Hi,
We currently send physical 3480's to an external customer.
The customer has asked if we could send them the tapes as AWStape files.
They are evaluating a product called VTA (Virtual Tape Appliance) from a
company called Universal Software.
I've looked at CBT file 533, but I'm not
On 2/24/08, R.S. [EMAIL PROTECTED] wrote:
Disclaimer: maybe it's boring, but at least it is on-topic. Apologize
for pedantry.
I just thought about 256 bytes as PDS directory block size.
It was commented as wrong value.
However the same value is mentioned in IBM documentation. OK,
analyzing log provide a autodiscover Setup a metmeeting no more
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at
Hi
In the WebShpere developer for system Z, there is a number samples
for SYSLOG JOBLOG CTRACE etc (ascii text files) , and defined adapters
to import this log's.
Till no the imported log's and traces are not very nice in the log
viewer
Miklos Szigetvari wrote:
Hi
If someone has
Hallo All,
Can I use the following wild card attribute in a SMS FILTLIST:
AM2.DE%*.HESD.SOR%*.**
In the case of DE%* I would like to trap any numeric value (0 to 9) which
follose DE.
In the case if SOR%* I would like again to trap any numeric (0 to 9) after
SOR.
Has anyone ever encountered use of (or indeed had cause to use) the ACBUSER
field in a VSAM ACB?
Just curious.
Mike Kerford-Byrnes
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.5.516 / Virus Database: 269.21.0/1296 - Release Date: 24/02/2008
12:19
In a message dated 2/25/2008 1:52:25 A.M. Central Standard Time,
[EMAIL PROTECTED] writes:
No. First - when you calculate number of blocks, you have to take into
consideration many physical aspects of data storing, like Count field,
gaps, data cell size, data cell existence, track size,
On Fri, 22 Feb 2008 10:34:52 -0500, Joseph H Winterton [EMAIL PROTECTED]
wrote:
...
IBM did not publish new customization and configuration information for
V550 due to the small amount of change from V520 to V550 in this area. Doc
is available at this link:
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Shmuel Metz (Seymour
J.)
In [EMAIL PROTECTED], on 02/23/2008
at 10:07 AM, Walt Farrell said:
One could argue that letting you determine your access to resources
without actually trying to use them (and thus
Mark Post wrote:
On Tue, Feb 19, 2008 at 8:37 AM, in message
[EMAIL PROTECTED], Paul Gilmartin
[EMAIL PROTECTED] wrote:
-snip-
Now I'm confused. I've seen flat denials among these lists from IBM
employees that IBM's HTTPD is Apache-derived. But which HTTPD? So:
o How many HTTP servers
When in doubt, set up a test case try it. Naviquest is a great tool.
From the DFSMSdss Storage Admin Guide:
The percent sing (%) is used as an ignore character. Each % sign
represents one character in the name being filtered, and any character in
that position is ignored.
IIRC, % * are the
On Mon, 25 Feb 2008 11:41:56 - Mike Kerford-Byrnes [EMAIL PROTECTED]
wrote:
:Has anyone ever encountered use of (or indeed had cause to use) the ACBUSER
:field in a VSAM ACB?
Isn't that a VTAM field?
--
Binyamin Dissen [EMAIL PROTECTED]
http://www.dissensoftware.com
Director, Dissen
Thanks Darth,
I looked at the list that needs to be added and it amounts to 731. Which
means I will have to create a few more FILTLISTS.
Darth Keller [EMAIL PROTECTED] wrote:
When in doubt, set up a test case try it. Naviquest is a great tool.
From the DFSMSdss Storage Admin Guide:
Hello!
The job below gets an IEW2456E error (and RC=8) because
the PROG222 program contains EXTRN XX which is not available.
The XX module is sometimes needed, but not in this case.
It would be better if PROG222 defined XX with WXTRN instead of EXTRN,
but this is not an option
Gilbert Saint-Flour wrote:
Hello!
The job below gets an IEW2456E error (and RC=8) because
the PROG222 program contains EXTRN XX which is not available.
The XX module is sometimes needed, but not in this case.
It would be better if PROG222 defined XX with WXTRN instead of
John,
FILTLST NUMA INCLUDE(%%1,%%2,%%3,%%4,%%5,%%6,%%7,%%8,%%9)
FILTLST NUMB INCLUDE(%%%1,%%%2,%%%3,%%%4,%%%5,%%%6,%%%7,%%%8,%%%9)
IF DSN EQ AM2.DE%.HESD.SOR%.** DSN(2) EQ NUMA
DSN(4) EQ NUMB THEN DO
END
This is assuming that there is only one numeric character following the
Very elegant! I like it.
ddk
FILTLST NUMA INCLUDE(%%1,%%2,%%3,%%4,%%5,%%6,%%7,%%8,%%9)
FILTLST NUMB INCLUDE(%%%1,%%%2,%%%3,%%%4,%%%5,%%%6,%%%7,%%%8,%%%9)
IF DSN EQ AM2.DE%.HESD.SOR%.** DSN(2) EQ NUMA
DSN(4) EQ NUMB THEN DO
END
The following message is a courtesy copy of an article
that has been posted to bit.listserv.ibm-main,alt.folklore.computers as well.
Anne Lynn Wheeler [EMAIL PROTECTED] writes:
vulnerability database ... and having difficulty categorizing exploits
... and lobbying the CVE interests to improve
Darth Keller [EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]
.com...
When in doubt, set up a test case try it. Naviquest is a great
tool.
From the DFSMSdss Storage Admin Guide:
The percent sing (%) is used as an ignore character. Each % sign
represents one character in the
One could argue that letting you determine your access to resources
without actually trying to use them (and thus without causing audit
records) is a form of hacking.
Perhaps, but some IBM code does exactly that, and for what seems to be
good cause. I don't recall the details, but it was
Darth Keller [EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]
.com...
From the DFSMSdss Storage Admin Guide:
The percent sing (%) is used as an ignore character. Each % sign
represents one character in the name being filtered, and any character
in
that position is ignored.
IIRC,
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Randy Evans
One could argue that letting you determine your access to
resources
without actually trying to use them (and thus without causing audit
records) is a form of hacking.
Perhaps, but some IBM code
On 24 Feb 2008 11:37:54 -0800, [EMAIL PROTECTED] (Gerhard Adam)
wrote:
I agree, however I'm surprised that no one has mentioned the obvious point
that needs to be considered. Chargeback shouldn't be based on usage, but
rather on the capacity that has been reserved for the anticipated load.
I can't find anything about a as masking character.
I should have spelled it out. It should have been % and *.
sorry -
ddk
**
This e-mail message and all attachments transmitted with it may contain legally
XMITIP version 08.02 is now available at http://www.lbdsoftware.com
The updates for this release include:
V08.02 - 02/20/08
- exec updates
TXT2HTML- Minor update for message qualifier and set
default setting for JavaScript to No
TXT2RTF - Remove extraneous
To execute sftp on z/OS using USS, you will need to install IBM Ported Tools.
This is a no cost feature available on the IBM website
http://www-03.ibm.com/servers/eserver/zseries/zos/unix/port_tools.html
The ssh daemon has to be running.
I have recently set this up at our shop. sftp itself
We have over 30 LPARs in the same physical location. Some are running
EST, 4 are running CST and 1 is running JST (Japan time). Our
management made the decision that all times in the change records will
be EST. So, if a change is scheduled for 3:00 am EST and is supposed to
happen on a CST
SYSTEM C is z/OS 1.7 and ACF2 1.9
SYSTEM F is z/OS 1.7 and RACF.
I can NJE work from SYSTEM F to SYSTEM C with a USERID/PASSWORD that is
known to each and it works as desired.
But when I attempt to NJE work from SYSTEM C to SYSTEM F using the same
USERID/PASSWORD the JOB fails
ICH408I
James Chappell wrote:
SYSTEM C is z/OS 1.7 and ACF2 1.9
SYSTEM F is z/OS 1.7 and RACF.
I can NJE work from SYSTEM F to SYSTEM C with a USERID/PASSWORD that is
known to each and it works as desired.
But when I attempt to NJE work from SYSTEM C to SYSTEM F using the same
USERID/PASSWORD
On Mon, 25 Feb 2008 09:41:26 -0600, Betsy Jeffery wrote:
recognize MVS data set structures. You can use sftp in batch but you need
extra steps. First you copy the data, the commands, then execute the
transfer with those 2 files. Here is an example of going from z/OS to Unix:
Lots of comments
Jim,
Are you saying that the job sent from system C (ACF2) contains USER= and
PASSWORD= in the jobcard, followed by a
/*XEQ SYSF card (or whatever your System F is named)?
The SUBMITTER() in the ICH408I message leads me to believe that
either JES2/NJE or ACF2 do not pass the userID and
Dear MVS Team
main: RACF
sub: password verification
Hi - i am looking for a callable service to verify a new password
against the currntly given RACF-roules without a valid userid. My
company would change the administation of users. They take a lot of $
to administrate users of their system.
Betsy ,
You don't need to run the sshd daemon to use the sftp client from z/OS.
Also, even though OpenSSH is open source, it is licensed under a BSD
license.
IBM is free to modify it as they wish (which they have) and not redistribute
their patches.
Kirk Wolf
On Mon, Feb 25, 2008 at 9:41 AM,
On Sun, 24 Feb 2008 14:23:31 -0500, Peter Relson wrote:
Of course, an LLA REFRESH (or UPDATE) is also needed to find the new
member. This could be very useful when a product data set in the linklist
goes
into another extent, especially if it is a product that can be stopped and
restarted. or
On Mon, 25 Feb 2008 07:09:15 -0700, Steve Comstock wrote:
I would try
LIBRARY (XX)
my understanding this format of LIBRARY identifies
external references that might not be resolvable
and it's OK if they are not resolved.
Might return RC of 4, though; not sure. Let me
know if it works
Andreas,
RACF itself has practically all the functionality built-in that you are
looking for.
If I remember correctly,
- RACF Configuration options allow the retention of (x) previous passwords
within the RACF database.
- password syntax options (length, valid characters, repeat strings, etc.)
-
Edward Jaffe wrote:
Rick Fochtman wrote:
I can't say for sure what compression algorithm I'll use in the
updated ARCHIVER; overall performance and some of the technical
details will still need exploration but I've got some starting points
now.
Remember that there are high-performance,
--snip--
Has anyone ever encountered use of (or indeed had cause to use) the ACBUSER
field in a VSAM ACB?
Just curious.
--unsnip-
I've used it, in the distant past, to point to a VTAM terminal message
queue.
thought I'd also post here...never know
- Forwarded by Ron Wells/AGFS/AGFin on 02/25/2008 12:16 PM -
Ron Wells/AGFS/AGFin
02/25/2008 09:56 AM
To
CICS List [EMAIL PROTECTED]
cc
Subject
DFH-Logic error-z/OS1.9-TS2.3
sorry---wrong subject line entered..
- Forwarded by Ron
Can someone point me to Listserv for Z/VM and Linux?
I'm trying to set up DDR for Disaster Recovery purposes. I think I've got the
required commands but haven't a clue how to run backups on a scheduled basis.
Regards,
Dave O'Brien
Gilbert Saint-Flour wrote:
Hello!
The job below gets an IEW2456E error (and RC=8) because
the PROG222 program contains EXTRN XX which is not available.
The XX module is sometimes needed, but not in this case.
It would be better if PROG222 defined XX with WXTRN instead of
âãé áï àáé wrote:
Hi,
We currently send physical 3480's to an external customer.
The customer has asked if we could send them the tapes as AWStape files.
They are evaluating a product called VTA (Virtual Tape Appliance) from a
company called Universal Software.
I've looked at CBT file
On 25/02/2008, Gilbert Saint-Flour [EMAIL PROTECTED] wrote:
The job below gets an IEW2456E error (and RC=8) because
the PROG222 program contains EXTRN XX which is not available.
The XX module is sometimes needed, but not in this case.
It would be better if PROG222 defined XX
--snip---
Following extracted from the CICS/TS RACF Security Guide:
2.7.6.2 Checking which transactions to offer a user
You can use the QUERY SECURITY command to check whether a user is
authorized to use a particular transaction before
As do I
Jim McAlpine [EMAIL PROTECTED] 2/25/2008 4:08 AM
Sorry, the pedantry remark wasn't aimed at you. BTW I agree with you that
256 bytes is the correct value.
Jim McAlpine
Note that my email domain has changed from jo-annstores.com to joann.com.
Please update your address book and
[EMAIL PROTECTED] and [EMAIL PROTECTED]
Larry Brown
O'Brien, David W. (NIH/CIT) [C] [EMAIL PROTECTED]
Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
02/25/2008 12:17 PM
Please respond to
IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
To
IBM-MAIN@BAMA.UA.EDU
cc
Subject
Thanks Larry
From: Larry J Brown [mailto:[EMAIL PROTECTED]
Sent: Mon 2/25/2008 1:35 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Z/os shop starting to deal with Z/vm
[EMAIL PROTECTED] and [EMAIL PROTECTED]
Larry Brown
O'Brien, David W. (NIH/CIT) [C] [EMAIL
No problem David. I would give you some tips (you'll probably need to use
WAKEUP/VMUTIL if you don't have VMSCHEDULE or something like that, PROP
could handle too), but I'm sure you'll get better ones from others on the
IBMVM list.
Larry Brown
O'Brien, David W. (NIH/CIT) [C] [EMAIL
On Sat, 23 Feb 2008 10:07:24 -0600, Walt Farrell wrote:
One could argue that letting you determine your access to resources without
actually trying to use them (and thus without causing audit records) is a
form of hacking. You're looking around trying to figure out what you can
do, rather than
In the past, we had a popular non IBM disk backup utility. It would
dump VM volumes under MVS so you can use your existing tape vaulting
process. If you have to do a stand alone restore, it really doesn't
matter if you boot the vm backup program or FDR's... Oops
Hey all,
I recall seeing something that gives the maintenance or PTF level of several
DB2 modules. I cannot remember if it was a command, SQL or a stored
procedure but I cannot find it right now. This is for z/OS DB2 V8.
Paul Peplinski
On Mon, Feb 25, 2008 at 2:08 PM, Dave Kopischke
[EMAIL PROTECTED] wrote:
On Sat, 23 Feb 2008 10:07:24 -0600, Walt Farrell wrote:
One could argue that letting you determine your access to resources without
actually trying to use them (and thus without causing audit records) is a
form of
Gilbert Saint-Flour wrote:
Hello!
The job below gets an IEW2456E error (and RC=8) because
the PROG222 program contains EXTRN XX which is not available.
The XX module is sometimes needed, but not in this case.
It would be better if PROG222 defined XX with WXTRN instead of
Len, Thanks very much. You may have made my life much easier.
From: Rugen, Len [mailto:[EMAIL PROTECTED]
Sent: Mon 2/25/2008 2:26 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Z/os shop starting to deal with Z/vm
In the past, we had a popular non IBM disk backup
http://listserv.uark.edu/scripts/wa.exe?A0=ibmvm
After you get on that list ([EMAIL PROTECTED]), then you can get more
information about the standard VMUTIL service machine that is used for
initiating system timer events.
/Tom Kern
/301-903-2211 (Office)
/301-905-6427 (Mobile)
On Mon, 25 Feb
All,
Has anybody run into an issue with the portmap started task
running in a default service class rather than sysstc like tcpip? We use
STK (SUN) HSC and libstation and have had some odd things happening with
our Veritas system. We have found that there will be a number (20-30)
You mean
//DB2UTIL EXEC PGM=DSNUTILB,PARM='DB7G,REPAIR'
//STEPLIB DD DSN=DSN710.SDSNEXIT,DISP=SHR
// DD DSN=DSN710.SDSNLOAD,DISP=SHR
//SYSPRINT DD SYSOUT=*
//UTPRINT DD SYSOUT=*
//SYSIN DD *
DIAGNOSE DISPLAY MEPL
Mike
On Mon, Feb 25, 2008 at 1:28 PM, Paul Peplinski [EMAIL
If I run a job with the following two IDCAMS commands, the second
command, DEF ALIAS, fails with
IDC3013I DUPLICATE DATA SET NAME
IMPORT CONNECT -
OBJECTS (( -
TSSTV.ICF.VBV0001 -
VOL(BV1075) DEVT(3390) -
)) CAT(CATALOG.ICF.VI24CAT.MCAT)
DEF ALIAS(NAME(TSSTV)
On Mon, 25 Feb 2008 14:22:51 +0100, Ulrich Boche [EMAIL PROTECTED] wrote:
And, of course, WAS is not only J2EE, that's only the business logic
part of WAS. For the presentation logic portion of WAS you'll need a web
server (if you want to run it on z/OS, for that matter).
You seem to be
I also run libstation. We have hangs from the Veritas side. We have to
stop/start Libstation to get things flowing again. It is a problem that we
have never been able to resolve. At this time we are running an old
release of HSC/Libstation but we have had this problem in more than one
release.
On Mon, 25 Feb 2008 13:42:48 -0600, Leitner, Timothy
[EMAIL PROTECTED] wrote:
All,
Has anybody run into an issue with the portmap started task
running in a default service class rather than sysstc like tcpip? We use
STK (SUN) HSC and libstation and have had some odd things happening with
I coulda swore that I saw a thread about printing or handling PDFs on one of
these lists, but I can't find it now. But someone may find this use of
Kirk's baby interesting and useful.
ZPDFSEND - An application that converts a z/OS FCFC print file to a PDF file
and emails the PDF file
When you reverse them, does the USERCAT entry for VBV0001 get created in
MCAT as directed or in VTSTH01 per the already defined alias?
In the first case, you are trying to create an alias in a catalog when
there is already a real entry with the same hlq in the catalog.
In the second, you are
-Original Message-
From: IBM Mainframe Discussion List
[mailto:[EMAIL PROTECTED] On Behalf Of Leitner, Timothy
Sent: Monday, February 25, 2008 1:43 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Portmap start task
All,
Has anybody run into an issue with the portmap started task
-Original Message-
From: IBM Mainframe Discussion List
[mailto:[EMAIL PROTECTED] On Behalf Of Schwarz, Barry A
Sent: Monday, February 25, 2008 2:23 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Interesting, to me, observation.
When you reverse them, does the USERCAT entry for
It is the standard Portmap. The only thing we had to do was to start
PORTMAP in TCP.
Pat Mihalec
Rush University Medical Center
Senior System Programmer
(312) 942-8386
[EMAIL PROTECTED]
McKown, John [EMAIL PROTECTED]
Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
02/25/2008
-snip--
RACF itself has practically all the functionality built-in that you are
looking for.
If I remember correctly,
- RACF Configuration options allow the retention of (x) previous passwords
within the RACF database.
- password syntax options (length,
On Mon, 25 Feb 2008 13:43:01 -0600, Mike Bell [EMAIL PROTECTED] wrote:
You mean
//DB2UTIL EXEC PGM=DSNUTILB,PARM='DB7G,REPAIR'
//STEPLIB DD DSN=DSN710.SDSNEXIT,DISP=SHR
// DD DSN=DSN710.SDSNLOAD,DISP=SHR
//SYSPRINT DD SYSOUT=*
//UTPRINT DD SYSOUT=*
//SYSIN DD *
DIAGNOSE
I'm sorry but I can't resist. You might be a redneck if you call your service
names bubba!
--- [EMAIL PROTECTED] wrote:
From: McKown, John [EMAIL PROTECTED]
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Portmap start task
Date: Mon, 25 Feb 2008 14:27:05 -0600
-Original
Portmap runs in class stclo - discretionary. I just changed it to stcmd
- imp 3 vel 30.
Will see if that makes a difference.
Tim Leitner
OSF Healthcare System
Manager, Technical Services
309-683-7452
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED]
We have been running it at stcmed, but still have the problem of Vertias
loosing the connection sometimes. The resolution is to stop/start
Libstation and Veritas is able to connect again.
Pat Mihalec
Rush University Medical Center
Senior System Programmer
(312) 942-8386
[EMAIL PROTECTED]
-Original Message-
From: IBM Mainframe Discussion List
[mailto:[EMAIL PROTECTED] On Behalf Of Richard Pinion
Sent: Monday, February 25, 2008 2:32 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Portmap start task
I'm sorry but I can't resist. You might be a redneck if you
call your
I have this happen quite frequently. The reason is that the HLQ(s) already
exist in the master catalog, so having an ALIAS pointing them to another
catalog would cause the existing entries to become non-existent. I view
this as a failsafe by VSAM catalog management.
On Mon, 25 Feb 2008 14:30:28
Pat,
What's weird is that we have a NonStop (Tandem) and a Siemens
PACS system that get their mounts through libstation even when Veritas
does not.
Tim Leitner
OSF Healthcare System
Manager, Technical Services
309-683-7452
-Original Message-
From: IBM Mainframe Discussion
I don't think the problem is in Libstation. I think it is a Veritas
problem, but we could never get our Unix/Veritas team to bother looking
for the problem. The answer has been that it must be a mainframe problem.
It does not occur on a regular basis. Only once in 3 to 4 months. We do
not
Our veritas support guys must be related to your veritas support guys.
Your comment fits them to a T.
but we could never get our Unix/Veritas team to bother looking
for the problem
Thanks for your input.
Tim Leitner
OSF Healthcare System
Manager, Technical Services
309-683-7452
One major difference. In CICS, the query security is for a subset of RACF
information, and is already running in the proper environment, ie CICS, and
is using the logged on userid's ACEE. You cannot issue a query security to
see if another user has the authority, and you also cannot check for
there is also an IPCS command that will find the equivalent information in a
dump or even on live DB2 subsystem.
Mike
On Mon, Feb 25, 2008 at 2:55 PM, Paul Peplinski [EMAIL PROTECTED]
wrote:
On Mon, 25 Feb 2008 13:43:01 -0600, Mike Bell [EMAIL PROTECTED] wrote:
You mean
//DB2UTIL EXEC
On Mon, 25 Feb 2008 10:58:55 +0200, G+D+J+ B+N% #B+J+ wrote:
We currently send physical 3480's to an external customer.
The customer has asked if we could send them the tapes as AWStape files.
They are evaluating a product called VTA (Virtual Tape Appliance) from a
company called Universal
Don't know too much about portmap but it seems like a candidate for SYSSTC.
Have you encountered problems that make you reluctant to put it there.
Check the link. IBM's sample policy has it defined there.
On Mon, 25 Feb 2008 07:00:14 -0600, Patrick O'Keefe
[EMAIL PROTECTED] wrote:
...
On the good side, there are Omegamon project managers attending
SHARE that are aware of this thread and are interested in getting
specific information. Any significant results coming from their interest
will be a
Can I bump this since I'm having the same problem going from 1.7 to
1.9. We just have SUBSYSTEM consoles. What a pain. I don't see an
answer to the questionhelp please.
--
For IBM-MAIN subscribe / signoff / archive
Dear all and Mike Wood
We get EDG6502W and EDG6521W message when we run the MEND function on merged
RMM CDS. The message is shown blow:
STARTING VERIFICATION OF OWNERRECORDS
EDG6502W OWNER ENTRY ALSU001 POINTED TO BY VOLUME ENTRY Q05188 DOES NOT EXIST
EDG6502W OWNER ENTRY ALSU001
On Mon, 25 Feb 2008 20:09:38 -0600, Marty French [EMAIL PROTECTED] wrote:
Can I bump this since I'm having the same problem going from 1.7 to
1.9. We just have SUBSYSTEM consoles. What a pain. I don't see an
answer to the questionhelp please.
The question was answered. Check the CBT
Good (late) evening to everyone in the U.S. It's early afternoon on Tuesday
here in Japan. If you read Japanese (or use an online translator), then you
can get a headstart on the big news here:
http://www.ibm.com/jp/press/2008/02/2601.html
For those of you who prefer English, please watch here:
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Wayne Driscoll
One major difference. In CICS, the query security is for a
subset of RACF information, and is already running in the
proper environment, ie CICS, and is using the logged on
userid's ACEE. You
On Mon, 25 Feb 2008 13:08:53 -0600, Dave Kopischke wrote:
We have a JCL checker application that verifies dataset access for a JOB.
Through routine use of this product, we end up with thousands of access
warnings on our daily RACF reports. This is not a hacking attempt. If there
were hacking
On Tue, 19 Feb 2008 10:10:38 -0600, Mark Zelden wrote:
Update us when you get some feedback from IBM.
APAR IO08492. I've updated the PMR to suggest additions
to the Problem Description.
-- gil
--
For IBM-MAIN subscribe /
88 matches
Mail list logo