Hi,
When I try to rename a dataset using a Utility IEHPROGM and I get a error
message like :
Error :
SYSTEM SUPPORT UTILITIES
IEHPROGM
RENAME DSNAME=BETTY.JCL.PDS,
X00027015
NEWNAME=BETTY.JCL1.PDS,VOL=3390=KMCG03
00028017
IEH207I STATUS OF USERS REQUEST TO RENAME DATA
Jake anderson justmainfra...@gmail.com wrote in message
news:cahtvvrw503n-daal98sqzcritzj4bhyxu-hsgpfdmxgqhsj...@mail.gmail.com
...
Hi,
When I try to rename a dataset using a Utility IEHPROGM and I get a
error
message like :
Error :
SYSTEM SUPPORT UTILITIES
IEHPROGM
RENAME
Is the disk
SMS managed?
Yes - So is is it possible to take the existing name for renaming Purpose
using IEHPROGM ? But when I try renaming with a non-existent name then I am
able to do it whereas existing name produces this error message Password
protected.
If I do a recatalog of existing name
From: Uriel Carrasquilla uriel.carrasqui...@mail.mcgill.ca
Is the emergency request creating a situation where at least one of the LPARs
must be running HSM?
I don't think so. I'm not aware of any hsm parameter which would restart the
address space once it is
shutdown. As Dave already
You are trying to rename a 2011 data set with a 1980's utility.
You can do it with IDCAMS, this will take care of the data set on disk
and the catalog info.
//IDCAMS EXEC PGM=IDCAMS
//SYSPRINT DD SYSOUT=*
//SYSINDD *
I am trying RENAME for NON-VSAM, but I used your Given JCL to rename with
existing name itself but it conflicts with Duplicate name(Obviously) Since
the NEWNAME do already do exist.
But my clarification why IEHPROGM throws an error as Correct Password not
available whereas we have not protected
I am not sure what you are trying to achieve. You are trying impossible
things, but why?
SMS managed datasets must be cataloged, so you cannot rename/recatalog
it to a name that already exists.
IDCAMS can also rename non-VSAM datasets.
I am quite sure that the 'password' error is caused by the
Hi Listners,
We have go a customer number in applications and this number is currently part
of a primary key, we have a requirement to encrypt this number and also should
not be used in the tables directly , which means this can not be part of a
primary key. pls share your thoughts on the
I am quite sure that the 'password' error is caused by the fact that the
data set is SMS managed.
Was just curious to know why this password error Pops up for the SMS
managed Dataset whereas we have not protected the dataset with Password.
On Tue, Nov 15, 2011 at 3:16 PM, Vernooij, CP - SPLXM
To Binyamin Dissen and Shmuel Metz:
Ok, I must be confusing (having too much decaying braincells :D ) STOW with
something else which can destroy a PDS / PDSE directory if used incorrectly.
Please educate and correct me what that thing was which was discussed on
IBM-MAIN. I remember that if you
Jake anderson wrote:
I am quite sure that the 'password' error is caused by the fact that the
data set is SMS managed.
Was just curious to know why this password error Pops up for the SMS managed
Dataset whereas we have not protected the dataset with Password.
Perhaps WAD. Rename is only
Hi Peter,
Have you seen the VSAM Demystified definition for SMBHWT?
SMBHWT: Used to allocate hiperspace buffers based on a multiple of the
number of address space virtual buffers that have been allocated. It can be
an
integer from 0 to 99. The value specified is not a direct multiple of the
Ron,
There are a couple of things you can do.
- expand the vsam or database and create a new key that will be
assigned to everyone
- use your favorite encryption method via ICSF to encrypt the card number
- centralize the method for encrypting and decrypting the data and
place controls around it
On Tue, 15 Nov 2011 16:24:25 +0530, Jake anderson wrote:
I am quite sure that the 'password' error is caused by the fact that the
data set is SMS managed.
Was just curious to know why this password error Pops up for the SMS
managed Dataset whereas we have not protected the dataset with Password.
On Tue, 15 Nov 2011 06:56:44 -0600, Tom Marchant wrote:
As has been mentioned by others, you can not use IEHPROGM to
rename an SMS-managed data set because every SMS-managed
data set must be cataloged.
When renaming SMS-managed data sets, IEHPROGM will uncatalog the data set and
recatalog
On Tue, 15 Nov 2011 07:50:49 -0600, Norbert Friemel wrote:
On Tue, 15 Nov 2011 06:56:44 -0600, Tom Marchant wrote:
you can not use IEHPROGM to
rename an SMS-managed data set
When renaming SMS-managed data sets, IEHPROGM will uncatalog
the data set and recatalog the data set under the new
On Tue, 15 Nov 2011 04:56:39 -0600, Elardus Engelbrecht wrote:
Ok, I must be confusing (having too much decaying braincells :D ) STOW with
something else which can destroy a PDS / PDSE directory if used incorrectly.
It used to be easy enough with IEBGENER. This may have changed lately,
or may
pHi.brI could see my future fading fast this got me back on my feet in no
time now nobody would dare disrespect me this is just between usbra
href=http://4-hobbs.woelmuis.nl/profile/59JohnBennett/;http://4-hobbs.woelmuis.nl/profile/59JohnBennett//abrgoodbye/p
Tumbleweed Secure Messager messed up my post. Trying again.
We have go a customer number in applications and this number is currently part
of a primary key, we have a requirement to encrypt this number and also
should not be used in the tables directly , which means this can not be part
of a
You have received a secure message from Roberts, John J entitled, RE: Data
encrypt.
You may view the message (before 12/15/2011) at the following web address:
https://dhstw2.dhs.state.ia.us/messenger/msg?x=d-801006-VUpGvX5q
In
6004cdb6eec26047b614a88242ebed4f05a73...@tor-msg-01.cgiclients.com,
on 11/14/2011
at 02:33 PM, Jakubek, Jan jan.jaku...@cgi.com said:
A Standalone Dump would likely have a message record/log
Master trace table.
A solution would likely have be external to z/OS via either 3270
emulator (our
In 1009418597484101.wa.elardus.engelbrechtsita.co...@bama.ua.edu, on
11/15/2011
at 04:56 AM, Elardus Engelbrecht elardus.engelbre...@sita.co.za
said:
Ok, I must be confusing (having too much decaying braincells :D )
STOW with something else which can destroy a PDS / PDSE directory if
used
In
cahtvvrwjiv8qvb2hcr159ayus+ycyce8o58gjkwrvfnatyu...@mail.gmail.com,
on 11/15/2011
at 03:00 PM, Jake anderson justmainfra...@gmail.com said:
But my clarification why IEHPROGM throws an error as Correct
Password not available whereas we have not protected the Dataset
with Password ?
Because
I don't think so. I'm not aware of any hsm parameter which would restart the
address space once it is
shutdown. As Dave already mentioned, ask your automation folks. It is possible
your automation product
triggers ARC0002I on the main LPAR, of hsm is defined under ARM
We are taking a closer
In 7i53c7thv9cglid3773mjl4k778pvp3...@4ax.com, on 11/15/2011
at 12:30 AM, Binyamin Dissen bdis...@dissensoftware.com said:
Incorrect.
Closer than your answer.
The mapping macro has a parameter to indicate whether the BLDL or
directory format is desired.
Not for PDSE.
--
Shmuel
On 11/15/2011 7:39 AM, Roberts, John J wrote:
You have received a secure message from Roberts, John J entitled, RE: Data
encrypt.
You may view the message (before 12/15/2011) at the following web address:
https://dhstw2.dhs.state.ia.us/messenger/msg?x=d-801006-VUpGvX5q
I can't remember the last time I used IEHPROGM.
So I wonder - Is there any function of IEHPROGM that is not duplicated in some
more modern utility? Is the only reason for its continued existence for
compatibility with old legacy JCL? Or just in case somebody is nostalgic for
CVOL catalogs?
The cryptogram (encrypted customer number) should be unique and therefore
usable as a file key as well as any other context.
By simply changing the content of the field from customer number to encrypted
customer number, the effect ripples throughout all of the resident files as
well as
Roberts, John J jrobe...@dhs.state.ia.us wrote in message
news:93891f43642f3c419a7d75acc2b1db6f3c0a525...@exchangemb2.dhs.state.i
a.us...
I can't remember the last time I used IEHPROGM.
So I wonder - Is there any function of IEHPROGM that is not duplicated
in some more modern utility? Is the
Kees
... with a 1980's utility.
I think you mean *1960's*.
But then they say, do they not?, that if you can remember the 1960's, you
weren't there!
Chris Mason
On Tue, 15 Nov 2011 10:13:41 +0100, Vernooij, CP - SPLXM
kees.verno...@klm.com wrote:
You are trying to rename a 2011 data set
Never mind. The manual says it is covered:
If you are renaming a member of a non-VSAM partitioned data set, the
entryname must be given as: pdsname(membername)
Bob
CONFIDENTIALITY STATEMENT: The foregoing message (including attachments) is
covered by the Electronic Communication Privacy Act,
We still use it to batch rename members in a PDS. Is that covered by the IDCAMS
functions?
Bob Herring
Texas Farm Bureau Insurance Companies
Waco, TX
CONFIDENTIALITY STATEMENT: The foregoing message (including attachments) is
covered by the Electronic Communication Privacy Act, 18 U.S.C.
On Tue, 15 Nov 2011 09:08:25 -0500, Shmuel Metz (Seymour J.) wrote:
In 1009418597484101.wa.elardus.engelbrechtsita.co...@bama.ua.edu, on
11/15/2011 at 04:56 AM, Elardus Engelbrecht said:
Ok, I must be confusing (having too much decaying braincells :D )
STOW with something else which can destroy
The customer number we are currently having the ssn as its identifier, we need
to make sure this has to encrypted . Let me know what process we need to
follow over here?
--
For IBM-MAIN subscribe / signoff / archive access
We have used IEHPROGM to SCRATCH(delete) members in rare cases where other
utilities fail. Also, used for rare case of uncatlg for a bad file name - ex:
UNCATLG DSNAME=XXX.CBSYYY2.AB.AUDIT.HISTORY .G0005V00 NSCR
David L. Mingee
Principal Systems Administrator
Indianapolis Production
How so?
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Timothy Sipples
Sent: Saturday, November 12, 2011 1:41 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: ZNALC Option for LICENSE Parameter
Walter Marguccio writes:
under zNALC you
For the cryptogram to be created, is there some specfic alogithm that need to
be followed?
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
On Tue, 15 Nov 2011 16:04:49 +, Mingee, David wrote:
We have used IEHPROGM to SCRATCH(delete) members in rare cases where other
utilities fail. Also, used for rare case of uncatlg for a bad file name - ex:
UNCATLG DSNAME=XXX.CBSYYY2.AB.AUDIT.HISTORY .G0005V00 NSCR
I understand
As it has been mentioned before, sometimes resolutions don't get posted.
Thanks to Frank Bonaduce, Norbert Friemel, Jonathan Goossen and Chip Grantham
for all of their help (and everyone else as well). It was indeed the IGXMSGEX
exit, which drives the request sent to the tape drive display.
The customer number we are currently having the ssn as its identifier, we need
to make sure this has to encrypted
OK, so the real requirement is to stop using SSN as the primary customer ID,
but still keep SSN around since customers won't know the unique ID your
organization has assigned to
From: Uriel Carrasquilla uriel.carrasqui...@mail.mcgill.ca
When we shutdown HSM in all of our LPARs without setting them in the
EMERGENCY mode, we never had any problems with HSM re-starting.
Under chapter 14 DFSMShsm Libraries and Procedure
of the DFSMShsm Implementation and Cust. Guide.
Many seem to think that encryption is easy to do. It is hard, very expensive,
and carries a risk of irrevocable loss of data. I would think that management
should select a team to plan the implementation.
An early step in the planning process is to select the encryption algorithm to
be
Maybe this article is of interest to you:
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1070001/
This is a publication of the Federal National Institutes for Health.
John
--
For IBM-MAIN subscribe / signoff / archive access
Yifat,
Yes, I did see that description in VSAM Demystified, but it still does not make
a lot of sense to me. What kind of weighting factor? How many buffers go to
hiperspace when SMBHWT=10 or 30 or 80? There is no clue in any of the
documentation I have seen so far, and no way for an
Hal Merritt wrote:
Many seem to think that encryption is easy to do. It is hard, very expensive,
and carries a risk of irrevocable loss of data. I would think that management
should select a team to plan the implementation.
An early step in the planning process is to select the encryption
Hal Merritt wrote
| You may even be able to use the cryptogram in many reports/displays as the
| cryptogram may be sufficient for the business need.
and he could have made this point even more strongly.
There are now many situations in which the cryptogram is not just
usable but better: It
It was a pretty wide question to start with... and included little
detail. The devil is in the details for encryption and how it
ripples through. Isolated is relatively easy. Complicated systems
are complicated. VBG
Depending on the size of your organization.. it may take a very real
amount of
On 11/15/2011 10:35 AM, Ron Thomas wrote:
The customer number we are currently having the ssn as its
identifier, we need to make sure this has to encrypted . Let
me know what process we need to follow over here?
While I'm not a lawyer, I was under the impression that using an
SSN for
On 11/15/2011 5:56 AM, Elardus Engelbrecht wrote:
To Binyamin Dissen and Shmuel Metz:
Ok, I must be confusing (having too much decaying braincells
:D ) STOW with something else which can destroy a PDS / PDSE
directory if used incorrectly.
Or perhaps you were thinking of STOW ,,,I ?
Re your
Have a look at RESTART keyword in your procedure.
I took a look at the HSM PROC and EMERG=NO but no signs of RESTART.
I also checked out SYS.PARMLIB(ARCCMDSx) and could not find any traces of a
RESTART keyword.
When I look at the LOG, I can see that OPS/MVS is involved and might be the
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On
Behalf Of Hal Merritt
Sent: Tuesday, November 15, 2011 11:55 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Data encrypt
Snipped
The key management issues include how to change the key, and how to
If you want something similar to clear key performance, use the
protected key security option. Keys are secure and cpacf is used for
decrypt processing. While not quite as fast as clear key.. it is only
a little slower... and more secure. And still way faster than crypto
operations in CEX2 or
On Tue, Nov 15, 2011 at 1:37 PM, Gerhard Postpischil gerh...@valley.net wrote:
While I'm not a lawyer, I was under the impression that using an SSN for
anything other than Social Security and Internal Revenue Service was
illegal. Even if your use is sanctioned, you need to consider that an SSN
I can think of two simple methods to not store the number without a
encryption call.
1. Re-arrange the digits. I. E. 123456789 move 1 byte at a time to
369258147 or as you desire.
2. Add a specific number to the digits of the key. 123456789 +
012345678 = 135802467
Pi or 'e' (natural number) or
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On
Behalf Of Rob Schramm
Sent: Tuesday, November 15, 2011 2:18 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Data encrypt
If you want something similar to clear key performance, use the
protected key
Linda Mooney, please forgive me. Linda was also a lot of help for me on this.
Steve
On Tue, 15 Nov 2011 10:34:39 -0600, Steve Dover steve.do...@ccbcc.com wrote:
As it has been mentioned before, sometimes resolutions don't get posted.
Thanks to Frank Bonaduce, Norbert Friemel, Jonathan Goossen
Hello,
is there anyone that can give me help on how to set a naviquest set of
cmds to run in batch to perform the following tasks:
SG ALTER where I need to change the connection to the lpars from
disnew to enable and then validate and activate sms configuration.
Can you pls give me an help ?
Many
-snip--
I am trying RENAME for NON-VSAM, but I used your Given JCL to rename
with existing name itself but it conflicts with Duplicate
name(Obviously) Since the NEWNAME do already do exist.
But my clarification why
-snip--
We still use it to batch rename members in a PDS. Is that covered by the IDCAMS
functions?
---unsnip---
IDCAMS can rename members as
There are panels with Batch Samples under ISMF:
Item #1. SG ALTER where I need to change the connection to the lpars from
disnew to enable
ISMF - Enhanced ACS Management - Batch Testing/Configuration
Management - Configuration Changes Batch Samples -
Define/Alter Pool type Storage
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Farley, Peter x23353
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Rob Schramm
If you want something similar to clear key performance, use the
protected key security option.
My Social Security card, which I obtained ca. 1959, states the following: For
Social Security purposes. Not for identification.
Perhaps that warning was referring to the card itself rather than to the
nine-digit number on it.
Bill Fairchild
-Original Message-
From: IBM Mainframe
My Social Security card, which I obtained ca. 1959, states the following:
For Social Security purposes. Not for identification.
That language was removed in 1972, after it had become clear that the SSN was
now a defacto national ID number.
John
Hi Steve,
Not to worry, and thanks, especially for posting what worked for you.
Thanks,
Linda
- Original Message -
From: Steve Dover steve.do...@ccbcc.com
To: IBM-MAIN@bama.ua.edu
Sent: Tuesday, November 15, 2011 12:01:12 PM
Subject: Re: Bustech Virtual Tape Appliance
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On
Behalf Of Chase, John
Sent: Tuesday, November 15, 2011 3:43 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Data encrypt
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of
The only use I have for IEHPROGM is to delete the temporary datasets which
remain on the PUBLIC and STORAGE volumes for various reasons. That function
still works quite well.
I believe the OPs original questions was why it returned a message indicating a
security problem, I.E. incorrect
I have a SYNCSORT job that splits a large input file into many other
specific files.
If any of the files ends up with no records written to it is it
possible, within the SORT statements, to write out a single record with
a message? For example NO RECORDS FOR THIS FILE when this condition is
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On
Behalf Of Matthew Stitt
Sent: Tuesday, November 15, 2011 1:07 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Clarification on IEHPROGM
The only use I have for IEHPROGM is to delete the temporary
I am still new to Naviquest, so I spent some time in the Naviquest manual.
To add to what Darth said:
The manual specifically states to use the SETSMS command after the
translate and validate. According to the manual, Naviquest is designed
only for testing. Activating moves it into use.
Thank
---snip
Ok, I must be confusing (having too much decaying braincells :D ) STOW with
something else which can destroy a PDS / PDSE directory if used incorrectly.
Please educate and correct me what that thing was which was
On 15 November 2011 16:03, John Roberts jrobe...@dhs.state.ia.us wrote:
My Social Security card, which I obtained ca. 1959, states the following:
For Social Security purposes. Not for identification.
That language was removed in 1972, after it had become clear that the SSN was
now a defacto
Humm ... I got mine in 87 when I moved to the US. Much before I even got my
SSN, the
INS and SSA drummed it into my head that I was 'not supposed' to reveal my
SSN to anybody
else.
Then I find . that I could be asked for my SSN if I so much (a bit of an
exaggeration)
as wanted to buy a loaf
Rick,
One thing we learned early with MVS that IDCAMS ms required exclusive control
of the dataset. We got around that with the use of file(dd1) on the IDCAMS
statement and including the DD statement (//DD1 DD DSN..,display shr
Ed
---snip---
I think you mean *1960's*.
But then they say, do they not?, that if you can remember the 1960's, you
weren't there!
--unsnip---
Not true. I
STOW does not ever operate by hosing the directory. It assumes the directory
exists and is valid. It finds the proper place in the directory for the member
being STOWED and manipulates the directory as per the STOW parameters (add,
delete, etc.). If the directory has already been hosed
One small point if I may ... and perhaps this has been stated and if so, my
apologies ..
STOW (if used generally) will ONLY 'UPDATE' the directory and then too, only
if the DS has
been OPENed OUTPUT, OUTIN or UPDAT...
Kind Regards
Jim Thomas
617-233-4130 (mobile)
636-294-1014
On Wed, 16 Nov 2011 00:38:34 + Bill Fairchild wrote:
Perhaps IBM reasoned that if a user really, really,
seriously wants to do something this strange, they should let him.
Your gun, your foot ...
Maybe users in bygone times were made of sterner stuff and prepared to
take responsibility for
On 11/15/2011 7:38 PM, Bill Fairchild wrote:
I think the real culprit is the lack of user-friendliness in
whatever OPEN executor module is blindly following the user's
request to overwrite an entire file without checking for
certain file types for which overwriting the whole file might
not be
Shane's point is an important one.
In a private email to Bill earlier this evening I confessed that I had
(more than once) opened a PDS as a sequential data set using BSAM in
order to read a (mangled) directory.
On the occasion I remember best I got the information I needed without
[further]
On 11/15/2011 8:41 PM, Shane wrote:
Maybe users in bygone times were made of sterner stuff and prepared to
take responsibility for their own actions.
Not necessarily - we operated in a completely different
environment. There were so few manuals that it was possible to
read all of them, as
On Tue, 15 Nov 2011 20:51:25 -0500, Gerhard Postpischil wrote:
On 11/15/2011 7:38 PM, Bill Fairchild wrote:
I think the real culprit is the lack of user-friendliness in
whatever OPEN executor module is blindly following the user's
request to overwrite an entire file without checking for
In
ce3ffbb7e42033469ef752a1d8a19ba1eef...@kl1221tc.cs.ad.klmcorp.net,
on 11/15/2011
at 04:43 PM, Vernooij, CP - SPLXM kees.verno...@klm.com said:
You need a nostalgic old MVS to even have CVOLs.
No, OS/360, OS/VS1 and SVS will do as well.
--
Shmuel (Seymour J.) Metz, SysProg and JOAT
In 1149164858762620.wa.paulgboulderaim@bama.ua.edu, on
11/15/2011
at 09:39 AM, Paul Gilmartin paulgboul...@aim.com said:
Indirectly.
Right answer to wrong question.
Rexx (even in batch, under IKJEFT*) can invoke ISPF to
use ISPF services.
You're still talking about ISPF services, not
In 2016114137.2cca11dd@xpfs, on 11/16/2011
at 11:41 AM, Shane ibm-m...@tpg.com.au said:
Maybe IBM never put any thought into it at all.
That would certain account for absolute track 0 not available when
you forgot a SPACE keyword for a new data set.
--
Shmuel (Seymour J.) Metz,
In
CAPD5F5qvUFtSVX3WoWvHNmTfPObydZuusnbx+MV0mAWS=fq...@mail.gmail.com,
on 11/15/2011
at 09:01 PM, John Gilmore johnwgilmore0...@gmail.com said:
Would I discourage a novice from doing this sort of thing? Yes, but
Do what I say, not what I do is not always unreasonable, although
it is of course
Peter,
No, I am not talking about that...
The issue is that CPACF clear key is tremendously faster than Secure
Key. Secure key is the process where the DEK or Operational Key is
encrypted under the Master Key but the process is 2 - 3 millisecond
for TDES to encrypt or decrypt a card number.
--Original Message--
From: Rick Fochtman
Sender: IBM Mainframe Discussion List
To: IBM Mainframe Discussion List
ReplyTo: IBM Mainframe Discussion List
Subject: Re: Clarification on IEHPROGM
Sent: 15 Nov 2011 15:34
I was in grade 1. My youngest sister was one month old to the day. As
Canadians, it was sad but it didn't mean as much!
-
Ted MacNEIL
eamacn...@yahoo.ca
Twitter: @TedMacNEIL
-Original Message-
From: Rick Fochtman rfocht...@ync.net
Sender: IBM Mainframe Discussion List
Rick Fochtman wrote on 11/15/2011 12:17 PM:
I, personally, can think of no good reason to ever use IEHPROGM in a
z/OS environment; IDCAMS is the current vehicle for the kinds of
changes that IEHPROGM once performed admirably well.
Rick
We must not have been using the same IEHPROGM. I don't
Gee, I feel young for a moment! Around 1980 I learned about IEHPROGM,
around 1960 I was learning about 1+1=2. If some of you were learning
about IEHPROGM then, your beards must be longer and whiter than ZZ
TOP's. I found them already looking old around 1980.
Kees.
Chris Mason
On 11/15/2011 9:24 PM, Paul Gilmartin wrote:
Resource constraint, whether development schedule or REGION
to accommodate the executable code is a plausible explanation.
All of the OPEN code was in a type 4 SVC, with a 1K constraint
on each transient. While OPEN had a lot of overlays, it didn't
91 matches
Mail list logo