Its a big secret as to why...
OA07837: DOCUMENTATION DEFECTS AND CLARIFICATIONS
ssh has been disabled under OMVS because passwords are visible
while they are being typed by the user in some situations.
Date: Sat, 23 Feb 2008 19:25:21 -0600
From: [EMAIL PROTECTED]
Subject: Re: Batch
A new virtual storage area, the High Common Storage Area (HCSA), is defined.
Did they really call it that? Or, did they mean to say, High Common *Service*
Area?
Date: Tue, 26 Feb 2008 11:53:36 -0600
From: [EMAIL PROTECTED]
Subject: IBM Preview of z/OS V1.10
To: IBM-MAIN@BAMA.UA.EDU
I believe Scott is correct.
If you allocate a dataset without specifying its volser,
allocation will run the DSAB queue *before* looking in
the catalog. If a dataset of the same name is already
allocated, that's the same one that will be used in the
subsequent allocation.
Date: Wed,
: TSO ALLOC concat using VOLSER?
To: IBM-MAIN@BAMA.UA.EDU
On Wed, 27 Feb 2008 16:09:24 -0500, J R [EMAIL PROTECTED] wrote:
I believe Scott is correct.
If you allocate a dataset without specifying its volser,
allocation will run the DSAB queue *before* looking in
the catalog
imagined tho whole thing?
Date: Thu, 28 Feb 2008 09:34:49 -0600
From: [EMAIL PROTECTED]
Subject: Re: TSO ALLOC concat using VOLSER?
To: IBM-MAIN@BAMA.UA.EDU
On Wed, 27 Feb 2008 20:14:24 -0500, J R [EMAIL PROTECTED] wrote:
From the description of the ALLOCATE command
operands in TSO
That's why I suggested allocating to a non-specific ddname.
I was hoping it would influence the not-in-use attribute.
Date: Thu, 28 Feb 2008 14:13:35 -0500
From: [EMAIL PROTECTED]
Subject: Re: TSO ALLOC concat using VOLSER?
To: IBM-MAIN@BAMA.UA.EDU
In [EMAIL PROTECTED], on
The WhoHas generally checks the SYSDSN enque and if the file is enqueued
on another resource, it won't be found
In the case of IKJ56241I DATA SET IS ALLOCATED TO ANOTHER JOB OR USER,
a SYSDSN enqueue is the only one that's relevant.
Date: Mon, 10 Mar 2008 11:42:57 -0400
From: [EMAIL
But, I find it hard to read one-line e-mails, with 30 line disclaimers.
Non-dissemination clauses have no relevance in public forums such as IBM-MAIN.
The only disclaimers that *are* relevant would be those such as
This is my personal opinion, not necessarily that of my employer
and,
My complements.
It would have been real easy to blame the ISV.
Hear, hear!
Date: Tue, 8 Apr 2008 14:17:05 +0300
From: [EMAIL PROTECTED]
Subject: Re: SMFEWTM [EMAIL PROTECTED]
To: IBM-MAIN@BAMA.UA.EDU
On Tue, 8 Apr 2008 03:39:48 -0400 Jim Mulder [EMAIL PROTECTED] wrote:
: I
I did use IDF to step through and watch the TIOT grow. With each new
concatenation call, there is an entry which keeps growing in size until the
TIOT fills up.
My apologies if this has already been answered but I haven't seen it.
This behavior is counter intuitive; the TIOT is filling
I believe this is normal behavior. PROFILE NOINTERCOM specifies
that the user does not wish to receive messages from other
terminal users which I understand to mean TSO users.
Furthermore, it doesn't make so much sense to ignore messages
from a system operator (or a TSO user pretending to
No, WTPMSG/NOWTPMSG controls whether WTO ROUTCDE=11
messages are displayed at your terminal. In other words, do
you want to see the stuff that shows up in JES message datasets
in your job listing.
Date: Sun, 13 Apr 2008 23:03:31 +
From: [EMAIL PROTECTED]
Subject: Re: TSO PROFILE
I agree, but if r7 equates to 7 so as long as the first 7 bytes of the user
key are equal it will work.
No, it's comparing for the keyword text USER( which is only 5 bytes long.
Depending on what follows that text in the program, it could work FSVO work.
Date: Thu, 17 Apr 2008
It is better to protect the data, rather than the method of copying.
That doesn't help if you want the programmer to work on a program
but you don't want him to take it with him.
Date: Thu, 17 Apr 2008 20:41:35 +
From: [EMAIL PROTECTED]
Subject: Re: how to audit the usage of
Are you running authorized? The FM states:
Requesting a Data Set That Is In Use:
Rather than wait for another user to release a data set, volume,
or device to obtain use of it, dynamic allocation fails a request
by an unauthorized program. If an authorized program specifically
requests a
wants and
JOBB owns a resource that JOBA wants. If one of the above
flags are on, the two jobs will wait until one job is cancelled.
Date: Sat, 3 May 2008 11:12:23 -0500
From: [EMAIL PROTECTED]
Subject: Re: SVC99
To: IBM-MAIN@BAMA.UA.EDU
On Sat, 3 May 2008 07:28:43 -0400, J R wrote
to avoid
deadlocks or detect and recover from them.
Date: Sat, 3 May 2008 11:36:07 -0500
From: [EMAIL PROTECTED]
Subject: Re: SVC99
To: IBM-MAIN@BAMA.UA.EDU
On Sat, 3 May 2008 12:23:37 -0400, J R wrote:
Probably to ensure that not just anybody can cause a deadly embrace:
Why
That doesn't answer my question.
Date: Sat, 3 May 2008 11:34:25 -0500
From: [EMAIL PROTECTED]
Subject: Re: SVC99
To: IBM-MAIN@BAMA.UA.EDU
Yes the program is authorised.
_
Make Windows Vista more reliable and secure
First, thank you for saying Fortran rather than ASCII. The convention is
part of the FORTRAN (and, I believe, COBOL) spec, not of ASCII as is so
commonly misstated.
I don't remember ever calling it ASCII.
I always thought of it as ASA print control.
Date: Sun, 1 Jun 2008 10:02:27
It's probably the leather bound, gold edged,
collector's edition ... what with the mainframe
being dead and all. ;-)
Date: Mon, 20 Oct 2008 11:15:56 -0600
From: [EMAIL PROTECTED]
Subject: z/Architecture Reference Summary
To: IBM-MAIN@BAMA.UA.EDU
Did you know the quoted price for
Nope, it was the use of a X'80' in the high-order byte of a fullword to
terminate a variable-length parameter list (of fullwords).
Isn't that the existing exploitation of the sign bit
that Gil is alluding to?
Date: Mon, 20 Oct 2008 20:31:08 -0500
From: [EMAIL PROTECTED]
Subject: Re:
It depends if you want the commands synchronized
with a particular step, or not.
If you don't require step synchronization, you can
simply include the commands in the JCL, either
directly or as operands of the COMMAND statement.
However, if you do require step synchronization, you
will
Isn't that what the Department of Defense said about the $435 hammers?
Date: Tue, 21 Oct 2008 10:08:06 -0700
From: [EMAIL PROTECTED]
Subject: z/Architecture Reference Summary
To: IBM-MAIN@BAMA.UA.EDU
I've heard rumors to the effect that the current (high) prices
were set erroneously,
Right, but I think it's fairly clear that they
were both talking about the same thing.
Date: Tue, 21 Oct 2008 14:16:43 -0500
From: [EMAIL PROTECTED]
Subject: Re: Addressing Scheme with 64 vs 63 bits
To: IBM-MAIN@BAMA.UA.EDU
On Mon, 20 Oct 2008 22:00:00 -0500, Paul Gilmartin
[EMAIL
Even in a mixed security sysplex?
Date: Fri, 24 Oct 2008 17:43:08 -0400
From: [EMAIL PROTECTED]
Subject: Re: ICH409I 283-054 ABEND DURING FRACINIT PROCESSING
To: IBM-MAIN@BAMA.UA.EDU
To clarify Walt's post, CA's mainframe security solutions do perform
appropriate security checking and
I wish all computers did time-date stamps in Zulu, and only translated
to local time as needed.
Hear, hear!
(Heck, I wish Daylight Savings Time would go away, and wouldn't be
adverse if local time would go away.)
Hear, hear!
BTW, I always feel sorry for the Zulus -- there's a time
But, it can/does cause some problems with things like young children going to
(or coming from) school in the dark.
But DST is not the only solution to that problem. Different
hours of business depending on the time of year would also work.
Date: Thu, 30 Oct 2008 16:17:26 +
From:
But, it can/does cause some problems with things like young children going to
(or coming from) school in the dark.
The more I think about this, the less sense it makes.
The thing that saves the children from going to school in the dark is
*standard time*, not DST. So, if we stayed on
?
To: IBM-MAIN@BAMA.UA.EDU
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of J R
But, it can/does cause some problems with things like young children
going to (or coming from) school in the dark.
[ snip ]
Standard time gives the kids their best chance
with anything?
Eric
Shane [EMAIL PROTECTED] wrote:
On Fri, 2008-10-31 at 08:25 -0400, J R wrote:
When I was a child in Fairbanks, we went to school in the dark and came
home in the dark. Heck, we even ate lunch in the dark!
Uphill both ways?
Shoebox ... shoebox
Is it too soon to pat ourselves on our collective back for surviving
the fall back from xDT to xST with nary a post on the subject?
My cellphone provider finally changed the network time at around
0600 this morning.
My cable provider was ahead of the game; its network time never
did
Yes, I noticed the XMIT within XMIT format.
Unfortunately, this confounds XmitManager because the top level
invocation converts the second level members to ASCII which the
second level invocation can't make sense of.
This makes it difficult to work with on a PC.
Date: Tue, 4 Nov
]:
On Tue, 4 Nov 2008 10:41:34 -0500, J R wrote:
Yes, I noticed the XMIT within XMIT format.
Unfortunately, this confounds XmitManager because the top level
invocation converts the second level members to ASCII which the
second level invocation can't make sense of.
This makes it difficult
I think that's why God invented the archives.
For some reason, I'm not seeing Ron's posts in the archives,
not in Google Groups version of bit.listserv.ibm-main anyway.
Date: Wed, 5 Nov 2008 14:51:02 -0500
From: [EMAIL PROTECTED]
Subject: Re: Performance Question - Dynamic PAV
To:
Or coming from SYSPROC *without* the /* REXX */ comment.
Date: Thu, 13 Nov 2008 13:41:21 +
From: [EMAIL PROTECTED]
Subject: Re: appending userid in a file
To: IBM-MAIN@BAMA.UA.EDU
With those IJK... messages it looks to me like he is just coding the
REXX statements via SYSTSIN
Yes, that's the way it has always worked.
I just assumed that if you do any override, it overrides the entire DD
concatenation.
No, the override is by *DD statement*, not by *ddname*.
To override, say, the third and fifth statements, code:
//SYSLIB DD
// DD
// DD
Simply coding the base entry name on a DD statement is a
means of processing ALL the generations of a GDG without
resorting to concatenated DD statements for each generation.
Instead, the system resorts to concatenated DD statements
on your behalf, albeit in reverse chronological
It's one thing to threaten a lawsuit against someone
reverse engineering the proprietary format for commercial
purposes, but to hold data hostage from its rightful owner
is outrageous.
Would anybody do business with these sharks if they
knew this ahead of time? I think not.
Date:
to consult. I wound up calling my
favorite customer about once a month to ask what he thought it SHOULD
be doing in a particular case...
On Wed, Dec 17, 2008 at 7:55 AM, J R jayare...@hotmail.com wrote:
With source code available, the PLMs were a distraction.
If you looked at the code, you *knew
We used use source code and PLMs to understand
the workings of a lot of the VM and MVS components.
Thats how a lot of us dinos evolvedlol
With source code available, the PLMs were a distraction.
If you looked at the code, you *knew* what was happening.
If you looked at the PLM, you
A hyphen is a valid character in a catalogued data set name.
A data set name that contains a hyphen must be enclosed
in apostrophes if it is used as a DCB subparameter.
Date: Wed, 17 Dec 2008 18:01:40 -0600
From: paulgboul...@aim.com
Subject: Re: Dash in Cataloged Data Set Name (Was:
The Vyy is the Version Number ... (allowing you to replace it up to 99
times).
Are you saying that replacement versions may only be created in ascending
sequence?
Date: Tue, 20 Jan 2009 12:15:46 -0500
From: hal9...@panix.com
Subject: Re: GDG Question
To: IBM-MAIN@bama.ua.edu
The Version numbers are ascending (00 to 99). I have not known
of a case where you would create a descending version (99 to 00).
Well, I can't imagine needing to create up to 99 replacement versions either.
However, if I were to use this feature, I could well imagine making
the
. Version only
allows you to replace the current Gen Number without losing the oldest
GDG (due to roll off).
Lizette
-Original Message-
From: J R jayare...@hotmail.com
Sent: Jan 20, 2009 1:49 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: GDG Question
The Version numbers
to replace the current Gen Number without losing the
oldest
GDG (due to roll off).
Lizette
-Original Message-
From: J R jayare...@hotmail.com
Sent: Jan 20, 2009 1:49 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: GDG Question
The Version numbers are ascending (00 to 99). I
I spent a *lot* of time in the microfiche, reading the CVOL code. Whatever
the reason was for concatenating the generation data sets in reverse order,
I don't think it was for performance.
Been there, done that! I always assumed that the complementing of generation
numbers was
But maybe I was always wrong.
Maybe it was to give a faster path to generation (0) which would probably
be the most oft retrieved generation.
Date: Wed, 21 Jan 2009 13:30:49 -0500
From: jayare...@hotmail.com
Subject: Re: GDG Question
To: IBM-MAIN@bama.ua.edu
I spent a *lot* of
As Ted mentioned, Canadian banks use it. It is also used extensively
by European banks and those in the Antipodes.
What do these banks have in common? They use all the traditional
EFT cryptography *plus* the additional functionality for EMV (SmartCards).
Also, being inboard, IBM crypto
Check out http://www.mfnetdisk.com/ . Shai Hess used to post on IBM-MAIN.
Bruce McKnight mcknight-...@excite.com writes:
This is kind of an odd question, so please bear with me.
Last year we consolidated all of our LPARs onto a single z9. We have
a z800 that is disconnected from
I always bought IBM ThinkPads until they sold out to Lenovo.
After that I went with a Dell Latitude D810. Despite
more than doubling its purchase price with upgrades,
it's *never* performed up to expectation. And, I've
*never* had any satisfaction from their Tech Support!
(This may be a Dell
Yes, ABSTR is limited to 64KiB-1.
ITYM 64Ki-1.
From: Shmuel Metz (Seymour J.) [EMAIL PROTECTED]
Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: FW: Deleted PDS
Date: Mon, 23 Jul 2007 11:01:26 -0300
In [EMAIL PROTECTED],
on 07/11/2007
at
Maybe IBM could update the Message to be a bit more obvious as to what
to do when you get the ASMA034E message.
I think that you're being a little harsh on IBM.
When you looked up message ASMA034E, it told you to
Increase the range of the active USING.
If you had then looked up the USING
PROTECTED] On
Behalf Of J R
Sent: 24 July 2007 16:10
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: How to extend addressability over 4095 with USING
statements
Maybe IBM could update the Message to be a bit more obvious as to what
to do when you get the ASMA034E message.
I think that you're being a little
Unfortunately, read only access doesn't prevent someone
from copying the CLIST and removing any userid checks
from it, whether they be a pre-defined table or a called
RACF interface.
How would the dataset open exit be invoked?
From: Phil Kingston [EMAIL PROTECTED]
Reply-To: IBM Mainframe
I'm always suspicious when somebody from a service provider asks a basic
question on IBM-Main.
It could be worse. We had a guy on here last week asking how to convert a
string of hex characters into a binary number. He was given the *two*
instructions that he needed. He then had to get
Deja vu! Did we not discuss this before? http://tinyurl.com/2b9ums
The default disposition should be DISP=(NEW,DELETE,DELETE)
That being the case, the only dataset that should be deleted would be the newly
created one.
Date: Thu, 2 Aug 2007 12:29:33 -0400 From: [EMAIL PROTECTED]
Deja vu! Did we not discuss this before? http://tinyurl.com/2b9ums
The default disposition should be DISP=(NEW,DELETE,DELETE)
That being the case, the only dataset that should be deleted would be the newly
created one.
Date: Thu, 2 Aug 2007 12:29:33 -0400 From: [EMAIL PROTECTED]
The step should be executed unless any prior step has RC9.
Neal Eckhardt said:
OK, I'm usually pretty good at spotting these things, but this one has me
baffled.
z/OS 1.4 system and here is the JCL setup
Job card with COND=(9,LT).
An IF/THEN/ELSE/ENDIF construct with another
implicitly tries to think the opposite, that the
step should execute only if the condition is true. It's really a
conditional SKIP expression. Weird.
/J
-Original Message-
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of J R
Sent: Tuesday, August 07, 2007 1:23 PM
SCKPF
Are you suggesting that your systems programmer needs to write
code to issue SCKPF, or is there a config setting that should be used?
From: john gilmore [EMAIL PROTECTED]
Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Sysprog Action
Someone, somewhere, has to write a (probably trivial) program to set the
programmable field in the ETOD. Perhaps insert a LPAR ID? I don't know of
any CONFIG or PARMLIB value that will set this field, although a PARMLIB
value might be a pretty good idea.
I agree, it's trivial. However, if
.
From: Edward Jaffe [EMAIL PROTECTED]
Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Sysprog Action Makes STCKE Unique
Date: Sat, 11 Aug 2007 09:09:09 -0700
J R wrote:
SCKPF
Are you suggesting that your systems programmer needs to write
Are you sure you have preserved R1 across your entry housekeeping?
john [EMAIL PROTECTED] wrote
I'm relatively inexperienced with programming in assembler; I am trying to
get the parameters passed on the EXEC statement in my JCL into some
storage, but am failing miserably. What am I doing
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: JCL passing parms to ASM module?
Date: Thu, 16 Aug 2007 09:47:07 -0600
J R wrote:
Are you sure you have preserved R1 across your entry housekeeping?
john [EMAIL PROTECTED] wrote
You might also post your questions to IBM-MAIN@BAMA.UA.EDU
so we can all see them
The OPEN broke it!
john [EMAIL PROTECTED] wrote:
Yes, I am posting from Google, sorry about that.
I don't believe I have any entry housekeeping that could break R1:
BALR 3,0
USING *,3
OPEN (SYSPRINT,OUTPUT)
L 2,0(1) *copy parm addr into R2
etc...
Just to clarify,
original post via Google from john [EMAIL PROTECTED]:
I'm relatively inexperienced with programming in assembler; I am
trying to get the parameters passed on the EXEC statement in my JCL
into some storage, but am failing miserably. What am I doing wrong?
Here is my JCL:
I suspect that UPDAT is a special case and that, for PUTX, it may not
matter whether you specify MACRF=(GL,PL) or MACRF=(GL,PM).
In DFSMS Using Data Sets, p. 353, it refers to:
GET-locate, PUTX-update. Processed in an input buffer and returned to the
same data set.
And, on p.355:
UPDAT mode.
Ah! You see: you said you were going to use Put Move
(MACRF=(GL,PM)), but you actually used Put Locate (or,
more precisely, PUTX Locate) because your PUTX only
has one operand. To use PUTX Move mode you need to
specify two operands: the DCB and location where the
record should be put from; so you
CA tells me they cannot use a DNS name for the IP connected equipment; that
it has to be a physically coded IP address.
That's ridiculous! Any IP application that wants to be taken seriously
should support a URL in lieu of an IP address. If it's numeric (dotted
quad), use it as-is. Else,
Dynamic IP addresses via DHCP make perfect sense
for client devices that come and go, e.g. end user
desktops, laptops, etc. No one else needs to know
their address until they make contact with a request.
However, server devices that are expected to be
there all the time require static IP
Call me old fashioned but I still write all my code in upper case,
still limit label names to eight characters, and still use register equates.
From: Steve Comstock [EMAIL PROTECTED]
Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Calling a
-0400, J R wrote:
Call me old fashioned but I still write all my code in upper case,
still limit label names to eight characters, and still use register
equates.
Upper case -- ok. Doesn't bother me either way. You have to be real
careful
about using lower case in macro operands, though.
8
The URL not the best analogy. . . .
It's having a name in the name server which may be thought of as analogous
to cataloging a data set - sort-of.
Point well taken!
Incidentally, in connection with an earlier post, I guess you realised
that, by no name server, Ulrich meant he wasn't
File 1 is the volume label, file 2 is the 1st data set label. Bill had it
right.
Nope! VOL1 and the first HDR1 are both in file 1.
From: Tom Schmidt [EMAIL PROTECTED]
Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Tape Question
Date: Thu,
OTOH, there's considerable utility in knowing when it's lunchtime,
etc., in other localities because that's a bad time to attempt
a phone call. One of our offices which does considerable
global conferencing has a half dozen clocks on the wall, displaying
the time at our other major offices
PROTECTED]
Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Time Zones (Was: IBMLink is UP - just kidding)
Date: Mon, 8 Oct 2007 08:30:48 -0600
On 6 Oct 2007 10:37:58 -0700, [EMAIL PROTECTED] (J R) wrote:
If they are analog clocks, you could
* code an Assembler program named PGMA that checks
the data (if you're on z, then a simple TP instruction
should do it)
TP checks for valid signed-packed-decimal data. The OP's input
data was in character form. TRT would be more appropriate.
From: Steve Comstock [EMAIL PROTECTED]
The exit you're thinking of is the Open exit. When the unlike
concatenation flag is set, it will be entered for each DD.
Or the EOV exit for that matter.
Date: Mon, 22 Oct 2007 11:05:02 -0400 From: [EMAIL PROTECTED] Subject: Re:
How to read source from a PDS member To:
The exit you're thinking of is the Open exit. When the unlike
concatenation flag is set, it will be entered for each DD.
Or the EOV exit for that matter. In fact, I believe that EOV is better because
it does not incur CLOSE/OPEN which unlike concatenation does.
Date: Mon, 22 Oct 2007
ACI has reason to push their Nonstop side of things;
that's where they have the least competition. On z/OS,
they are not the only game in town. I am aware of at
least one vendor that has an EFT Switch that runs on
z/OS, Nonstop and 'Nix.
IMHO the IBM mainframe is the most suitable
Resending. Forgot to remove the crappola at the bottom. ;-)
Date: Fri, 9 Nov 2007 13:17:10 -0500
ACI has reason to push their Nonstop side of things; that's where they have the
least competition. On z/OS, they are not the only game in town. I am aware of
at least one vendor that has
AOSmith=Deluxe=DeluxeData=DeluxeEelectronicPaymentSystems(DEPS)=eFunds.
Never saw them called Acme! Date: Sat, 10 Nov 2007 00:05:14 + From:
[EMAIL PROTECTED] Subject: Re: ATMs (Was: High order bit in 31/24 bit
address) To: IBM-MAIN@BAMA.UA.EDU The original company name was ACME
This is driven by the results of catalog LOCATE. The generations
of the GDG are returned by a single LOCATE for the GDG base.
From: Pommier, Rex R. [EMAIL PROTECTED]
Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Recalling GDG generations
Rick Fochtman said:
Ken, the physical BLKSIZE of the directory is 255, plus a 8-byte physical
key.
I think you'll find that's 256.
From: Rick Fochtman [EMAIL PROTECTED]
Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Top 10 software install
LOCATE the dataset
OBTAIN the DSCB
Examine DS1LSTAR
From: CICS Guy [EMAIL PROTECTED]
Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Mainframe Empty datasets
Date: Fri, 18 May 2007 11:36:37 -0500
I read it more that the dataset may have been
Peter Farley said:
SYSTMEG Time, Execute, GMT SYSTMEL Time, Execute, Local GMT's
could be suffixed U for Universal or Z for Zulu instead of
G, I don't really care as long as the functionality is the same.
Despite being an aviator, I like G more than Z in this context
because it
Paul Gilmartin said:
the initiator
was able to allocate it again in STEP2. I hope this was
not done without an ENQ.
Right, but maybe the intervening de-allocate was done without a DEQ.
Besides, the message IKJ56247I FILE SYSUT1 NOT FREED, IS NOT ALLOCATED may
not come to pass the way you
Chris Mason:
... abort the product
Freudian slip?
From: Chris Mason [EMAIL PROTECTED]
Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: What is 'Program Logical Manuals'?
Date: Thu, 31 May 2007 15:50:50 +0200
Johnny
Since you are something
DASDBill:
with, like, my 8- and 11-year-old grandsons who are currently, like,
visiting
Since it's Friday, why do we tend to list our kids by ascending age?
After
all, unlike the chicken and the egg, we *do* know which came first. I
always
list mine by descending age.
From: (IBM
I suspect that the immediate command responses are not
the ones at issue. There are also the asynchronous ones
emanating from the HSM address space. In this case, the
solution proposed by Lizette may be a better approach.
From: O'Brien, David W. (NIH/CIT) [C] [EMAIL PROTECTED]
Reply-To: IBM
:27 -0400
Rather than 'suspect', why don't we wait for Daniel to supply the requested
information.
From: J R [mailto:[EMAIL PROTECTED]
Sent: Mon 6/4/2007 1:25 PM
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: SYSTERM to DSN
I suspect that the immediate command
And, at the risk of once more violating O'Brien's Law, I suspect I was right
that it was the asynchronous responses from the HSM address space that was
the real problem.
From: O'Brien, David W. (NIH/CIT) [C] [EMAIL PROTECTED]
Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
To:
Binyamin Dissen:
:There was/is also something called TSSO
:last time I used TSSO, TPUT output went to the console
TPUT went to the console? I would be surprised.
Perhaps you meant PUTLINE?
About twenty years ago, there was also something called ConsoleMaster, but I
don't see it around
@BAMA.UA.EDU
Subject: Re: Friday musings on the future of 3270 applications
Date: Tue, 5 Jun 2007 17:26:20 +0300
On Tue, 5 Jun 2007 09:50:48 -0400 J R [EMAIL PROTECTED] wrote:
:Binyamin Dissen:
::There was/is also something called TSSO
::last time I used TSSO, TPUT output went to the console
:TPUT
List IBM-MAIN@BAMA.UA.EDU
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Friday musings on the future of 3270 applications
Date: Tue, 5 Jun 2007 09:39:45 -0500
-Original Message-
From: IBM Mainframe Discussion List
[mailto:[EMAIL PROTECTED] On Behalf Of J R
Sent: Tuesday, June 05, 2007 9:34 AM
PROTECTED]
Reply-To: IBM Mainframe Discussion List IBM-MAIN@BAMA.UA.EDU
To: IBM-MAIN@BAMA.UA.EDU
Subject: Re: Friday musings on the future of 3270 applications
Date: Tue, 5 Jun 2007 10:27:52 -0500
On Tue, 5 Jun 2007 10:58:07 -0400, J R wrote:
Oh, man. Any chance of getting this to run as a UNIX command
From Webster:
abbreviation: a shortened form of a written word or phrase used in place of
the whole
acronym: a word (as NATO, radar, or laser) formed from the initial letter or
letters of each of the successive parts or major parts of a compound term;
also : an abbreviation (as FBI) formed
In the JES2 Init deck, you can specify clear text passwords for RJE lines.
That is a great reason for specifying UACC(NONE).
That sounds like a great reason for not keeping the JES2
Init deck in PARMLIB.
From: Wayne Driscoll [EMAIL PROTECTED]
Reply-To: IBM Mainframe Discussion List
I (honestly) do not understand your point.
And that's part of the problem.
As someone who's spent a couple of decades
on each side of this discussion, I can see both
points of view. However, the system is there
for the benefit of the applications; the reverse
is not the case. If the systems
No, if you start a CLIST with your Enter, there is an option in IEAOPT00
to specify if each command in the CLIST is a new transaction or that the
entire CLIST is one transaction.
CNTCLIST=YES/NO
So, it controls whether the SYSEVENT is issued based on
TGET/TPUT vs. GETLINE/PUTLINE?
1 - 100 of 361 matches
Mail list logo