Clarification on IEHPROGM

2011-11-15 Thread Jake anderson
Hi, When I try to rename a dataset using a Utility IEHPROGM and I get a error message like : Error : SYSTEM SUPPORT UTILITIES IEHPROGM RENAME DSNAME=BETTY.JCL.PDS, X00027015 NEWNAME=BETTY.JCL1.PDS,VOL=3390=KMCG03 00028017 IEH207I STATUS OF USERS REQUEST TO RENAME DATA

Re: Clarification on IEHPROGM

2011-11-15 Thread Vernooij, CP - SPLXM
Jake anderson justmainfra...@gmail.com wrote in message news:cahtvvrw503n-daal98sqzcritzj4bhyxu-hsgpfdmxgqhsj...@mail.gmail.com ... Hi, When I try to rename a dataset using a Utility IEHPROGM and I get a error message like : Error : SYSTEM SUPPORT UTILITIES IEHPROGM RENAME

Re: Clarification on IEHPROGM

2011-11-15 Thread Jake anderson
Is the disk SMS managed? Yes - So is is it possible to take the existing name for renaming Purpose using IEHPROGM ? But when I try renaming with a non-existent name then I am able to do it whereas existing name produces this error message Password protected. If I do a recatalog of existing name

Re: HSM Journal dataset is almost full

2011-11-15 Thread Walter Marguccio
From: Uriel Carrasquilla uriel.carrasqui...@mail.mcgill.ca Is the emergency request creating a situation where at least one of the LPARs must be running HSM? I don't think so. I'm not aware of any hsm parameter which would restart the address space once it is shutdown. As Dave already

Re: Clarification on IEHPROGM

2011-11-15 Thread Vernooij, CP - SPLXM
You are trying to rename a 2011 data set with a 1980's utility. You can do it with IDCAMS, this will take care of the data set on disk and the catalog info. //IDCAMS EXEC PGM=IDCAMS //SYSPRINT DD SYSOUT=* //SYSINDD *

Re: Clarification on IEHPROGM

2011-11-15 Thread Jake anderson
I am trying RENAME for NON-VSAM, but I used your Given JCL to rename with existing name itself but it conflicts with Duplicate name(Obviously) Since the NEWNAME do already do exist. But my clarification why IEHPROGM throws an error as Correct Password not available whereas we have not protected

Re: Clarification on IEHPROGM

2011-11-15 Thread Vernooij, CP - SPLXM
I am not sure what you are trying to achieve. You are trying impossible things, but why? SMS managed datasets must be cataloged, so you cannot rename/recatalog it to a name that already exists. IDCAMS can also rename non-VSAM datasets. I am quite sure that the 'password' error is caused by the

Data encrypt

2011-11-15 Thread Ron Thomas
Hi Listners, We have go a customer number in applications and this number is currently part of a primary key, we have a requirement to encrypt this number and also should not be used in the tables directly , which means this can not be part of a primary key. pls share your thoughts on the

Re: Clarification on IEHPROGM

2011-11-15 Thread Jake anderson
I am quite sure that the 'password' error is caused by the fact that the data set is SMS managed. Was just curious to know why this password error Pops up for the SMS managed Dataset whereas we have not protected the dataset with Password. On Tue, Nov 15, 2011 at 3:16 PM, Vernooij, CP - SPLXM

Re: STOW macro Location

2011-11-15 Thread Elardus Engelbrecht
To Binyamin Dissen and Shmuel Metz: Ok, I must be confusing (having too much decaying braincells :D ) STOW with something else which can destroy a PDS / PDSE directory if used incorrectly. Please educate and correct me what that thing was which was discussed on IBM-MAIN. I remember that if you

Re: Clarification on IEHPROGM

2011-11-15 Thread Elardus Engelbrecht
Jake anderson wrote: I am quite sure that the 'password' error is caused by the fact that the data set is SMS managed. Was just curious to know why this password error Pops up for the SMS managed Dataset whereas we have not protected the dataset with Password. Perhaps WAD. Rename is only

Re: What exactly does the SMBHWT subparameter do?

2011-11-15 Thread Yifat Oren
Hi Peter, Have you seen the VSAM Demystified definition for SMBHWT? SMBHWT: Used to allocate hiperspace buffers based on a multiple of the number of address space virtual buffers that have been allocated. It can be an integer from 0 to 99. The value specified is not a direct multiple of the

Re: Data encrypt

2011-11-15 Thread Rob Schramm
Ron, There are a couple of things you can do. - expand the vsam or database and create a new key that will be assigned to everyone - use your favorite encryption method via ICSF to encrypt the card number - centralize the method for encrypting and decrypting the data and place controls around it

Re: Clarification on IEHPROGM

2011-11-15 Thread Tom Marchant
On Tue, 15 Nov 2011 16:24:25 +0530, Jake anderson wrote: I am quite sure that the 'password' error is caused by the fact that the data set is SMS managed. Was just curious to know why this password error Pops up for the SMS managed Dataset whereas we have not protected the dataset with Password.

Re: Clarification on IEHPROGM

2011-11-15 Thread Norbert Friemel
On Tue, 15 Nov 2011 06:56:44 -0600, Tom Marchant wrote: As has been mentioned by others, you can not use IEHPROGM to rename an SMS-managed data set because every SMS-managed data set must be cataloged. When renaming SMS-managed data sets, IEHPROGM will uncatalog the data set and recatalog

Re: Clarification on IEHPROGM

2011-11-15 Thread Tom Marchant
On Tue, 15 Nov 2011 07:50:49 -0600, Norbert Friemel wrote: On Tue, 15 Nov 2011 06:56:44 -0600, Tom Marchant wrote: you can not use IEHPROGM to rename an SMS-managed data set When renaming SMS-managed data sets, IEHPROGM will uncatalog the data set and recatalog the data set under the new

Re: STOW macro Location

2011-11-15 Thread Paul Gilmartin
On Tue, 15 Nov 2011 04:56:39 -0600, Elardus Engelbrecht wrote: Ok, I must be confusing (having too much decaying braincells :D ) STOW with something else which can destroy a PDS / PDSE directory if used incorrectly. It used to be easy enough with IEBGENER. This may have changed lately, or may

Fwd: I am finally became Boss...

2011-11-15 Thread Lloyd Fuller
pHi.brI could see my future fading fast this got me back on my feet in no time now nobody would dare disrespect me this is just between usbra href=http://4-hobbs.woelmuis.nl/profile/59JohnBennett/;http://4-hobbs.woelmuis.nl/profile/59JohnBennett//abrgoodbye/p

Re: Data encrypt

2011-11-15 Thread John Roberts
Tumbleweed Secure Messager messed up my post. Trying again. We have go a customer number in applications and this number is currently part of a primary key, we have a requirement to encrypt this number and also should not be used in the tables directly , which means this can not be part of a

Re: Data encrypt

2011-11-15 Thread Roberts, John J
You have received a secure message from Roberts, John J entitled, RE: Data encrypt. You may view the message (before 12/15/2011) at the following web address: https://dhstw2.dhs.state.ia.us/messenger/msg?x=d-801006-VUpGvX5q

Re: NIP console message traffic logging / recording+

2011-11-15 Thread Shmuel Metz (Seymour J.)
In 6004cdb6eec26047b614a88242ebed4f05a73...@tor-msg-01.cgiclients.com, on 11/14/2011 at 02:33 PM, Jakubek, Jan jan.jaku...@cgi.com said: A Standalone Dump would likely have a message record/log Master trace table. A solution would likely have be external to z/OS via either 3270 emulator (our

Re: STOW macro Location

2011-11-15 Thread Shmuel Metz (Seymour J.)
In 1009418597484101.wa.elardus.engelbrechtsita.co...@bama.ua.edu, on 11/15/2011 at 04:56 AM, Elardus Engelbrecht elardus.engelbre...@sita.co.za said: Ok, I must be confusing (having too much decaying braincells :D ) STOW with something else which can destroy a PDS / PDSE directory if used

Re: Clarification on IEHPROGM

2011-11-15 Thread Shmuel Metz (Seymour J.)
In cahtvvrwjiv8qvb2hcr159ayus+ycyce8o58gjkwrvfnatyu...@mail.gmail.com, on 11/15/2011 at 03:00 PM, Jake anderson justmainfra...@gmail.com said: But my clarification why IEHPROGM throws an error as Correct Password not available whereas we have not protected the Dataset with Password ? Because

Re: HSM Journal dataset is almost full

2011-11-15 Thread Uriel Carrasquilla
I don't think so. I'm not aware of any hsm parameter which would restart the address space once it is shutdown. As Dave already mentioned, ask your automation folks. It is possible your automation product triggers ARC0002I on the main LPAR, of hsm is defined under ARM We are taking a closer

Re: STOW macro Location

2011-11-15 Thread Shmuel Metz (Seymour J.)
In 7i53c7thv9cglid3773mjl4k778pvp3...@4ax.com, on 11/15/2011 at 12:30 AM, Binyamin Dissen bdis...@dissensoftware.com said: Incorrect. Closer than your answer. The mapping macro has a parameter to indicate whether the BLDL or directory format is desired. Not for PDSE. -- Shmuel

Re: Data encrypt

2011-11-15 Thread Steve Comstock
On 11/15/2011 7:39 AM, Roberts, John J wrote: You have received a secure message from Roberts, John J entitled, RE: Data encrypt. You may view the message (before 12/15/2011) at the following web address: https://dhstw2.dhs.state.ia.us/messenger/msg?x=d-801006-VUpGvX5q

Re: Clarification on IEHPROGM

2011-11-15 Thread Roberts, John J
I can't remember the last time I used IEHPROGM. So I wonder - Is there any function of IEHPROGM that is not duplicated in some more modern utility? Is the only reason for its continued existence for compatibility with old legacy JCL? Or just in case somebody is nostalgic for CVOL catalogs?

Re: Data encrypt

2011-11-15 Thread Hal Merritt
The cryptogram (encrypted customer number) should be unique and therefore usable as a file key as well as any other context. By simply changing the content of the field from customer number to encrypted customer number, the effect ripples throughout all of the resident files as well as

Re: Clarification on IEHPROGM

2011-11-15 Thread Vernooij, CP - SPLXM
Roberts, John J jrobe...@dhs.state.ia.us wrote in message news:93891f43642f3c419a7d75acc2b1db6f3c0a525...@exchangemb2.dhs.state.i a.us... I can't remember the last time I used IEHPROGM. So I wonder - Is there any function of IEHPROGM that is not duplicated in some more modern utility? Is the

Re: Clarification on IEHPROGM

2011-11-15 Thread Chris Mason
Kees ... with a 1980's utility. I think you mean *1960's*. But then they say, do they not?, that if you can remember the 1960's, you weren't there! Chris Mason On Tue, 15 Nov 2011 10:13:41 +0100, Vernooij, CP - SPLXM kees.verno...@klm.com wrote: You are trying to rename a 2011 data set

Re: Clarification on IEHPROGM

2011-11-15 Thread Herring, Bobby
Never mind. The manual says it is covered: If you are renaming a member of a non-VSAM partitioned data set, the entryname must be given as: pdsname(membername) Bob CONFIDENTIALITY STATEMENT: The foregoing message (including attachments) is covered by the Electronic Communication Privacy Act,

Re: Clarification on IEHPROGM

2011-11-15 Thread Herring, Bobby
We still use it to batch rename members in a PDS. Is that covered by the IDCAMS functions? Bob Herring Texas Farm Bureau Insurance Companies Waco, TX CONFIDENTIALITY STATEMENT: The foregoing message (including attachments) is covered by the Electronic Communication Privacy Act, 18 U.S.C.

Re: STOW macro Location

2011-11-15 Thread Paul Gilmartin
On Tue, 15 Nov 2011 09:08:25 -0500, Shmuel Metz (Seymour J.) wrote: In 1009418597484101.wa.elardus.engelbrechtsita.co...@bama.ua.edu, on 11/15/2011 at 04:56 AM, Elardus Engelbrecht said: Ok, I must be confusing (having too much decaying braincells :D ) STOW with something else which can destroy

Re: Data encrypt

2011-11-15 Thread Ron Thomas
The customer number we are currently having the ssn as its identifier, we need to make sure this has to encrypted . Let me know what process we need to follow over here? -- For IBM-MAIN subscribe / signoff / archive access

Re: Clarification on IEHPROGM

2011-11-15 Thread Mingee, David
We have used IEHPROGM to SCRATCH(delete) members in rare cases where other utilities fail. Also, used for rare case of uncatlg for a bad file name - ex: UNCATLG DSNAME=XXX.CBSYYY2.AB.AUDIT.HISTORY .G0005V00 NSCR David L. Mingee Principal Systems Administrator Indianapolis Production

Re: ZNALC Option for LICENSE Parameter

2011-11-15 Thread Hal Merritt
How so? -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Timothy Sipples Sent: Saturday, November 12, 2011 1:41 AM To: IBM-MAIN@bama.ua.edu Subject: Re: ZNALC Option for LICENSE Parameter Walter Marguccio writes: under zNALC you

Re: Data encrypt

2011-11-15 Thread Ron Thomas
For the cryptogram to be created, is there some specfic alogithm that need to be followed? -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO

Re: Clarification on IEHPROGM

2011-11-15 Thread Paul Gilmartin
On Tue, 15 Nov 2011 16:04:49 +, Mingee, David wrote: We have used IEHPROGM to SCRATCH(delete) members in rare cases where other utilities fail. Also, used for rare case of uncatlg for a bad file name - ex: UNCATLG DSNAME=XXX.CBSYYY2.AB.AUDIT.HISTORY .G0005V00 NSCR I understand

Re: Bustech Virtual Tape Appliance

2011-11-15 Thread Steve Dover
As it has been mentioned before, sometimes resolutions don't get posted. Thanks to Frank Bonaduce, Norbert Friemel, Jonathan Goossen and Chip Grantham for all of their help (and everyone else as well). It was indeed the IGXMSGEX exit, which drives the request sent to the tape drive display.

Re: Data encrypt

2011-11-15 Thread John Roberts
The customer number we are currently having the ssn as its identifier, we need to make sure this has to encrypted OK, so the real requirement is to stop using SSN as the primary customer ID, but still keep SSN around since customers won't know the unique ID your organization has assigned to

Re: HSM Journal dataset is almost full

2011-11-15 Thread Walter Marguccio
From: Uriel Carrasquilla uriel.carrasqui...@mail.mcgill.ca When we shutdown HSM in all of our LPARs without setting them in the EMERGENCY mode, we never had any problems with HSM re-starting. Under chapter 14 DFSMShsm Libraries and Procedure of the DFSMShsm Implementation and Cust. Guide.

Re: Data encrypt

2011-11-15 Thread Hal Merritt
Many seem to think that encryption is easy to do. It is hard, very expensive, and carries a risk of irrevocable loss of data. I would think that management should select a team to plan the implementation. An early step in the planning process is to select the encryption algorithm to be

Re: Data encrypt

2011-11-15 Thread Roberts, John J
Maybe this article is of interest to you: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1070001/ This is a publication of the Federal National Institutes for Health. John -- For IBM-MAIN subscribe / signoff / archive access

Re: What exactly does the SMBHWT subparameter do?

2011-11-15 Thread Farley, Peter x23353
Yifat, Yes, I did see that description in VSAM Demystified, but it still does not make a lot of sense to me. What kind of weighting factor? How many buffers go to hiperspace when SMBHWT=10 or 30 or 80? There is no clue in any of the documentation I have seen so far, and no way for an

Re: Data encrypt

2011-11-15 Thread Phil Smith
Hal Merritt wrote: Many seem to think that encryption is easy to do. It is hard, very expensive, and carries a risk of irrevocable loss of data. I would think that management   should select a team to plan the implementation. An early step in the planning process is to select the encryption

Re: Data encrypt

2011-11-15 Thread John Gilmore
Hal Merritt wrote | You may even be able to use the cryptogram in many reports/displays as the | cryptogram may be sufficient for the business need. and he could have made this point even more strongly. There are now many situations in which the cryptogram is not just usable but better: It

Re: Data encrypt

2011-11-15 Thread Rob Schramm
It was a pretty wide question to start with... and included little detail. The devil is in the details for encryption and how it ripples through. Isolated is relatively easy. Complicated systems are complicated. VBG Depending on the size of your organization.. it may take a very real amount of

Re: Data encrypt

2011-11-15 Thread Gerhard Postpischil
On 11/15/2011 10:35 AM, Ron Thomas wrote: The customer number we are currently having the ssn as its identifier, we need to make sure this has to encrypted . Let me know what process we need to follow over here? While I'm not a lawyer, I was under the impression that using an SSN for

Re: STOW macro Location

2011-11-15 Thread Gerhard Postpischil
On 11/15/2011 5:56 AM, Elardus Engelbrecht wrote: To Binyamin Dissen and Shmuel Metz: Ok, I must be confusing (having too much decaying braincells :D ) STOW with something else which can destroy a PDS / PDSE directory if used incorrectly. Or perhaps you were thinking of STOW ,,,I ? Re your

Re: HSM Journal dataset is almost full

2011-11-15 Thread Uriel Carrasquilla
Have a look at RESTART keyword in your procedure. I took a look at the HSM PROC and EMERG=NO but no signs of RESTART. I also checked out SYS.PARMLIB(ARCCMDSx) and could not find any traces of a RESTART keyword. When I look at the LOG, I can see that OPS/MVS is involved and might be the

Re: Data encrypt

2011-11-15 Thread Farley, Peter x23353
-Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Hal Merritt Sent: Tuesday, November 15, 2011 11:55 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Data encrypt Snipped The key management issues include how to change the key, and how to

Re: Data encrypt

2011-11-15 Thread Rob Schramm
If you want something similar to clear key performance, use the protected key security option. Keys are secure and cpacf is used for decrypt processing. While not quite as fast as clear key.. it is only a little slower... and more secure. And still way faster than crypto operations in CEX2 or

Re: Data encrypt

2011-11-15 Thread Phil Smith
On Tue, Nov 15, 2011 at 1:37 PM, Gerhard Postpischil gerh...@valley.net wrote: While I'm not a lawyer, I was under the impression that using an SSN for anything other than Social Security and Internal Revenue Service was illegal. Even if your use is sanctioned, you need to consider that an SSN

Re: Data encrypt

2011-11-15 Thread Mike Schwab
I can think of two simple methods to not store the number without a encryption call. 1. Re-arrange the digits. I. E. 123456789 move 1 byte at a time to 369258147 or as you desire. 2. Add a specific number to the digits of the key. 123456789 + 012345678 = 135802467 Pi or 'e' (natural number) or

Re: Data encrypt

2011-11-15 Thread Farley, Peter x23353
-Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Rob Schramm Sent: Tuesday, November 15, 2011 2:18 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Data encrypt If you want something similar to clear key performance, use the protected key

Re: Bustech Virtual Tape Appliance

2011-11-15 Thread Steve Dover
Linda Mooney, please forgive me. Linda was also a lot of help for me on this. Steve On Tue, 15 Nov 2011 10:34:39 -0600, Steve Dover steve.do...@ccbcc.com wrote: As it has been mentioned before, sometimes resolutions don't get posted. Thanks to Frank Bonaduce, Norbert Friemel, Jonathan Goossen

Naviquest help

2011-11-15 Thread af dc
Hello, is there anyone that can give me help on how to set a naviquest set of cmds to run in batch to perform the following tasks: SG ALTER where I need to change the connection to the lpars from disnew to enable and then validate and activate sms configuration. Can you pls give me an help ? Many

Re: Clarification on IEHPROGM

2011-11-15 Thread Rick Fochtman
-snip-- I am trying RENAME for NON-VSAM, but I used your Given JCL to rename with existing name itself but it conflicts with Duplicate name(Obviously) Since the NEWNAME do already do exist. But my clarification why

Re: Clarification on IEHPROGM

2011-11-15 Thread Rick Fochtman
-snip-- We still use it to batch rename members in a PDS. Is that covered by the IDCAMS functions? ---unsnip--- IDCAMS can rename members as

Re: Naviquest help

2011-11-15 Thread Darth Keller
There are panels with Batch Samples under ISMF: Item #1. SG ALTER where I need to change the connection to the lpars from disnew to enable ISMF - Enhanced ACS Management - Batch Testing/Configuration Management - Configuration Changes Batch Samples - Define/Alter Pool type Storage

Re: Data encrypt

2011-11-15 Thread Chase, John
-Original Message- From: IBM Mainframe Discussion List On Behalf Of Farley, Peter x23353 -Original Message- From: IBM Mainframe Discussion List On Behalf Of Rob Schramm If you want something similar to clear key performance, use the protected key security option.

Re: Data encrypt

2011-11-15 Thread Bill Fairchild
My Social Security card, which I obtained ca. 1959, states the following: For Social Security purposes. Not for identification. Perhaps that warning was referring to the card itself rather than to the nine-digit number on it. Bill Fairchild -Original Message- From: IBM Mainframe

Re: Data encrypt

2011-11-15 Thread John Roberts
My Social Security card, which I obtained ca. 1959, states the following: For Social Security purposes. Not for identification. That language was removed in 1972, after it had become clear that the SSN was now a defacto national ID number. John

Re: Bustech Virtual Tape Appliance

2011-11-15 Thread Linda Mooney
Hi Steve, Not to worry, and thanks, especially for posting what worked for you. Thanks,  Linda - Original Message - From: Steve Dover steve.do...@ccbcc.com To: IBM-MAIN@bama.ua.edu Sent: Tuesday, November 15, 2011 12:01:12 PM Subject: Re: Bustech Virtual Tape Appliance

Re: Data encrypt

2011-11-15 Thread Farley, Peter x23353
-Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Chase, John Sent: Tuesday, November 15, 2011 3:43 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Data encrypt -Original Message- From: IBM Mainframe Discussion List On Behalf Of

Re: Clarification on IEHPROGM

2011-11-15 Thread Matthew Stitt
The only use I have for IEHPROGM is to delete the temporary datasets which remain on the PUBLIC and STORAGE volumes for various reasons. That function still works quite well. I believe the OPs original questions was why it returned a message indicating a security problem, I.E. incorrect

SYNCSORT - No records message

2011-11-15 Thread George, William@FTB
I have a SYNCSORT job that splits a large input file into many other specific files. If any of the files ends up with no records written to it is it possible, within the SORT statements, to write out a single record with a message? For example NO RECORDS FOR THIS FILE when this condition is

Re: Clarification on IEHPROGM

2011-11-15 Thread Gibney, Dave
-Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Matthew Stitt Sent: Tuesday, November 15, 2011 1:07 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Clarification on IEHPROGM The only use I have for IEHPROGM is to delete the temporary

Re: Naviquest help

2011-11-15 Thread Jonathan Goossen
I am still new to Naviquest, so I spent some time in the Naviquest manual. To add to what Darth said: The manual specifically states to use the SETSMS command after the translate and validate. According to the manual, Naviquest is designed only for testing. Activating moves it into use. Thank

Re: STOW macro Location

2011-11-15 Thread Rick Fochtman
---snip Ok, I must be confusing (having too much decaying braincells :D ) STOW with something else which can destroy a PDS / PDSE directory if used incorrectly. Please educate and correct me what that thing was which was

Re: Data encrypt

2011-11-15 Thread Tony Harminc
On 15 November 2011 16:03, John Roberts jrobe...@dhs.state.ia.us wrote: My Social Security card, which I obtained ca. 1959, states the following:   For Social Security purposes.  Not for identification. That language was removed in 1972, after it had become clear that the SSN was now a defacto

Re: Data encrypt

2011-11-15 Thread Jim Thomas
Humm ... I got mine in 87 when I moved to the US. Much before I even got my SSN, the INS and SSA drummed it into my head that I was 'not supposed' to reveal my SSN to anybody else. Then I find . that I could be asked for my SSN if I so much (a bit of an exaggeration) as wanted to buy a loaf

Re: Clarification on IEHPROGM

2011-11-15 Thread Ed Gould
Rick, One thing we learned early with MVS that IDCAMS ms required exclusive control of the dataset. We got around that with the use of file(dd1) on the IDCAMS statement and including the DD statement (//DD1 DD DSN..,display shr Ed

Re: Clarification on IEHPROGM

2011-11-15 Thread Rick Fochtman
---snip--- I think you mean *1960's*. But then they say, do they not?, that if you can remember the 1960's, you weren't there! --unsnip--- Not true. I

Re: STOW macro Location

2011-11-15 Thread Bill Fairchild
STOW does not ever operate by hosing the directory. It assumes the directory exists and is valid. It finds the proper place in the directory for the member being STOWED and manipulates the directory as per the STOW parameters (add, delete, etc.). If the directory has already been hosed

Re: STOW macro Location

2011-11-15 Thread Jim Thomas
One small point if I may ... and perhaps this has been stated and if so, my apologies .. STOW (if used generally) will ONLY 'UPDATE' the directory and then too, only if the DS has been OPENed OUTPUT, OUTIN or UPDAT... Kind Regards Jim Thomas 617-233-4130 (mobile) 636-294-1014

Re: STOW macro Location

2011-11-15 Thread Shane
On Wed, 16 Nov 2011 00:38:34 + Bill Fairchild wrote: Perhaps IBM reasoned that if a user really, really, seriously wants to do something this strange, they should let him. Your gun, your foot ... Maybe users in bygone times were made of sterner stuff and prepared to take responsibility for

Re: STOW macro Location

2011-11-15 Thread Gerhard Postpischil
On 11/15/2011 7:38 PM, Bill Fairchild wrote: I think the real culprit is the lack of user-friendliness in whatever OPEN executor module is blindly following the user's request to overwrite an entire file without checking for certain file types for which overwriting the whole file might not be

Re: STOW macro Location

2011-11-15 Thread John Gilmore
Shane's point is an important one. In a private email to Bill earlier this evening I confessed that I had (more than once) opened a PDS as a sequential data set using BSAM in order to read a (mangled) directory. On the occasion I remember best I got the information I needed without [further]

Re: STOW macro Location

2011-11-15 Thread Gerhard Postpischil
On 11/15/2011 8:41 PM, Shane wrote: Maybe users in bygone times were made of sterner stuff and prepared to take responsibility for their own actions. Not necessarily - we operated in a completely different environment. There were so few manuals that it was possible to read all of them, as

Re: STOW macro Location

2011-11-15 Thread Paul Gilmartin
On Tue, 15 Nov 2011 20:51:25 -0500, Gerhard Postpischil wrote: On 11/15/2011 7:38 PM, Bill Fairchild wrote: I think the real culprit is the lack of user-friendliness in whatever OPEN executor module is blindly following the user's request to overwrite an entire file without checking for

Re: Clarification on IEHPROGM

2011-11-15 Thread Shmuel Metz (Seymour J.)
In ce3ffbb7e42033469ef752a1d8a19ba1eef...@kl1221tc.cs.ad.klmcorp.net, on 11/15/2011 at 04:43 PM, Vernooij, CP - SPLXM kees.verno...@klm.com said: You need a nostalgic old MVS to even have CVOLs. No, OS/360, OS/VS1 and SVS will do as well. -- Shmuel (Seymour J.) Metz, SysProg and JOAT

Re: STOW macro Location

2011-11-15 Thread Shmuel Metz (Seymour J.)
In 1149164858762620.wa.paulgboulderaim@bama.ua.edu, on 11/15/2011 at 09:39 AM, Paul Gilmartin paulgboul...@aim.com said: Indirectly. Right answer to wrong question. Rexx (even in batch, under IKJEFT*) can invoke ISPF to use ISPF services. You're still talking about ISPF services, not

Re: STOW macro Location

2011-11-15 Thread Shmuel Metz (Seymour J.)
In 2016114137.2cca11dd@xpfs, on 11/16/2011 at 11:41 AM, Shane ibm-m...@tpg.com.au said: Maybe IBM never put any thought into it at all. That would certain account for absolute track 0 not available when you forgot a SPACE keyword for a new data set. -- Shmuel (Seymour J.) Metz,

Re: STOW macro Location

2011-11-15 Thread Shmuel Metz (Seymour J.)
In CAPD5F5qvUFtSVX3WoWvHNmTfPObydZuusnbx+MV0mAWS=fq...@mail.gmail.com, on 11/15/2011 at 09:01 PM, John Gilmore johnwgilmore0...@gmail.com said: Would I discourage a novice from doing this sort of thing? Yes, but Do what I say, not what I do is not always unreasonable, although it is of course

Re: Data encrypt

2011-11-15 Thread Rob Schramm
Peter, No, I am not talking about that... The issue is that CPACF clear key is tremendously faster than Secure Key. Secure key is the process where the DEK or Operational Key is encrypted under the Master Key but the process is 2 - 3 millisecond for TDES to encrypt or decrypt a card number.

Re: Clarification on IEHPROGM

2011-11-15 Thread Ted MacNEIL
--Original Message-- From: Rick Fochtman Sender: IBM Mainframe Discussion List To: IBM Mainframe Discussion List ReplyTo: IBM Mainframe Discussion List Subject: Re: Clarification on IEHPROGM Sent: 15 Nov 2011 15:34

Re: Clarification on IEHPROGM

2011-11-15 Thread Ted MacNEIL
I was in grade 1. My youngest sister was one month old to the day. As Canadians, it was sad but it didn't mean as much! - Ted MacNEIL eamacn...@yahoo.ca Twitter: @TedMacNEIL -Original Message- From: Rick Fochtman rfocht...@ync.net Sender: IBM Mainframe Discussion List

Re: Clarification on IEHPROGM

2011-11-15 Thread Leonard D Woren
Rick Fochtman wrote on 11/15/2011 12:17 PM: I, personally, can think of no good reason to ever use IEHPROGM in a z/OS environment; IDCAMS is the current vehicle for the kinds of changes that IEHPROGM once performed admirably well. Rick We must not have been using the same IEHPROGM. I don't

Re: Clarification on IEHPROGM

2011-11-15 Thread Vernooij, CP - SPLXM
Gee, I feel young for a moment! Around 1980 I learned about IEHPROGM, around 1960 I was learning about 1+1=2. If some of you were learning about IEHPROGM then, your beards must be longer and whiter than ZZ TOP's. I found them already looking old around 1980. Kees. Chris Mason

Re: STOW macro Location

2011-11-15 Thread Gerhard Postpischil
On 11/15/2011 9:24 PM, Paul Gilmartin wrote: Resource constraint, whether development schedule or REGION to accommodate the executable code is a plausible explanation. All of the OPEN code was in a type 4 SVC, with a 1K constraint on each transient. While OPEN had a lot of overlays, it didn't