F wrote:
We use IMS and DB2 on z/OS today and was wondering if we should consider
moving to distributed systems like Oracle or SQL Server.
Reason being, we are concerned about mainframe skill sets on IMS and
DB2. Also the news around many systems moving away from mainframes keeps
us
Hi Barbara
http://publib.boulder.ibm.com/infocenter/zos/v1r9/index.jsp?topic=/com.ibm.zos.r9.halz002/ziipsec.htm
might be a starting point.
jan
- Oorspronkelijk bericht -
Van: Barbara Nitz [mailto:[EMAIL PROTECTED]
Verzonden: maandag, mei 26, 2008 02:36 PM
Aan: IBM-MAIN@BAMA.UA.EDU
See PK52910.
Bob Shannon
Rocket Software
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at
On Fri, 23 May 2008 04:25:10 -0400, David Cole [EMAIL PROTECTED]
wrote:
Hi,
I have a process that submits up to a couple of hundred jobs for
execution. I require that these jobs execute in the same order in
which they were submitted.
For decades I have accomplished this by assigning all of the
By chance I discovered that there is now a WLM subsystem type called TCP (not
mentioned in my 1.8 planning book), apparently used for offloading IPSEC stuff
to ZIIPS, which we don't have. The enclaves are named TCPENC01 and there is one
per IP stack. And yes, as they are not defined here,
... could you not just use RECFM=V and send
84 byte JCL and 208/212 LRECL SYSIN Data?
I assume so, but I never tried to do that. Using in-stream
data sets with more than 80 bytes per card was an extension
to an existing program (that used to require only 80 bytes
of in-stream data) which used
Greetings listers
We're facin a problem we met after migration to z/OS 1.9. It's with SDSF.
After migration we saw that SDSF is slow in response, expecially in
displaying output classes. In some cases is VERY slow even if CPU is quite
far from 100%.
Did anyone encounter the same problem
Jan,
I had found that book myself, but thanks. I did mention that we are 1.8 (not
1.9), we do NOT have ZIIPs, and my IP guy tells me that we are NOT using IPSEC.
Besides, the book doesn't give me a good dstarting point for defining a goal.
Response time? Another execution velocity? The only
8 matches
Mail list logo