Ron MacRae writes:
I've got a REXX exec that sets up an IPCS environment for z/OS levels
other than my current release With this REXX exec I can select a
version of IPCS modules/panels/ for every release of z/OS from 2.10
up to 1.13.
Bearing in mind that I do not speak for IBM, I'd like
In 1331312434.77887.yahoomailclas...@web125406.mail.ne1.yahoo.com,
on 03/09/2012
at 09:00 AM, Juan Mautalen jgmauta...@yahoo.com.ar said:
We currently have our VTAMLST libraries protected with UACC(READ).
IBM suggests UACC(NONE) for them
Why?
Human users are not my problem,
Why not? Anybody
In 4631765647494587.wa.ronmacraehotmail.co...@bama.ua.edu, on
03/09/2012
at 05:48 AM, Ron MacRae ronmac...@hotmail.co.uk said:
With this REXX exec I can select a version of IPCS
modules/panels/
You seem to be missing the ...
Q1) Any idea why TSOLIB ACTIVATE DDNAME(IPCSLIBS) appears to
In 0818533857960322.wa.paulgboulderaim@bama.ua.edu, on
03/09/2012
at 08:32 AM, Paul Gilmartin paulgboul...@aim.com said:
How would that affect the syntax or semantics of the DD PATH=
parameter?
A leading // would not be equivalent to a leading /.
--
Shmuel (Seymour J.) Metz,
On Fri, 9 Mar 2012 10:29:51 -0600, McKown, John wrote:
I'll admit that my mind is not running quite right today.
And how does that make today any different . ;-)
I remember a time (not so long ago) when we were assured technology would free
us from the shackles of our daytime desk.
Yeah,
Not at all a stupid idea, John. There are many shops that already do that
sort of thing and many ways to do it.
As an aside, there are some organizations that handle third shift support
from some part of the world where/when it's first shift. That can be done
within the company itself (typically
On Sat, 10 Mar 2012 16:49:48 +0800, Timothy Sipples wrote:
If you're running OS/390 V2R10's
IPCS, you haven't stopped running OS/390 on your machine. Which means you
wouldn't be eligible for sub-capacity licensing.
Say what ???. How does running a module constitute running OS/390 ?.
So IBM is
Chris,
When IBM suggests UACC(NONE) for a system dataset, this is usually an indicator
the dataset contains security control information that should be kept secret.
In this particular case, it may have to do with options such as the ability to
specify clear text passwords with PRTCT= on VTAM
I am surprised that no one has yet recommended the TAPEMAP program in file 299
(or 804 for the Jump-enhanced version) on the CBT site. This will give you
much, much more information or each file on a tape volume than a simple
IEBGENER of the first label file.
You will still have the problem
John, I did that with a software product I previously authored. The
Internet enabling product has an HTTP client interface that I used to
tweet as a demo. Calls can be made from the product's REXX interface so
you could tweet from batch jobsteps or use an API to make requests from
program code.
Juan
I have received a private communication in which it is pointed out that there
*is* a potential reason why you might not want all and sundry[1] to be able to
browse your VTAMLST partitioned data set.
In the spirit in which this note was sent, I will not divulge precisely what
the
Lizette
I can say that ..., TPX, ... might need READ access.
What evidence do you have that TPX actually needs to read members of the
VTAMLST partitioned data set? Are you obliged to provide the major node names,
that is, the actual member names? If not TPX - or any other program - would be
There's no point in addressing Mr Metz since he does not read my posts. So to
all interested polite subscribers
IBM suggests UACC(NONE) for them VTAMLST libraries
Why?
If Mr Metz did read my posts, he would know that the why is not provided in
Table 48, UACC values for system data sets in
Bob
Please see the post which adds to my initial post in this thread.
When IBM suggests UACC(NONE) for a system dataset, this is usually an
indicator the dataset contains security control information that should be
kept secret.
If you rely on the VTAMAPPL class for proper security, VTAMLST
OK, by now you see the potential problem. If you're running OS/390
V2R10's
IPCS, you haven't stopped running OS/390 on your machine. Which means
you
wouldn't be eligible for sub-capacity licensing.
That is of course not correct. IPCS (the dump viewing
program for z/OS) is distributed in
On 10 Mar 2012 00:51:45 -0800, in bit.listserv.ibm-main you wrote:
Ron MacRae writes:
I've got a REXX exec that sets up an IPCS environment for z/OS levels
other than my current release With this REXX exec I can select a
version of IPCS modules/panels/ for every release of z/OS from 2.10
Hi all.
Many thanks for your answers (At least the ones that were trying to help)
I am fully capable to develop and implement any solution I'll choose
So scott if you don't mind I'll keep my bucks (-: , just want'ed to sense
an interface direction from a few shops
If the owner of the service item did not tell you using dynamic LPA would
work, you should have no expectation that it will, and you should not do
it.
This applies to every piece of service regardless of product.
Peter Relson
z/OS Core Technology Design
Q2) Am I wasting my time here. Should the latest version of IPCS work
with all older dumps?
No, what you are trying to do is necessary. IPCS is not backwards
compatible.
Sure it is.
Not it isn't, if by backwards compatible in this case one means that
z/OS 1.13 IPCS can be relied upon to
I apologize in advance to Karl Schmitz if I have a bit of this
not quite exact.
Perhaps some Integrity Vulnerability examples will help clarify:
1)If your authorized program while executing in PSW key 0-7 stores
into an address provided by an unauthorized caller then this is a
violation of
Just ask IBM first, officially, that's all.
I did not post my (unofficial) thoughts as merely an academic, theoretical
exercise. In particular, I'm aware of one customer that grabbed Language
Environment from OS/390, ran it on z/OS, and... well, that wasn't (isn't)
free.
And yes, it's
In response to Chris Craddock's stricture about the disclosure of the
contents of fetch-protected storage Peter Relson wrote
begin extract
This is not necessarily a violation of the IBM statement of integrity.
It depends on whose data is being copied. I am allowed to put my own
non-sensitive
So far, I commend SHARE on its choice of venue. The Omni Hotel at CNN Center in
Atlanta is NICE! All SHARE guests get Select Guest privileges and the price is
one of the lowest in recent memory. Good job, SHARE!
--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El
Hi Ed,
It's sure to be a great SHARE too. I hear that folks can still register on site
for SHARE. www.share.org for the details.
Have fun,
Linda
Sent from my iPhone
On Mar 10, 2012, at 6:21 PM, Edward Jaffe edja...@phoenixsoftware.com wrote:
So far, I commend SHARE on its choice of venue.
Few years ago we were playing Miss. State at the Omni and went into
overtime.
Couple of minutes in, the tornado sirens started going off and it actually
trimmed the Omni. After a short delay, play resumed and the game was
completed. When the fans got to the parking lot...pretty nasty with
Dave Andrews responded to my post of 2012-03-02 relating the problems
of Microsoft cloud software with the comment Yes, but IBM should know
better
I agree that IBM should know better, but Microsoft should know better,
as well. I related previously a problem with Windows file timestamps
26 matches
Mail list logo