Luxury situation.

2010-10-15 Thread Vernooij, CP - SPLXM
Dear list, This Friday it is time for some good news and extraordinary displays. Via some complex construction 16GB of memory dropped from the skies onto our laps and we had the choice to put it on the shelf or build it into one of our systems. We did the last and I saw, what I had never

Re: The meaning of SCIDS

2010-10-15 Thread Peter Relson
I had heard long ago something like: Sociality and Conviviality Informal Discussion Session Peter Relson z/OS Core Technology Design -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to

Re: STIMER(M) EXIT= question

2010-10-15 Thread Peter Relson
If a system routine does not wish to be interrupted by an IRB it can take a lock or ENQ SMC or STATUS SET,MC,PROCESS Or even just set TCBNOIRB.within TCBFLGS8 Peter Relson z/OS Core Technology Design -- For IBM-MAIN subscribe

Re: Mainframe hacking?

2010-10-15 Thread Lindy Mayfield
I think that there is another bit of wisdom there. First, I don't think mainframe hacking would be very profitable. In my opinion information would be the most valuable, and an inside job would be easiest. Give someone, perhaps disgruntled, a large sum of money and the information might be

Re: Luxury situation.

2010-10-15 Thread Chase, John
-Original Message- From: IBM Mainframe Discussion List On Behalf Of Vernooij, CP - SPLXM Dear list, This Friday it is time for some good news and extraordinary displays. Ours used to look like that, until z/OS 1.11. Now they're at around 3% (all 16 of them). -jc-

Re: FW: The meaning of SCIDS.

2010-10-15 Thread Jim Marshall
The meaning of SCIDS - Ah yes, going back a bunch of years when the Air Force and Marines were heavily represented. I always heard it as Society to Ceep Inebriated Drunks of the Streets (which it most certainly did). Imagine a Grand Ballroom with 4-5K folks and about 50-60% SYSPROGs and a

Re: STIMER(M) EXIT= question

2010-10-15 Thread McKown, John
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Peter Relson Sent: Friday, October 15, 2010 6:30 AM To: IBM-MAIN@bama.ua.edu Subject: Re: STIMER(M) EXIT= question If a system routine does not wish to be interrupted by an IRB it

Re: Mainframe hacking?

2010-10-15 Thread Bill Fairchild
I don't think we can call it hacking if IBM uses such techniques to implement simulators, emulators, virtualization, etc. But other vendors' using the same techniques in order to make it easier for their products to achieve authorization is a different matter, IMHO. Bill Fairchild Rocket

Re: Mainframe hacking?

2010-10-15 Thread Bill Fairchild
IEBCOPY was developed in the early- to mid-1960s, when EXCP appendages were the leading edge way to do cruel and unusual things in low-level I/O. Such has not been the case since the advent of MVS/XA and a redesigned IOS in 1983. New, or older and still strategic, products typically use the

Re: When will MVS be able to use cheap dasd

2010-10-15 Thread Miklos Szigetvari
Hi Sorry, you are right it is Bus-Tech (We are contact over mainstorconcept) On 10/14/2010 10:10 PM, Pratt Parrish wrote: Bus-Tech has a zDASD product as you have described. I am not aware that StorageTek has such a product. Based on my web searches and searching the Oracle (STK)

Re: Mainframe hacking?

2010-10-15 Thread Ray Overby
Barry, What do you think of contacting Lindy off list to see if we can't get into contact with heavily customized systems with lots of system exits. KRI could help them with their technical expertise... Ray On 10/15/2010 06:46 AM, Lindy Mayfield wrote: I think that there is another

Re: Mainframe hacking?

2010-10-15 Thread Steve Comstock
On 10/15/2010 5:46 AM, Lindy Mayfield wrote: I think that there is another bit of wisdom there. First, I don't think mainframe hacking would be very profitable. In my opinion information would be the most valuable, and an inside job would be easiest. Give someone, perhaps disgruntled, a

Re: Mainframe hacking?

2010-10-15 Thread Ray Overby
My apologies to this the list. I did not mean for this email to be sent there.. On 10/15/2010 07:42 AM, Ray Overby wrote: Barry, What do you think of contacting Lindy off list to see if we can't get into contact with heavily customized systems with lots of system exits. KRI could help

Re: Mainframe hacking?

2010-10-15 Thread Shane
Really ? Would never have guessed. Been there, done that. Shane ... On Fri, 15 Oct 2010 08:05:39 -0500 Ray Overby wrote: My apologies to this the list. I did not mean for this email to be sent there.. -- For

Re: Mainframe hacking?

2010-10-15 Thread Elardus Engelbrecht
Ray Overby wrote: My apologies to this the list. I did not mean for this email to be sent there.. Apology accepted of course. For three and half nanoseconds, it seemed you want to 'hack' into this very discussion list... ;-D ;-D ;-D Groete / Greetings Elardus Engelbrecht

Re: Mainframe hacking?

2010-10-15 Thread Lindy Mayfield
I say heavily customized but that's only a few of my customers. Just about every mainframe shop I've seen, especially those that have been around a while, have enough customization, exits, etc. to be in trouble soon. And, honestly, who will they call? Serious question. Who, consulting

Long Parameters, Symbolic Replacement and Control Cards

2010-10-15 Thread Clement Clarke
A number of people in this newsgroup have wanted long parameters and symbolic parameter replacement in card image control cards. The following programs are now available that will allow the above to happen, using conventional JCL or TSO. 1. EXECLONG will execute a program with up to 3,000

Re: Mainframe hacking?

2010-10-15 Thread Steve Comstock
On 10/15/2010 7:20 AM, Lindy Mayfield wrote: I say heavily customized but that's only a few of my customers. Just about every mainframe shop I've seen, especially those that have been around a while, have enough customization, exits, etc. to be in trouble soon. And, honestly, who will they

Re: Mainframe hacking?

2010-10-15 Thread McKown, John
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Lindy Mayfield Sent: Friday, October 15, 2010 8:20 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Mainframe hacking? I say heavily customized but that's only a few of my customers. Just

Re: Mainframe hacking?

2010-10-15 Thread Ray Overby
Rick brings up a good point: /But as these types of problems grow, I'm sure that IBM and REPUTABLE vendors are working to close any holes that might exist./ As I see it there are two parts to this. Vendor testing prior to shipping code and Vendor response when problems are reported in the

Converting SAS C to IBM C

2010-10-15 Thread Clark Kidd
I apologize in advance if... 1) This has already been discussed (I did not find it in the archives) 2) This is not the proper forum for this question (but IBM-Main is always a good place to start) We have a number of C programs that need to be converted from SAS to IBM. The reason

Re: Converting SAS C to IBM C

2010-10-15 Thread Shane
Sounds like an invitation for Dave Rivers to pipe up ... ;-) Shane ... On Fri, 15 Oct 2010 10:05:26 -0400 Clark Kidd wrote: We have a number of C programs that need to be converted from SAS to IBM. The reason for this is because SAS has decided to drop support for their C/C++ compiler, so

Re: Converting SAS C to IBM C

2010-10-15 Thread Harry Wahl
Clark: Have you looked at Dignus (http://www.dignus.com/) ? It really makes things much easier. Harry P.S. I use Dignus for my mainframe C/C++ work, but have no affiliation with them. Date: Fri, 15 Oct 2010 10:05:26 -0400 From: clark.k...@asg.com Subject: Converting SAS C to IBM C

APF (was: Mainframe hacking?)

2010-10-15 Thread Paul Gilmartin
On Thu, 14 Oct 2010 19:54:44 -0500, John McKown wrote: The SPFCOPY that I remember simply used a magic SVC to set the APF on before calling IEBCOPY and back off afterwards. I've heard of this. And that the magic SVC did extensive checkinf of control blocks to verify that it was properly called

Re: The meaning of SCIDS.

2010-10-15 Thread David Alcock
Howard Dean probably had a funny button that defined the meaning of SCIDS. -- This is not an exit from SCIDS. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the

Re: Converting SAS C to IBM C

2010-10-15 Thread Miklos Szigetvari
On 10/15/2010 4:05 PM, Clark Kidd wrote: I apologize in advance if... 1) This has already been discussed (I did not find it in the archives) 2) This is not the proper forum for this question (but IBM-Main is always a good place to start) We have a number of C programs that need

Re: The meaning of SCIDS.

2010-10-15 Thread Brian France
I have one of those paper signs taken from my first ever Share conf in New York City back in the late 80's hanging on my door... On 10/15/2010 10:34 AM, David Alcock wrote: Howard Dean probably had a funny button that defined the meaning of SCIDS. -- This is not an exit from SCIDS.

Re: The meaning of SCIDS.

2010-10-15 Thread John P Kalinich
The button man has this one... http://www.mxg.com/thebuttonman/buttons/button792.jpg From: David Alcock mainframed...@sbcglobal.net

info

2010-10-15 Thread Jon Fouts
Q IBM-MAIN Jon Fouts Systems Engineer 515-557-7779 This message may contain confidential and/or privileged information. If you are not the addressee or authorized to receive this for the addressee, you must not use, copy, disclose, or take any action based on this message or any information

Re: S013-64-IEBGENER

2010-10-15 Thread Mike Schwab
On Fri, Oct 15, 2010 at 10:46 AM, Larry Macioce mace1...@gmail.com wrote: [deleted], but my question is why are you defining a dummy dataset? Why not use a br14 or like(if you have another exact dataset) ? Mace It actually opens and closes the dataset, forceing a complete definition of the

Re: Mainframe hacking?

2010-10-15 Thread David Cole
At 10/14/2010 07:54 PM, Rick Fochtman wrote: snip For example, why do IDCAMS and IEBCOPY have to be authorized? The IEBCOPY replacement doesn't have to be authorized. Would it be worthwhile for both vendors and users to see

Re: S013-64-IEBGENER

2010-10-15 Thread McKown, John
-Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Mike Schwab Sent: Friday, October 15, 2010 10:59 AM To: IBM-MAIN@bama.ua.edu Subject: Re: S013-64-IEBGENER On Fri, Oct 15, 2010 at 10:46 AM, Larry Macioce mace1...@gmail.com wrote:

Re: Mainframe hacking?

2010-10-15 Thread Chris Craddock
On Fri, Oct 15, 2010 at 10:43 AM, Ricc Harding ricc.hard...@gmail.comwrote: SPFCopy's magic SVC went thru several iterations to make it secure too. It was one of those SVC's that was written to be serially secure but in a multi-tasking environment when two or more tasks could be set up

Re: S013-64-IEBGENER

2010-10-15 Thread Ron Wells
Mace Something has been inplace since...before I was here.. Having them change to br14 when error occurs..but have many to go through..other alternative is to run on other lpar...since most runs are at night and no one around to alter jcl. From: Larry Macioce mace1...@gmail.com To:

Re: Mainframe hacking?

2010-10-15 Thread Eric Bielefeld
I don't think there is shortages in systems programmers yet. I know the last 4 years, there has been maybe 3 or 4 jobs open in the Milwaukee area, out of I figure about 10 z/OS shops. Each opening had plenty of applicants, as far as I can figure. In 5 to 10 years, that could all change,

Re: Mainframe hacking?

2010-10-15 Thread Steve Comstock
On 10/15/2010 9:28 AM, Paul Gilmartin wrote: On Fri, 15 Oct 2010 07:24:08 -0600, Steve Comstock wrote: On 10/15/2010 7:20 AM, Lindy Mayfield wrote: I say heavily customized but that's only a few of my customers. Just about every mainframe shop I've seen, especially those that have been around

Re: Mainframe hacking?

2010-10-15 Thread John McKown
Each and every time I try to point out new or good points about the z, Iget the same response: It is simply not cost effective! or more simply: It costs too much!. This despite the __documented fact__ that the z does over 80% or the production work at less than 50% of the IT budget. Of course,

Re: S013-64-IEBGENER

2010-10-15 Thread Ron Wells
Paul Did that and no word as yet from ibm. From: Paul Gilmartin paulgboul...@aim.com To: IBM-MAIN@bama.ua.edu Date: 10/15/2010 10:49 AM Subject:Re: S013-64-IEBGENER Sent by:IBM Mainframe Discussion List IBM-MAIN@bama.ua.edu On Fri, 15 Oct 2010 08:24:13 -0500, Ron Wells

Re: Mainframe hacking?

2010-10-15 Thread Tom Marchant
On Fri, 15 Oct 2010 10:28:21 -0500, Paul Gilmartin paulgboul...@aim.com On Fri, 15 Oct 2010 07:24:08 -0600, Steve Comstock wrote: Most management will ignore it until it's too late and then declare it's time to move off the mainframe. But why, when hit by a Windows exploit, don't they likewise

Re: Mainframe hacking?

2010-10-15 Thread Ricc Harding
SPFCopy's magic SVC went thru several iterations to make it secure too. It was one of those SVC's that was written to be serially secure but in a multi-tasking environment when two or more tasks could be set up to run concurrently, then a serially secure task, doing what it did in a secure

Re: Converting SAS C to IBM C

2010-10-15 Thread Paul Gilmartin
On Fri, 15 Oct 2010 10:23:18 -0400, Harry Wahl wrote: Have you looked at Dignus ( http://www.dignus.com/ ) ? It really makes things much easier. P.S. I use Dignus for my mainframe C/C++ work, but have no affiliation with them. Date: Fri, 15 Oct 2010 10:05:26 -0400 From: Clark Kidd We

Re: Mainframe hacking?

2010-10-15 Thread Paul Gilmartin
On Fri, 15 Oct 2010 09:48:01 -0600, Steve Comstock wrote: Don't hate EBCDIC, be amazed at the ability to work with EBCDIC, ASCII, and Unicode all on one system. EBCDIC is easy enough to use. It's just too difficult to avoid. The OS is biased. A fair operating system would let me NFS mount my

Re: S013-64-IEBGENER

2010-10-15 Thread Larry Macioce
Do know why it would fail all the sudden, but my question is why are you defining a dummy dataset? Why not use a br14 or like(if you have another exact dataset) ? Mace -- For IBM-MAIN subscribe / signoff / archive access

Re: S013-64-IEBGENER

2010-10-15 Thread Paul Gilmartin
On Fri, 15 Oct 2010 08:24:13 -0500, Ron Wells wrote: Anyone run across where a IEBGENER fails with a S013-64 //SYSUT1 DD DUMMY, // DISP=SHR,LRECL=4096,RECFM=FB //SYSUT2 DD DSN=XX15.TEST.DATA.SET, // DISP=(NEW,CATLG,DELETE), //UNIT=DASD, //

S013-64-IEBGENER

2010-10-15 Thread Ron Wells
Anyone run across where a IEBGENER fails with a S013-64 //SYSUT1 DD DUMMY, // DISP=SHR,LRECL=4096,RECFM=FB //SYSUT2 DD DSN=XX15.TEST.DATA.SET, // DISP=(NEW,CATLG,DELETE), //UNIT=DASD, //SPACE=(15000,15000) If RECFM changed to F it

Re: Mainframe hacking?

2010-10-15 Thread Paul Gilmartin
On Fri, 15 Oct 2010 07:24:08 -0600, Steve Comstock wrote: On 10/15/2010 7:20 AM, Lindy Mayfield wrote: I say heavily customized but that's only a few of my customers. Just about every mainframe shop I've seen, especially those that have been around a while, have enough customization, exits,

Re: FW: The meaning of SCIDS.

2010-10-15 Thread Barry Merrill
The true facts, verbally to me, from Tom Steele, SHARE Historian, and Mort Bernstein, Founder, in 1980 when I was documenting my collection of SHARE buttons for the SHARE 25th Anniversary Button Show in Atlanta, GA. When SHARE started, there was no fee nor organization, so there was no funding

Re: S013-64-IEBGENER

2010-10-15 Thread Bill Fairchild
Maybe BPAM while doing a FIND or BLDL? E.g., //INPUT DD DSN=MY.PDS(MEMBER),..etc. Just a guess. I never traced it with GTF, so I don't know for sure. Or maybe at the instant of OPEN the DCB access method bits were all zeroes. Or maybe since only SAM is supported the message is simply

Space allocation question...

2010-10-15 Thread Veena, Sridhar
Hi, I am trying to allocate dataset with 6672 cylinders of space across two volumes as a primary extent. I am told that the allocation should look as shown below... //DD1 DD DSN=TEST.DATASET, // DISP=(,KEEP), //

Re: Space allocation question...

2010-10-15 Thread Veilleux, Jon L
Your primary extent cannot span volumes. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Veena, Sridhar Sent: Friday, October 15, 2010 1:23 PM To: IBM-MAIN@bama.ua.edu Subject: Space allocation question... Hi, I am trying to

Re: Space allocation question...

2010-10-15 Thread George Rodriguez
If the dataset is SMS managed, the second volume won't allocate until you fill up the first volume and a second volume is needed. Why is it that you want to allocate the 2 volumes? *George Rodriguez* *Specialist II - IT Solutions* *Application Support / Quality Assurance* *PX - 47652* *(561)

Re: Space allocation question...

2010-10-15 Thread John McKown
Unless the STORCLAS is GUARANTEED SPACE, in which case both volumes are used immediately. John McKown Maranatha! On Oct 15, 2010 12:29 PM, George Rodriguez george.rodrig...@palmbeachschools.org wrote: If the dataset is SMS managed, the second volume won't allocate until you fill up the first

Re: Space allocation question...

2010-10-15 Thread Veilleux, Jon L
To be more precise...I will quote from an online posting: an extent is a contiguous area of disk space. The key word is 'contiguous'. Since an extent must be 'contiguous' you primary extent cannot span volumes. The largest extent you can allocate is equal to the largest free space on a volume.

Re: Mainframe hacking? (IEBCOPY)

2010-10-15 Thread Knutson, Sam
Customers who are need to pay for CA-PDSMAN or SEA PDSFAST just to get acceptable performance when supporting large environments may disagree about IEBCOPY not being broken.     Best Regards,    Sam Knutson, GEICO      System z Team Leader     

Re: Space allocation question...

2010-10-15 Thread George Rodriguez
I stand corrected... *George Rodriguez* *Specialist II - IT Solutions* *Application Support / Quality Assurance* *PX - 47652* *(561) 357-7652 (office)* *(561) 707-3496 (mobile)* *School District of Palm Beach County* *3348 Forest Hill Blvd.* *Room B-332* *West Palm Beach, FL. 33406-5869*

Re: Space allocation question...

2010-10-15 Thread John H Kington
Sridhar, I am trying to allocate dataset with 6672 cylinders of space across two volumes as a primary extent. I am told that the allocation should look as shown below... //DD1 DD DSN=TEST.DATASET, // DISP=(,KEEP), // SPACE=(CYL,(3336,20)), //

Re: Space allocation question...

2010-10-15 Thread Veilleux, Jon L
Yes, however, since he didn't get the amount of space he expected, he is not in a guaranteed space pool. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of George Rodriguez Sent: Friday, October 15, 2010 1:49 PM To: IBM-MAIN@bama.ua.edu

Re: Space allocation question...

2010-10-15 Thread Darth Keller
If the dataset is SMS managed, the second volume won't allocate until you fill up the first volume and a second volume is needed. Why is it that you want to allocate the 2 volumes? As someone stated earlier - a primary allocation can not span 2 volumes (for the most part). However, you can

Re: S013-64-IEBGENER

2010-10-15 Thread Larry Macioce
Just for SGs ran it on my 1.6 system(still havent got 1.9 up), and it worked fine. I think as someone said before PMR time mace -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to

Re: Space allocation question...

2010-10-15 Thread Ron Hawkins
Sridar, This will work if you also use a Guarenteed Space Storage Class. The size of the primary allocation on each volume will depend on how the MB/sec rate has been specified in the Storage Class. It's an old technique that many people used to use for SAS before they got their multi-volume

Re: JES2 Control Block

2010-10-15 Thread Barry Merrill
There is extensive information on NJE jobs in the TYPE 26 JES2 Purge Record, since there is a purge record created every time any job leaves any node for any purpose. While the data may not be left on the SPOOL dataset, you can identify which node and job numbers in these SMF fields:

OT: Change to email address

2010-10-15 Thread John McKown
Note that I'm not using my work email any more. This one is my smartphone. I will use it or my home email. John McKown Maranatha! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to

Re: APF (was: Mainframe hacking?)

2010-10-15 Thread Joel C. Ewing
On 10/15/2010 09:27 AM, Paul Gilmartin wrote: On Thu, 14 Oct 2010 19:54:44 -0500, John McKown wrote: The SPFCOPY that I remember simply used a magic SVC to set the APF on before calling IEBCOPY and back off afterwards. I've heard of this. And that the magic SVC did extensive checkinf of

Looking for Clearquest LISTSERV

2010-10-15 Thread Richard Bargar
I am looking for a LISTSERV for IBM's Clearquest. Does one exist? Subscribe Clearquest doesn't find one for me. Thanks Rick Bargar Clearquest Administration NYSDTF This communication may contain confidential and/or legally privileged information. It is intended only for the individuals named as

Re: Using ADDRESS SDSF in OPS/MVS

2010-10-15 Thread Neil Duffee
I've discarded the original message but didn't it say that isfJesName has to *precede* isfCalls()? Aside from that, I'll add the caveat that I've *never* worked with this. -- signature = 6 lines follows -- Neil Duffee, Joe SysProg, U d'Ottawa, Ottawa, Ont, Canada

Re: Looking for Clearquest LISTSERV

2010-10-15 Thread Ed Finnell
In a message dated 10/15/2010 1:04:42 P.M. Central Daylight Time, richard_bar...@tax.state.ny.us writes: Subscribe Clearquest doesn't find one for me. A list exists, but it's not a LISTSERV list. clearqu...@lists.ca.ibm.com

Re: APF (was: Mainframe hacking?)

2010-10-15 Thread John McKown
ISPF doesn't run APF. It uses the TSO IKJEFTSR function to run properly authorized programs and commands. At least, I think that's how it works. -- John McKown Maranatha! Sent from my Vibrant Android phone. On Oct 15, 2010 1:03 PM, Joel C. Ewing jcew...@acm.org wrote: On 10/15/2010 09:27 AM,

Re: Space allocation question...

2010-10-15 Thread Ron Hawkins
Sridar, A correction to my post. The data rate is only used by striped datasets. If you use a STORCLAS with guaranteed space=YES and nothing else then you will get the primary allocation you request on each volume you requested, or on the number of non-specific volumes you request in the UNIT

Re: Space allocation question...

2010-10-15 Thread Ron Hawkins
Darth, Were you thinking of the sustained data rate value, rather than initial access time? Note that you can use unitcnt and guaranteed space to control the number and size of stripes from JCL, rather than using the data rate. I've always preferred this method. Ron Another way to get

Re: S013-64-IEBGENER

2010-10-15 Thread Richard L Peurifoy
On 10/15/2010 10:49 AM, Paul Gilmartin wrote: On Fri, 15 Oct 2010 08:24:13 -0500, Ron Wells wrote: Anyone run across where a IEBGENER fails with a S013-64 //SYSUT1 DD DUMMY, // DISP=SHR,LRECL=4096,RECFM=FB //SYSUT2 DD DSN=XX15.TEST.DATA.SET, //

Re: Mainframe hacking?

2010-10-15 Thread Frank Swarbrick
As a new z/OS applications developer I'm curious as to what types of things use custom user exits et al for. From what I've heard from our sysprogs, our philosophy is to never use inhouse written user exits. Of course there are vendor supplied user exits, but the only inhouse user exit I know

Re: APF (was: Mainframe hacking?)

2010-10-15 Thread Walt Farrell
On Fri, 15 Oct 2010 13:07:54 -0500, John McKown john.archie.mck...@gmail.com wrote: ISPF doesn't run APF. It uses the TSO IKJEFTSR function to run properly authorized programs and commands. At least, I think that's how it works. True, but IKEFTSR did not exist back when the SPFCOPY SVC was

Re: Space allocation question...

2010-10-15 Thread Darth Keller
Darth, Were you thinking of the sustained data rate value, rather than initial access time? Note that you can use unitcnt and guaranteed space to control the number and size of stripes from JCL, rather than using the data rate. I've always preferred this method. Ron Ron - you are correct -

Re: S013-64-IEBGENER

2010-10-15 Thread Ron Wells
Richard Thought that too...and yesbut then--just to verify I steplib'd to where original IEBGENER was located...failed again.. From: Richard L Peurifoy r-peuri...@neo.tamu.edu To: IBM-MAIN@bama.ua.edu Date: 10/15/2010 01:26 PM Subject:Re: S013-64-IEBGENER Sent by:

Re: Space allocation question...

2010-10-15 Thread Joel C. Ewing
On 10/15/2010 12:53 PM, Darth Keller wrote: If the dataset is SMS managed, the second volume won't allocate until you fill up the first volume and a second volume is needed. Why is it that you want to allocate the 2 volumes? As someone stated earlier - a primary allocation can not span 2

Re: EREP dump readout for MCIC

2010-10-15 Thread Shmuel Metz (Seymour J.)
In 4cb76d72.3010...@terra.com.br, on 10/14/2010 at 05:52 PM, Carlos Bodra - Pessoal cbo...@terra.com.br said: I was checking erep output to try to discover more about MCIC (Machine Check Interruption Code) Look in Principles of Operation. External Damage Damage to storage or channels,

Re: Mainframe hacking?

2010-10-15 Thread Clark Morris
On 15 Oct 2010 05:28:21 -0700, in bit.listserv.ibm-main you wrote: IEBCOPY was developed in the early- to mid-1960s, when EXCP appendages were the leading edge way to do cruel and unusual things in low-level I/O. Such has not been the case since the advent of MVS/XA and a redesigned IOS in

Re: Using ADDRESS SDSF in OPS/MVS

2010-10-15 Thread Burge, Richard
I thought the isfJesName just had to precede the ADDRESS SDSF call. Nonetheless, one of my coworkers has it working per following CA's Technical input. See programs and CA's info. Thanks to all's input. /*REXX MEMBER SDSFTEST */ ADDRESS 'OSF' SDSFTES1 EXIT /* REXX MEMBER SDSFTES1

Null versus empty datasets

2010-10-15 Thread Starr, Alan
Hi List, John McKown's response to Ron's S013-64 issue interested me. I had not realized that SMS automatically wrote an EOF to newly-allocated datasets. John pointed me to http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/dgt2i650/8.1 which states For sequential data sets, SMS

Re: Space allocation question...

2010-10-15 Thread Ted MacNEIL
I tried above allocation but I am getting just 3336 cylinders as initial allocation. What could be wrong here? Should the volumes be non-SMS? If they are SMS does it need some SMS rule to allocate primary space specified across each of the volumes?! Space management 101: 1. The primary is

Re: Null versus empty datasets

2010-10-15 Thread David Kreiss
Determine what track the dataset was allocated to then run this utility specifying the first track of the dataset. //DFDSS EXEC PGM=ADRDSSU //volume DD VOL=SER=volume,UNIT=3390,DISP=SHR //SYSPRINT DD SYSOUT=* //SYSINDD *

Re: Space allocation question...

2010-10-15 Thread Mueller, David
Ted, I would disagree with your point (2) in one case. For a VSAM dataset with the allocation coming from IDCAMS DEFINE parameters, the primary is remembered in the catalog listing. If the file is defined in a non-guaranteed-space environment with more than one volume specified, the

Re: Space allocation question...

2010-10-15 Thread Darth Keller
2. The primary is never 'remembered'. So, if you go to a subsequent volume, the secondary allocation is always used (and must, again, be satisfied within 5 extents. From the DataClass: Additional Volume Amt: Primary - Primary allocation amount has been requested.

Re: JES2 Control Block

2010-10-15 Thread Ted MacNEIL
I have it buried in my mind that when a job comes to a new node, if the original Job Number is not in use at that node, that the original Job Number is used for the job, otherwise the job gets a new number on the new node, but I have absolutely no documentation to support that memory. I have

Re: APF (was: Mainframe hacking?)

2010-10-15 Thread Tony Harminc
On 15 October 2010 14:03, Joel C. Ewing jcew...@acm.org wrote: On 10/15/2010 09:27 AM, Paul Gilmartin wrote: On Thu, 14 Oct 2010 19:54:44 -0500, John McKown wrote: The SPFCOPY that I remember simply used a magic SVC to set the APF on before calling IEBCOPY and back off afterwards. I've

Re: Space allocation question...

2010-10-15 Thread Ted MacNEIL
Ted, I would disagree with your point (2) in one case. Yes, I'm aware of of the difference of VSAM vs PS. But, I thought the OP was talking PS. Also, I've never used guaranteed space for non-VSAM files, so I wasn't aware of the impact on the primary allocation for subsequent volumes. Any day

Re: Space allocation question...

2010-10-15 Thread John H Kington
Darth, 2. The primary is never 'remembered'. So, if you go to a subsequent volume, the secondary allocation is always used (and must, again, be satisfied within 5 extents. From the DataClass: Additional Volume Amt: Primary - Primary allocation amount has been

Re: Null versus empty datasets

2010-10-15 Thread Mike Schwab
It can also print the VTOC so you can find where the dataset is located. //jobname JOB 'acct','pgmr name', //STEP02 EXEC PGM=ADRDSSU ,PARM='TYPRUN=NORUN' (to test control card syntax) //SYSPRINT DD SYSOUT=* //DDA DD UNIT=DISK,DISP=SHR,VOL=SER=vv //SYSINDD * PRINT

Re: Space allocation question...

2010-10-15 Thread Darth Keller
I should have gone back reviewed the original email as it's too far down in the chain too late in the day. thanks - ddk This e-mail message and all attachments transmitted with it may contain legally privileged and/or confidential information intended solely for the use of the addressee(s). If

Re: Space allocation question...

2010-10-15 Thread John H Kington
David, Ted, I would disagree with your point (2) in one case. For a VSAM dataset with the allocation coming from IDCAMS DEFINE parameters, the primary is remembered in the catalog listing. If the file is defined in a non-guaranteed-space environment with more than one volume

Re: JES2 Control Block

2010-10-15 Thread John McKown
The manual Network Job Entry (Format and Protocols) SA22-7539-02, in appendix A.2.3.7 specifically states: When a job is transmitted from one system to another, the receiving system attempts to assign the original jobid ( from the job header) to the job that is being received. ... -- John McKown

Re: JES2 Control Block

2010-10-15 Thread Ted MacNEIL
When a job is transmitted from one system to another, the receiving system attempts to assign the original jobid ( from the job header) to the job that is being received. ... But, if that jobnum is already in use? - I'm a SuperHero with neither powers, nor motivation! Kimota!

Re: JES2 Control Block

2010-10-15 Thread John McKown
As I recall, it selects a new number like when a new job is submitted. -- John McKown Maranatha! Sent from my Vibrant Android phone. On Oct 15, 2010 3:46 PM, Ted MacNEIL eamacn...@yahoo.ca wrote: When a job is transmitted from one system to another, the receiving system attempts to assign the

Re: JES2 Control Block

2010-10-15 Thread Ted MacNEIL
As I recall, it selects a new number like when a new job is submitted. So, that all supports Dr. Barry's memory, and my (long ago) experimentation. - I'm a SuperHero with neither powers, nor motivation! Kimota! -- For IBM-MAIN

Re: Converting SAS C to IBM C

2010-10-15 Thread Thomas David Rivers
Shane wrote: Sounds like an invitation for Dave Rivers to pipe up ... ;-) pipe! Yes! definately - we think Dignus' Systems/C is a perfect alternative; especially if you have situations where you have to intermingle between assembly and C and if you're doing things like WAIT and POST.

Re: Null versus empty datasets

2010-10-15 Thread Bill Fairchild
I believe you meant the last six digits of COUNT instead of the 1st 4. Bill Fairchild Rocket Software -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of David Kreiss Sent: Friday, October 15, 2010 2:54 PM To: IBM-MAIN@bama.ua.edu Subject:

Re: Null versus empty datasets

2010-10-15 Thread David Kreiss
Bill, Yes, my mistake, as you know the count has 2 digits of key length and 4 of data length at the end. COUNT 000D0100 RRKK Or cRKK for EAS tracks Dave -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On

Re: Null versus empty datasets

2010-10-15 Thread Bill Fairchild
Please don't anyone believe this overly simplistic statement from IBM whose legal staff apparently didn't get to proofread it. Certainly do not bet your critical data on this statement. Writing an EOF record at the beginning of a newly allocated sequential data set will only prevent data

Re: FW: The meaning of SCIDS.

2010-10-15 Thread Edward Jaffe
On 10/14/2010 3:07 AM, Mary Anne Matyaz wrote: I'd always heard Social Conversation in a Drunken Stupor. According to a fairly recent article I read describing the founding of SHARE at the Rand Corporation in 1955, SCIDS = SHARE Committee for Informal Discussion Sessions. Now, if I can

Re: Mainframe hacking?

2010-10-15 Thread Rick Fochtman
-snip--- Also, IIRC, IEBCOPY uses I/O appendages that require authorization, since they are loaded from SYS1.SVCLIB. Yes. That's true. But, what about the fact that work-alikes (eg: SPFCOPY) don't need them?

  1   2   >