. ;)
http://www.crn.com/sections/breakingnews/breakingnews.jhtml?articleId=181502
672
--
For IBM-MAIN subscribe / signoff / archive access
In a message dated 3/10/2006 10:41:11 A.M. Central Standard Time,
[EMAIL PROTECTED] writes:
Encryption for IMS DB2 product along with ASPG's Megacryption. Can anyone
recommend another vendor's product to encrypt DB2 data - preferably at the
column level rather than encrypting the whole
Hey Sam, nice OPS REXX. However, I couldn't resist posting the NetView
code to do the exact same thing. Mine is somewhat shorter I have to say,
plus it only gets invoked once for the WTO or MLWTO where yours is
actually getting invoked for each line of a MLWTO.
AT trap (3 lines):
IF MSGID =
Will be starting out with z/OS 1.5, then upgrading to z/OS 1.7.
TIA,
-jc-
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the
On Fri, 10 Mar 2006 14:08:22 -0600, Chase, John [EMAIL PROTECTED] wrote:
Will be starting out with z/OS 1.5, then upgrading to z/OS 1.7.
UPGRADE: 2094DEVICE
Be aware that this is really an add on to 2084DEVICE (z990), so you
need to look at both.
If you aren't currently using it, I highly
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Mark Zelden
On Fri, 10 Mar 2006 14:08:22 -0600, Chase, John wrote:
Will be starting out with z/OS 1.5, then upgrading to z/OS 1.7.
UPGRADE: 2094DEVICE
Be aware that this is really an add on to 2084DEVICE
In [EMAIL PROTECTED], on 03/09/2006
at 06:16 PM, Len Rugen [EMAIL PROTECTED] said:
I'm wondering if mainframe data on 3590's could be accessed in the
future from the AIX side even after the mainframe is gone?
Convert to AWS and use Hercules?
--
Shmuel (Seymour J.) Metz, SysProg and
I promised I would report on our SAP/R3 conversion off of our mainframe to
our sister company's RS6000 box in Pennsylvania. Last Wednesday evening we
shut down all of our CICSs and made them read only. We converted all of
the files needed to the proper format, and FTP'd them to our sister
Bob,
If you have FileAid or something similar that would work.
If not, I have some assm rtns that I wrote many, many yrs ago, that
I can share if you want.
Jeff
--
For IBM-MAIN subscribe / signoff / archive access
On Fri, 10 Mar 2006 21:13:20 +0800, Ron and Jenny Hawkins
[EMAIL PROTECTED] wrote:
Too true, but there's nothing to stop you using BCM for Shadowimage in a
GDPS environment.
In regards to the original question, let me have the weekend to think of it
in the context of a GDPS/PPRC environment with
Apologies if you have already seen this posting. I'm having problems seeing
posting as I only view thru the News group. I have NOMAIL set so I do not
get email for any postings. I'm not sure if I also need to post to news
group.
Since we are not able to purchase something like FDR Instant,
Richard Tsujimoto wrote:
I'm no security expert, but the impression I get from other products that
do securitychecking on behalf of other users, is that, as someone earlier posted, a
RACROUTE is performed using the subject's userid. It seems inappropriate to have to
muck with the TCB.
At one time I had a url which pointed to an IBM web site where you could find
all the FMID's. Would any one remember or have that url.
Thanks.
-
Yahoo! Mail
Use Photomail to share photos without annoying attachments.
In a message dated 3/10/2006 8:58:52 P.M. Central Standard Time,
[EMAIL PROTECTED] writes:
At one time I had a url which pointed to an IBM web site where you could
find all the FMID's. Would any one remember or have that url.
No but google'd IBM FMIDs and first hit is CST!
The State of New Hampshire had a system with malware installed -- a single
Microsoft Windows server -- that was processing payments for government
agencies, including motor vehicles. Those payment records were
compromised. This news broke a couple weeks ago.
47 matches
Mail list logo