When Bill says...
You are correct. I was assuming that nobody had (and
the original poster had NOT) done anything really
inappropriate. For any CISIZE past 16KB you get into
diminishing returns on a 3390, capacity-wise. There
is almost never any good reason to specify a CISIZE
for a LINEAR
IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU wrote on 04/17/2008
01:05:29 AM:
thanks for fixing the time stamp!
The thanks for that one should go to Ralph Sharpe.
I looked at RMF M3, at the storage statistics, in particular the
working set size:
18:36:30 234
18:37:00 19097
O'Brien, David W. (NIH/CIT) [C] wrote:
And when was the last time you used non-3390 geometry?
The device independence was important back in the early days of VSAM, circa 1975 when you had 3330s, 3350, 3340s on the floor, which were then followed by 3380s and 3390s.
Assuming that 3390
William H. Blair wrote:
Arthur T. wrote
You don't mention the CI size.
He does not need to. Gilbert Cardenas wrote:
LINEAR -
which means that it will have a CISIZE of 4 KB (4096).
There are exactly 180 4K blocks (CIs) in each 3390 CYL.
All LINEAR cluster space
Hi all,
Is there any way that can keep track the usage of IND$FILE, if the user
rename the IND$FILE to ther own location and call it with TN3270, how can we
check this case.
regards
--
For IBM-MAIN subscribe / signoff / archive
The thanks for that one should go to Ralph Sharpe.
Thanks Ralph! :-)
There isn't much you can do other than spend real money to buy
more real storage to avoid paging, and spend real money to buy
to fastest DASD boxes and attach them to the fastest channels
(if you aren't already doing that).
I
To respond to your various questions/points:
Walt, I am searching backwards, that is, I begin at the end of the command
buffer minus the length of my search argument and work backwards. I know
this works through using various WTOs and forcing the thing to abend to take
a look at the content of
System z figured prominently in IBM's 1Q2008 earnings presentation. You
can find that presentation here:
http://www.ibm.com/investor/1q08/index.phtml
Specifically, System z hardware revenues in Q1 increased 10% globally
year-over-year and was the star hardware performer. The United States
On Thu, 17 Apr 2008 15:00:29 +0800 Tommy Tsui [EMAIL PROTECTED] wrote:
:Is there any way that can keep track the usage of IND$FILE, if the user
:rename the IND$FILE to ther own location and call it with TN3270, how can we
:check this case.
WHy do you want to do this? What is your business case?
On Thu, 17 Apr 2008 02:32:05 -0500 Paul Whelan [EMAIL PROTECTED] wrote:
:To respond to your various questions/points:
:Walt, I am searching backwards, that is, I begin at the end of the command
:buffer minus the length of my search argument and work backwards. I know
:this works through using
Ok, for what it's worth it makes me feel a little better.
Like I said before, better to understand first instead of just copying.
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL
We have a program which writes a report to a DD name which produces a single
sysout dataset. We need to produce 2 copies of this report going to 2
different sysout classes. Can this be achieved without rewriting the
program.
Jim McAlpine
Sure. Code 2 OUTPUT statements, each specifying CLASS, DEST, and what
else you need, then refer to the two statements from the SYSOUT DD.
Note that you need to specify SYSOUT=(,) so that the CLASS from
the OUTPUT statements will be used.
//STEP EXEC
//C1 OUTPUT CLASS=A,DEST=destA,
(Fortunately) doesn't appear to happen very often from this list.
My ISP tagged it as a possible and would have blocked it if I had the
highest protection selected.
Might have to if this harvesting becomes more common ...
Not blaming Darren or BAMA - just quietly venting.
Shane ...
Shane wrote:
(Fortunately) doesn't appear to happen very often from this list.
My ISP tagged it as a possible and would have blocked it if I had the
highest protection selected.
Might have to if this harvesting becomes more common ...
Not blaming Darren or BAMA - just quietly venting.
Shane
On Thu, 17 Apr 2008 02:32:05 -0500, Paul Whelan wrote:
The (in)famous CLC 0(R9,R8),FILTER 'filter('found?
was actually based on one of the IRREVX01 samples included in
SYS1.SAMPLIB(RACEXITS):
LAR7,L'USERKEY
CLC 0(R7,R5),USERKEY
with USERKEY defined as:
USERKEY DCC'USER('
On Thu, 17 Apr 2008 07:05:29 +0200, Barbara Nitz wrote:
That lpar has 8704M real with the local page ds's normally at 10%.
You didn't mention how many local page data sets you have. Perhaps more
locals, spread across more devices and channels would help.
--
Tom Marchant
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Paul Whelan
[ snip ]
The (in)famous CLC 0(R9,R8),FILTER'filter('found?
was actually based on one of the IRREVX01 samples included in
SYS1.SAMPLIB(RACEXITS):
LAR7,L'USERKEY
CLC
Sorry Steve - I figured every had copped it (or will). Someone touting a
mainframe blog - using a gmail account mailed directly, not via BAMA
according to the headers.
Like I said, just venting ... ;-)
Shane ...
I also received the canned pre-processed ham-like product. Pretty clear it
-Original Message-
From: IBM Mainframe Discussion List
[mailto:[EMAIL PROTECTED] On Behalf Of Shane
Sent: Thursday, April 17, 2008 7:01 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Spammed
On Thu, 2008-04-17 at 05:51 -0600, Steve Comstock wrote:
What are you referring to? Your
I filter them into the spam bucket and empty the bucket on occasion.
Daniel McLaughlin
Z-Series Systems Programmer
Information Communications Technology
Crawford Company
4680 N. Royal Atlanta
Tucker GA 30084
phone: 770-621-3256
fax: 770-621-3237
email: [EMAIL PROTECTED]
web:
-Original Message-
From: IBM Mainframe Discussion List
[mailto:[EMAIL PROTECTED] On Behalf Of Chase, John
Sent: Thursday, April 17, 2008 7:35 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: IRREVX01 strangeness
-Original Message-
From: IBM Mainframe Discussion List On
John:
I agree, but if r7 equates to 7 so as long as the first 7 bytes of the user key
are equal it will work.
Bill
Date: Thu, 17 Apr 2008 08:05:26 -0500 From: [EMAIL PROTECTED] Subject: Re:
IRREVX01 strangeness To: IBM-MAIN@BAMA.UA.EDU -Original
Message- From: IBM Mainframe
On Thu, 2008-04-17 at 08:39 -0400, Pinnacle wrote:
I also received the canned pre-processed ham-like product. Pretty clear it
came from culling IBM-Main. Our best response would be to snub said blog.
Also pinching threads from here without attribution by the looks of it.
Wordpress ... 'nuff
Tim,
I think you also left out ULC pricing. ULC is a lot simplier to administer
than
VWLC and depending on your environment, can deliver far greater savings and
high LPAR utilizations.
http://www-03.ibm.com/servers/eserver/zseries/swprice/other.html
Bill
---snip
dinosaurs and chickens can coexist and each has a role to play.
We differ as to what those roles are.
I don't word process in Script
That's unfortunate, because I find it to be more user friendly than, e.g.,
m$ word.
--snip-
(If it were only that easy to deprive that specific city of its largest employer!
That would be worth losing a few winks pondering.)
---unsnip---
Tactrical nuke? Or just the world's largest degausser?
-snip
The (in)famous CLC 0(R9,R8),FILTER 'filter('found?
was actually based on one of the IRREVX01 samples included in
SYS1.SAMPLIB(RACEXITS):
LAR7,L'USERKEY
CLC 0(R7,R5),USERKEY
with USERKEY defined as:
USERKEY DCC'USER('
On Thu, 17 Apr 2008 08:05:26 -0500, McKown, John wrote:
... Of course, since
R7 is a self-defining term, the code assembles just fine
self-defining term? No, there is an EQU in the code.
--
Tom Marchant
--
For IBM-MAIN
Doesn't Ghostscript have a txt2pdf program?
/Tom Kern
On Wed, 16 Apr 2008 17:12:39 -0400, Tony Harminc [EMAIL PROTECTED] wrote:
2008/4/16 David Boyes [EMAIL PROTECTED]:
It'd still be nice to have something on Linux that understands 1403
listings, though.
lpd...?
Tony H.
I agree, but if r7 equates to 7 so as long as the first 7 bytes of the user
key are equal it will work.
No, it's comparing for the keyword text USER( which is only 5 bytes long.
Depending on what follows that text in the program, it could work FSVO work.
Date: Thu, 17 Apr 2008
[EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]
...
I moved some users high level nodes from a mastercat to a usercat.
All worked with one exception
This user can sign on, but when she lists her datasets under 3.4, all
that displays is the alias. No datasets appear aside from the
Did you define an ALIAS for the HLQ's you moved?
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf
Of Vernooy, C.P. - SPLXM
Sent: Thursday, April 17, 2008 9:44 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Torn Between Two Catalogs
[EMAIL PROTECTED]
The next meeting of Hillgang (the Washington DC area VM users group)
will be held on April 24 at CA in Herndon VA.
The meeting will feature Mike Cowlishaw, IBM Fellow and creator of REXX,
as well as technical updates on some new research, and the usual QA
free-for-all with VM and Linux
because our audit want to check the unauthorized user (outsource
programmer) download the source program from our shop.
On 4/17/08, Binyamin Dissen [EMAIL PROTECTED] wrote:
On Thu, 17 Apr 2008 15:00:29 +0800 Tommy Tsui [EMAIL PROTECTED] wrote:
:Is there any way that can keep track the usage
Original Message
Subject:Re: Mainframe Tech blog
Date: Thu, 17 Apr 2008 07:04:33 -0700
From: Edward Jaffe [EMAIL PROTECTED]
Organization: Phoenix Software International, Inc.
To: Vivin bob [EMAIL PROTECTED]
References: [EMAIL PROTECTED]
Bob,
Thank you
Hi all,
I have a software that states it requires SMP/E V3R1 if the installation media
is CDROM,my question is what's the assoicated OS level? Is it OS/390 V2R10?
Is fllowing guess true?
SMPLIST OUTPUTSMP/E version OS level
27.xx-? OS/390 V2R7
On Thu, 17 Apr 2008 22:07:11 +0800 Tommy Tsui [EMAIL PROTECTED] wrote:
:because our audit want to check the unauthorized user (outsource
:programmer) download the source program from our shop.
How will this prevent screen scraping?
There are other ways to download upload.
:On 4/17/08,
-Original Message-
From: IBM Mainframe Discussion List
[mailto:[EMAIL PROTECTED] On Behalf Of Tommy Tsui
Sent: Thursday, April 17, 2008 9:07 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: how to audit the usage of IND$FILE
because our audit want to check the unauthorized user
Tommy,
Why don't you put AUDIT on the source file and see who touches it for READ?
IIRC, IND$FILE might be possible to track if you had a product like MXG or
SOFTAUDT or MICS and the access was to the mainframe. Is there a specific way
they are invoking IND$FILE? From a PC or from the
Is IBMLINK down again? We are having trouble getting on.
Thanks.
John Eatherly
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Vernooy, C.P. - SPLXM
[EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]
roups.com
...
I moved some users high level nodes from a mastercat to a usercat.
All worked with one exception
This user can
On Thu, 17 Apr 2008 22:12:09 +0800, victor zhang wrote:
Hi all,
I have a software that states it requires SMP/E V3R1 if the installation media
is CDROM,my question is what's the assoicated OS level? Is it OS/390 V2R10?
Is it possible the vendor intended SMP/E V3R1 _or_greater_?
Is fllowing
Skip wrote:
I have heard that the FICON Express4 4-port adapters which operate at
4Gbps speeds become slower/degraded with each channel added to the
card. That if I fill the 4 ports I may be as slow as 1/4 the rated
speed. Has anyone else heard or read about this? Is it true?
I asked our
As someone else already pointed out, although cumbersome, you can
always cutpaste what you see on your 3270 screen.
Don't grant people access to data they don't need.
Don't grant people access to the system if you don't trust them.
Of what value is an audit record that says the data has been
I'm trying to find docs comparing the performance on a z9 of none vs
software vs hardware support for encryption of Tn3270 connections.
I've seen quite a bit of performance doc about functions that get
offloaded to crypto coprocessors, but that is a trivial amount of
work for long lasting
Is it possible that the alias is defined to a catalog other than your
target catalog?
Terry Traylor
charlesSCHWAB
TIS Mainframe Storage Management
Remedy Queue: tis-hs-mstg
(602) 977-5154
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of
How did you move the datasets from the master to the user catalog? Did
you use REPRO MERGECAT? Did you do the REPRO prior to defining the
alias?
Can you provide us the LISTCAT commands and corresponding output for
both the alias and one of the datasets it covers?
Does the same problem occur if
Peter
I'm getting exactly the same response trying to use Lookat!
Excepting myself for reasons of modesty you are very probably in excellent
company and IBM is very likely the subject of unhappy soto voce expressions
today!
Chris Mason
Is there any way that can keep track the usage of IND$FILE, if the user rename
the IND$FILE to ther own location and call it with TN3270, how can we
check this case.
Why do you want to audit it?
There are many ways to transfer files around besides that method.
-
Too busy driving to stop for
Hello all,
Does anyone out there still run Arthur Anderson Programmer Workbench
and/or Oracle SQLforms? And if so, will they run under CICS TS 3.1?
Any information would be greatly appreciated...and would appease
management!
Thanks for your time...
Bret Hoesly
Telephone Data Systems, Inc.
-Original Message-
From: IBM Mainframe Discussion List
[mailto:[EMAIL PROTECTED] On Behalf Of Ted MacNEIL
Sent: Thursday, April 17, 2008 1:54 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: how to audit the usage of IND$FILE
Is there any way that can keep track the usage of IND$FILE,
On Thu, 17 Apr 2008 22:12:09 +0800, victor zhang
[EMAIL PROTECTED] wrote:
Hi all,
I have a software that states it requires SMP/E V3R1 if the installation
media is CDROM,my question is what's the assoicated OS level? Is it OS/390
V2R10?
Is fllowing guess true?
SMPLIST OUTPUTSMP/E version
Mark Zelden wrote:
On Tue, 15 Apr 2008 18:12:56 -0700, Edward Jaffe
[EMAIL PROTECTED] wrote:
Sheesh! I've never understood what some sysprog's think is so secret
about the contents of parmlib. IMHO, UACC(NONE) for parmlib is more
draconian paranoia than anything else. But, that's a
On Thu, 17 Apr 2008 12:48:55 -0500 McKown, John
[EMAIL PROTECTED] wrote:
:This is a real puzzler to me. I did an OPEN on a dynamically allocated
:SYSOUT. The DYNALLOC must have worked because I didn't get any error
:messages from my program and I see the allocation to SYS1. The OPEN
:has
On Thu, Apr 17, 2008 at 10:19 AM, Binyamin Dissen
[EMAIL PROTECTED] wrote:
On Thu, 17 Apr 2008 22:07:11 +0800 Tommy Tsui [EMAIL PROTECTED] wrote:
:because our audit want to check the unauthorized user (outsource
:programmer) download the source program from our shop.
How will this prevent
Oops... Sorry for the blank reply...
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Vernooy, C.P. - SPLXM
[EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]
roups.com
...
I moved some users high level nodes from a mastercat to a usercat.
Bret,
We use AACo's ISPF/CICS Programmer's Workbench, but we are still
on CTS 2.3. If your CICS loadlibs contain OS/VS modules they need to be
upgraded.
EdP
Hoesly, Bret [EMAIL PROTECTED]
Sent by: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
Hello all,
Does
Rob's is a Rexx function. Normally it works quite nicely. But what
happens after TSO is shutdown?
I was using the sleep function to put pauses in an exec to shutdown the
system, and after TSO was stopped it didn't work so well anymore. (-:
We think that is the case, anyway. It isn't that
they had a sev1 ticket # 35327088 open at 11:40 a.m. ET
however, seems to be working now.
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
I am getting java.lang.NoClassDefFoundError: javax/help/HelpsSet
I did install javahelp 2.0
The javax/help does not have a HelpSet sub directory.
CLASSPATH :
C:\Program Files\IBM\Java142\IOAJAVA.jar;
C:\jh2.0\javahelp\bin\jhindexer.jar;
C:\jh2.0\javahelp\bin\jhsearch.jar;
I will be speaking to them tomorrow.
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at
On Thu, 17 Apr 2008 22:07:11 +0800, Tommy Tsui [EMAIL PROTECTED] wrote:
because our audit want to check the unauthorized user (outsource
programmer) download the source program from our shop.
On 4/17/08, Binyamin Dissen [EMAIL PROTECTED] wrote:
On Thu, 17 Apr 2008 15:00:29 +0800 Tommy Tsui
This is a real puzzler to me. I did an OPEN on a dynamically allocated
SYSOUT. The DYNALLOC must have worked because I didn't get any error
messages from my program and I see the allocation to SYS1. The OPEN
has R15==8. There are absolutely no other error messages. Nor did I get
any sort of
We license MQ V5 on MLC for about 2k/month. We have very little MQ
activity, so we are looking at changing this to SALC (usage based) to save
money. The quote from IBM for 1 MSU, the lowest band, is 10k/month! This
doesn't make sense based on our experience with other usage based
products.
Lindy Mayfield [EMAIL PROTECTED] on the TSO REXX Discussion
List [EMAIL PROTECTED] wrote on 04/17/2008:
For some reason a solution to this is eluding me and I wonder if someone
may help me.
I would like to generate a random number for use in a UID/GID for an
OMVS segment.
Off topic for
Victor,
34.18 is service level of SMP/E.
The version is SMP/E Version 3 Release 4.
3.1 is quite old - came with z/OS 1.2
BTW: It is possible to have newer SMP/E than originally released with
the given system level. In simpler words it is possible to upgrade SMP/E
without system upgrade.
BTW2:
Lindy Mayfield wrote:
Rob's is a Rexx function. Normally it works quite nicely. But what
happens after TSO is shutdown?
IKJTSOEV can be used regardless of the state of TCAS. TCAS has nothing
to do with the availability of TSO/E services.
I was using the sleep function to put pauses in
In a message dated 4/17/2008 8:17:55 A.M. Central Daylight Time,
[EMAIL PROTECTED] writes:
I agree, but if r7 equates to 7 so as long as the first 7 bytes of the user
key are equal it will work.
Long ago and far away I had a friend teaching an IE(Industrial engineering
course) and the
Ed,
It's been a while since I have installed a base z/OS but as I recall, the
default JES2 proc that IBM shipped with CBIPO (like a said, been a while)
and the ADCD choose to elevate JES to the level of a BCP Component by
using:
//HASPPARM DD DISP=SHR,DSN=SYS1.PARMLIB(JES2PARM)
I will agree that
On Thu, 17 Apr 2008 22:07:11 +0800, Tommy Tsui wrote:
because our audit want to check the unauthorized user (outsource
programmer) download the source program from our shop.
First, have you protected it with RACF?
-- gil
--
because our audit want to check the unauthorized user (outsource programmer)
download the source program from our shop.
What about ftp? Copy Paste?
-
Too busy driving to stop for gas!
--
For IBM-MAIN subscribe / signoff /
On Thu, 17 Apr 2008 12:04:00 -0700, Edward Jaffe
[EMAIL PROTECTED] wrote:
Mark Zelden wrote:
On Tue, 15 Apr 2008 18:12:56 -0700, Edward Jaffe
[EMAIL PROTECTED] wrote:
Sheesh! I've never understood what some sysprog's think is so secret
about the contents of parmlib. IMHO, UACC(NONE) for
On Thu, 17 Apr 2008 12:48:06 -0700, Edward Jaffe
[EMAIL PROTECTED] wrote:
I used my TSOCMD REXX (apparently some smart people have decided to
rename it to TSOX -- I should have thought of that) to issue a TSO/E
command from a console via SystemRexx. I shut down TCAS and issued the
same command
In a message dated 4/17/2008 8:48:58 A.M. Central Daylight Time,
[EMAIL PROTECTED] writes:
Doesn't Ghostscript have a txt2pdf program?
Been so long don't remember. Used to use DEVICE(PSA) to pass to ghostscript
for .pdf output. Then along can _www.irfanview.com_
Am I the only one getting this response today from the Bookmanager
Software shelves? Trying to get to either Tivoli Information
Management or Enterprise COBOL 3.3 bookshelves gives this error:
Internal Server Error
The server encountered an internal error or misconfiguration and was
unable to
But the exposure exists because you gave the user READ access to the data.
This has been discussed before on the RACF-L forum.
It is better to protect the data, rather than the method of copying.
-
Too busy driving to stop for gas!
Hi!
One of my client's is still using WorkBench with CICS TS 3.1 DB2/VSAM and
it's working.
I don't recall that they've had any problems since the product is their
responsibility.
Cheers!
Timur
--
From: Hoesly, Bret [EMAIL PROTECTED]
Sent:
It is better to protect the data, rather than the method of copying.
That doesn't help if you want the programmer to work on a program
but you don't want him to take it with him.
Date: Thu, 17 Apr 2008 20:41:35 +
From: [EMAIL PROTECTED]
Subject: Re: how to audit the usage of
That doesn't help if you want the programmer to work on a program but you
don't want him to take it with him.
If he can read it, he can copy it.
And, how protecting IND$FILE will not be enough.
There are many methods, but the crudest one cannot be protected except by
giving the programmer an
Is JK Rowling the auditor?
Tommy Tsui wrote:
because our audit want to check the unauthorized user (outsource
programmer) download the source program from our shop.
snip
--
For IBM-MAIN subscribe / signoff / archive
On Thu, 17 Apr 2008 21:30:43 +, Ted MacNEIL wrote:
That doesn't help if you want the programmer to work on a program but you
don't want him to take it with him.
If he can read it, he can copy it.
And, how protecting IND$FILE will not be enough.
There are many methods, but the crudest one
Either you trust your programmer's ethics or you shouldn't provide access to
the treasured source. There is no in between.
Exactly! Everytime you work with an 'outsider' (contractor, outsourcer,
consultant, etc.), you have a risk evaluation to do.
You either trust them, or you don't.
If you
Or modularize the design so that no one part is known by everyone. I
think that's why Windows works so well.
Ted MacNEIL wrote:
Either you trust your programmer's ethics or you shouldn't provide access to the
treasured source. There is no in between.
Exactly! Everytime you work
Or modularize the design so that no one part is known by everyone. I
think that's why Windows works so well.
LOL! :-)
George Fogg
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL
One problem you will have even if one of those techniques work is with
duplicate object names. You can not have duplicate names within the same
Collection Name. I think you will need to write a program to copy the
objects to a different Collection or store duplicate objects with a
different
Mark Zelden wrote:
I just looked at yours and tried it and I can't see why I would need
to trap the output. Running some simple tests, both seemed to
do the same thing.
Try it from a console. A *real* console. TSO command processors often
write messages with trailing whitespace --
Edward Jaffe wrote:
I issued a LISTD command using your REXX and got:
SYS1.PARMLIB
--RECFM-LRECL-BLKSIZE-DSORG
FB806160PO +
--VOLUMES--
Z9RES1
Mine got:
SYS1.PARMLIB
--RECFM-LRECL-BLKSIZE-DSORG
FB806160PO
Rob Wunderlich wrote:
We license MQ V5 on MLC for about 2k/month. We have very little MQ
activity, so we are looking at changing this to SALC (usage based) to save
money. The quote from IBM for 1 MSU, the lowest band, is 10k/month! This
doesn't make sense based on our experience with other
Anyone out there seeing this? I'm going open an ETR shortly with IBM but
see this in our syslogs.
DUMPID=147 REQUESTED BY JOB (ARCNMIGR)
DUMP TITLE=COMPON=SSI,COMPID=5752SC1B6,ISSUER=IEFJSARR,MODULE=I
EFJSRE1,ABEND=S878,REASON=0010,SNAME=SMS
I checked IBMLINK I cant seem
You are both right, but you're missing point of IBM's SALC metric. There are
still quite a few sites that cannot save money with IBM's Sub-Capacity
pricing. You are currently paying ULC (Usage License Charge) or MULC
(Measured Usage License Charges) probably along with PSLC (Parallel Sysplex
Not sure if this should be posted over on the DB2 newsgroup, but I thought I
would start here.
I am looking for information on whether DB2 V9 runs better under z/OS V1.7
or V1.9. And what might those improvements might be.
I believe I have read that under z/OS V1.9 the DB2 Buffers are
Hi Andy,
Take a look at APARs: OA23236 OA23235. It looks like they are related to
APARs: OA20831 OA16192 . We don't have HSM at our shop so I don't have
any real world experience to offer you. Had you been using these 'new' HSM
address spaces via the 'patches' APAR: OA23236 talks about or
Andy,
My guess would be insufficient storage on your ARCxMIGR STC that is kicked
off for DFHSM migration process. Do you know what your region size is set
at in the PROC?
This is new with z/OS V1.9.
Lizette
Anyone out there seeing this? I'm going open an ETR shortly with IBM but
see this
Lizette Koehler wrote:
My guess would be insufficient storage on your ARCxMIGR STC that is kicked
off for DFHSM migration process. Do you know what your region size is set
at in the PROC?
These address spaces are started via ASCRE ... not a START command.
Technically, the proc is
Thanks Lizette -
our region size on this system is The private area size 16M is
10240K.
The proc we don't code region in out shop its the same as ZeroM or
REGION=0M, it starts on the behalf of HSM. We will open an ETR I think in
the AM I have one Dump.
This is the proc
On Thu, Apr 17, 2008 at 5:30 PM, Ted MacNEIL [EMAIL PROTECTED] wrote:
That doesn't help if you want the programmer to work on a program but you
don't want him to take it with him.
If he can read it, he can copy it.
And, how protecting IND$FILE will not be enough.
There are many methods,
If you have a cell phone camera, it is not that big of an issue - no one
really thinks there is a camera in the building when it is in a cell phone.
Lizette
That doesn't help if you want the programmer to work on a program but you
don't want him to take it with him.
If he can read it, he can
If you have a cell phone camera, it is not that big of an issue - no one
really thinks there is a camera in the building when it is in a cell phone.
It depends where you work.
Th company I recently got downsized from actually had a policy against cell
cameras.
-
Too busy driving to stop for
Don Leahy wrote:
Even a green screen is no guarantee if the programmer smuggles a
camera into the office and takes pictures as he scrolls. Tedious
perhaps, but it would work.
Camera? I have a VBS macro for IBM's PCOMM that scrolls forward and
appends each screen's worth of data to a text
1 - 100 of 107 matches
Mail list logo