> -Original Message-
> From: IBM Mainframe Discussion List
> [mailto:[EMAIL PROTECTED] On Behalf Of Phil Kingston
> Sent: Tuesday, July 24, 2007 8:53 AM
> To: IBM-MAIN@BAMA.UA.EDU
> Subject: How to extend addressability over 4095 with USING statements
>
>
> Hi again,
>
> I'm trying to w
On Tue, 24 Jul 2007 08:35:43 -0500, Kelman, Tom
<[EMAIL PROTECTED]> wrote:
>I'm not sure how you would secure a specific CLIST and a couple of
>people have responded with suggestions. However, if it is access to WLM
>you want to secure you can do that in RACF via the use of the facility
>class MV
Careful reading of the 2105 Command Reference doc shows that valid sector
numbers are not documented as being ignored. I take that to mean they are
used
as documented; i.e., the next action on the track will commence with track
orientation at a predictable position on the track. If the nex
HMS5310
Jon L. Veilleux
[EMAIL PROTECTED]
(860) 636-2683
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Chase, John
Sent: Tuesday, July 24, 2007 9:48 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: IBMLink "Challenge"
Hi, All,
IBMLink on the web i
Hi again,
I'm trying to write a TSO command processor which seems to be getting
addressability issues over 4095 bytes, e.g ASMA034E message.
I know there's a way of extending the addressability, but can't
remember.
Anyone know how to do it?
Ps. The IBM message for ASMA034E is of no use at all..
Hi, All,
IBMLink on the web is unusually slow this morning (even by IBMLink on
the Web "standard"!), so I'd like to solicit a bit of help from one of
you with a 3270 IBMLink connection: I'm looking for the FMID for MQ
Series 5.3.1, compid 5655F1000. I am waiting for the Product Cross
Reference a
William,
1 - You state that internal customers are only concerned with chargeback
and application performance, yet if that was the case, why are the
putting up with web apps with 10-12 second response time and the
requirement that they move their hands from the keyboard to the mouse
and back repeat
If you look at the posting, it was for a level II person, not a
developer.
Wayne Driscoll
Product Developer
JME Software LLC
NOTE: All opinions are strictly my own.
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Chase, John
Sent: Tuesday,
I guess I read what I wanted to read, and not what the original question
was. Try to take more time in the future before replying. Paul, hope I
didn't send you on a wild goose chase.
--Dave Day
- Original Message -
From: "Philippe Leite" <[EMAIL PROTECTED]>
Newsgroups: bit.listse
I'm not sure how you would secure a specific CLIST and a couple of
people have responded with suggestions. However, if it is access to WLM
you want to secure you can do that in RACF via the use of the facility
class MVSADMIN.WLM.POLICY. With this you can block access entirely or
give someone just
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
> Behalf Of Paul Schuster
> Sent: Tuesday, July 24, 2007 12:33 AM
> To: IBM-MAIN@BAMA.UA.EDU
> Subject: Is a page protected?--how to determine
>
> Hello: I have a need to determine if an address in stor
David,
Actually, ISVK cannot tell you if a page is protected or not, it only shows you
the storage key and fetch bit. The Page protection bit (bit 54) is in Page
Table Entry and Segment Table Entry.
Best regards,
Philippe Leite
z/OS Systems Programmer
Portugal
On Tue, 24 Jul 2007 07:28:15 -0
z/OS 1.7
We are trying to map a RMM managed cart using DITTO
//*
//*
//S3 EXEC PGM=DITTOA,PARM='JOBSTREAM',COND=(0,NE)
//SYSPRINT DD SYS
I am in need of a fairly straightforward method of turning a PDS into a
flat file (for modifications) and then back into a PDS. Having the
original ISPF stats present in the final PDS is not necessarily a critical
part of the process for us --- nice, but not absolutely necessary.
I have an REXX e
On Tue, 24 Jul 2007 07:44:28 -0500, McKown, John
<[EMAIL PROTECTED]> wrote:
>> -Original Message-
>> From: IBM Mainframe Discussion List
>> [mailto:[EMAIL PROTECTED] On Behalf Of Carroll, William
>> Sent: Tuesday, July 24, 2007 7:40 AM
>> To: IBM-MAIN@BAMA.UA.EDU
>> Subject: Secure clist
>
> -Original Message-
> From: IBM Mainframe Discussion List
> [mailto:[EMAIL PROTECTED] On Behalf Of Carroll, William
> Sent: Tuesday, July 24, 2007 7:40 AM
> To: IBM-MAIN@BAMA.UA.EDU
> Subject: Secure clist
>
>
> Is there any way to secure certain clist from unauthorized use?
> For examp
Is there any way to secure certain clist from unauthorized use?
For example if I don't want applications to get into the wlm,
Application, how would I do it? If it can be done.
Thanks In Advance.
Bill Carroll
EMAIL DISCLAIMER:
The information contained in this message may be
privileged or c
Hi Lizette,
I haven't tried thisbut, it might do the trick.
Open the COBOL source in edit mode and type HI on the command line and
hit Enter. You will see the below. Select 5 for COBOL and select option
3 for Coloring.
File Languages Colors Help
Timothy,
Internal customers do not ask your question, "How do you measure the total
performance of the whole IT organization?"
They are really only interested in the total cost of acquistion or internal
chargeback (excluding power and environmentals) and application performance.
--
Chapter 10 of the pops manual. IVSK instruction will tell you the key,
access control bits, and fetch protection bit of a page.
- Original Message -
From: "Paul Schuster" <[EMAIL PROTECTED]>
Newsgroups: bit.listserv.ibm-main
To:
Sent: Tuesday, July 24, 2007 1:32 AM
Subject: Is a pag
> -Original Message-
> From: IBM Mainframe Discussion List On Behalf Of (IBM Mainframe
Discussion List)
>
> In a message dated 7/23/2007 2:31:04 P.M. Central Daylight
> Time, [EMAIL PROTECTED] writes:
> >H. ISTR that IBM has a DFSMS lab in sunny Tucson,
> Arizona..
>
> D
Minor chide: It is too bad that folks take their valuable time on ibm-main
to point out deficiencies in the documentation (pointing out is a good
thing) but then do not submit requests to get them updated. The reason we
in IBM follow and participate in ibm-main is not for the purpose of seeing
what
Nagesh wrote:
Hi Mark,
Try these IBM Redbooks :
http://www.redbooks.ibm.com/abstracts/sg247318.html?Open
http://www.redbooks.ibm.com/redpieces/abstracts/sg247434.html?Open
Regards,
Nags.
Those books are for the IBM Encryption Facility not for base ICSF but
thanks anyway.
--
Mark Jacobs
Paul,
You are in the right way. I think this is the same technique used in NUCLEUS
by CSECT IEAVEVAL but with a FRR instead.
Regards,
Philippe Leite
z/OS Systems Programmer
Portugal
On Tue, 24 Jul 2007 01:32:43 -0500, Paul Schuster
<[EMAIL PROTECTED]> wrote:
>Hello: I have a need to determin
Gerhard Postpischil wrote:
J R wrote:
Yes, ABSTR is limited to 64KiB-1.
ITYM 64Ki-1.
You may think that, but he doesn't. K and Ki are prefixes, meaningless
without a unit to modify. Kilo is the rare exception in Europe, where
it's used as an abbreviation of Kilogram as a unit of mass and
I have posted this on the COBOL.LANG newsgroup, but thought I would as here
as well.
I ran into a problem where a programmer stated that the PERFORM THRU EXIT
was not functioning for one of many. I felt it was a missing IF END-IF
combo. Other than doing an exclude all and the manually paring up
Mark,
Try "IP VERBX LEDATA 'CEEDUMP'". This will give you the same info as a
CEEDUMP, including call linkage . If your main module is not LE complient you
may need to add TCB(tcbaddr), or CAA() or DSA() , to give it a clue where to
start. LEDATA is a very powerfull command with lots o
Hi,
Stirring the pot some more
Maybe if you used the CALL...RETURNING syntax :
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/igy3pg32/4.2.4.3?SHELF=&DT=20061117131343
?
Or, write your COBOL function as OO COBOL function. Then, you have a
whole object to give and take than jus
>This thread still begs the issue of benchmarking a representative
>business application across multilple platforms.
It may beg the issue, but the answer isn't (solely, or even much) a
"benchmark." Running a single payroll application (for example) doesn't cut
it either. These systems are built to
101 - 129 of 129 matches
Mail list logo