Re: Complimentary E-book Thriller from author, Marshall Chamberlain

2012-06-13 Thread Hal Merritt
How do you know it's a simple spam and not a hook for malware? That is, click on the link out of curiosity and get infected. Some say that if you are not paranoid then you just don't understand.But others say how can you be paranoid if they really are out to get you? -Original

Re: How many cost a cpu second?

2012-06-11 Thread Hal Merritt
As Radoslaw said, the answer is far more political than technical. Indeed, some might offer the following: Departmental budget/number of seconds in budget cycle/nCPU. It also matters if the department is a cost center or a profit center. -Original Message- From: IBM Mainframe

Re: FYI LinkedIn passwords hacked

2012-06-07 Thread Hal Merritt
Hammers, football games, and panties don't usualy have passwords. LinkedIn isn't as pervasive as Yahoo, but does serve a higher value clientel, at least in the US. Major portals such as Yahoo, Google+, Hotmail, etc all do and I would say that getting the word out about a major breech is a

Re: Question on TCP window size for FTP

2012-06-06 Thread Hal Merritt
I believe that these sizes are actually negotiated with each appliance in the path. All it would take is one device configured such and all along that path would follow suit. I'd try a trace route on each path and compare the results. Then have the network folks check the routers/firewalls in

Re: ISV software costs based on MIPS

2012-05-31 Thread Hal Merritt
software costs based on MIPS In 1e7a8b5a967dfb42b888c2c05cfe0f5b047...@mmoex10mbs03.jhacorp.com, on 05/30/2012 at 03:26 PM, Hal Merritt hmerr...@jackhenry.com said: No ISV wants a pricing strategy that potentially reduces income. Does that include a pricing policy that gives customers an incentive

Re: ISV software costs based on MIPS

2012-05-30 Thread Hal Merritt
No ISV wants a pricing strategy that potentially reduces income. And very few will give in willingly. There were some that stubbornly hung on to the old models and just refused to budge. They are mostly gone now. This is double bad news for you if you have one of these as you can't expect

Re: Syslog/Operlog Read Access

2012-05-17 Thread Hal Merritt
I believe the general case is always need-to-know. That is, there needs to be some business/technical justification for access. The rational is to deny information to a potential intruder. I read that most intruders are those that already have some level of access to the system.

Re: Syslog missing (now: SCRT)

2012-05-16 Thread Hal Merritt
I moved the object code out of the job stream into a parmlib like PDS. My job scheduler was taking exception to the object code being in stream. The JCL changes have been uncommon and not hard to hand jive. -Original Message- From: IBM Mainframe Discussion List

Re: Convert CPU time to MSUs

2012-05-10 Thread Hal Merritt
SU_SEC = SU_HOUR / (ENGINES * 60 * 60) Not quite, I think. You don't get the full 60 seconds for each additional engine. Better: SU_SEC = SU_HOUR / ((ENGINES * 60 * 60)*FACTOR) Where FACTOR is less than 1.0. -Original Message- From: IBM Mainframe Discussion List

Re: corrupt zip files

2012-05-10 Thread Hal Merritt
Too many unknowns to be of much help. Can't even begin to answer your question about what software would produce a given corruption pattern; there are -so- many possibilities where a translation might occur and thus corrupt the data. Indeed, the corruption might be as massive as what you are

Re: Programming languages can't have copyright protection, EU court rules

2012-05-02 Thread Hal Merritt
I'm not a lawyer and don't pretend to understand the ramifications, but this sounds huge. The result is that the court finds that ideas and principles which underlie any element of a computer program are not protected by copyright under that directive, only the expression of those ideas and

Re: Origins of numeric assignation of z196 z114

2012-04-17 Thread Hal Merritt
You answered your own question. 'Marketing names' are perceived to 'sound much better than...' by marketing types. The names may or may not reflect anything technical. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of R.S. Sent:

Re: IBM Global Copy/Global Mirror

2012-04-10 Thread Hal Merritt
We started with PPRC on Sharks, upgraded to XRC on DS8100's, then later added GDPS. This has been stable plus or minus for a year or two and seems to be working well. I imagine that you'll find that details of your implementation will be somewhat unique to your specific situation.

Re: USS YORKTOWN(was Accessing USS on Mainframe thru Telnet)

2012-04-10 Thread Hal Merritt
I read about such, um, issues a while back. Seems that there were more and more shipboard systems, but each was evolving on its own way lacking a common strategy. That means the systems were often fundamentally incompatible and therefore unable to communicate. Sounds silly, but I think an

Re: Doing a little research on Performance Modeling

2012-04-10 Thread Hal Merritt
Indeed, Dr. Merrill literally 'wrote the book' on every performance issue known to man (and a few known only to women) :-) The manual that Lizette refers to evolved from that book. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of

Re: A deep question about VSAM SHR(4) - can you help?

2012-04-10 Thread Hal Merritt
Um, be careful about drawing any conclusions from a simple test other than the syntax is close. Data sharing is a very complex issue with gotcha's aplenty. You cannot possibly test every variation of access, update, and timings. The VSAM folks have, IMHO, done a fine job of preventing you

Re: USS YORKTOWN(was Accessing USS on Mainframe thru Telnet)

2012-04-10 Thread Hal Merritt
10, 2012 at 11:27 AM, Hal Merritt hmerr...@jackhenry.comwrote: But I can envision the Navy wanting a integrated situation where the OIC could point to a target and click 'kill'. The ship would then use all of its resources optimally to attack and destroy while, at the same time, defending

Re: Sclm

2012-04-04 Thread Hal Merritt
We use the base (free) product for source only - we never could figure out how to do C compiles. I'd suggest the full product and some expert help in getting you going. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Scott Ford

Re: Sclm

2012-04-04 Thread Hal Merritt
, 2012 1:02 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Sclm We've been using it for two or three years. Our only issue is that it requires PDSEs, which, until last month, broke frequently. Tom - Original Message - From: Hal Merritt [mailto:hmerr...@jackhenry.com] Sent: Wednesday, April 04

Re: VSAM help wanted for random reads

2012-04-03 Thread Hal Merritt
One (of many) possible explanations is that there are more hits on the type 5 and more rewrites. Depending on your VSAM options, a rewrite can be -very- expensive. Try a comparison run without the type 4 logic. Also try BLSR and DISP=OLD. That makes the best use of VSAM buffering.

Re: Malicious Software Protection

2012-03-27 Thread Hal Merritt
Actually, Greg's point number 2 is spot on. Upon close inspection, they actually be asking for some change control / management approval to protect sensitive load and source libraries. Over the years, I've found it helpful to not jump to conclusions when presented with such. Rather, press

Re: Theology question

2012-03-23 Thread Hal Merritt
An old trick: write the instructions first. Make them clear, easy to get it right, hard to screw up. Then write the code to implement the instructions as written. There may be some perceived technical need for null, splat, blank, or no value at all, but the difficulty in trying to explain to

Re: Execution Velocity

2012-03-22 Thread Hal Merritt
IIRC, 'execution velocity' is rooted in the ratio of the time spent waiting for the CPU and the time actually using the CPU. The 'mean time to wait' metric. But I think the CPU critical attribute pretty much negates the effects of velocity. I seem to recall a display or report somewhere that

Re: Interfacing with the MainFrame

2012-03-07 Thread Hal Merritt
'Screen scrapers' are a bad idea. BTDT. Using the credentials of the requestor is a good idea. FTP or some such can be too slow to be tolerable. I'd suggest a client that crafted a, say, CICS transaction using the user's credentials then format/display the result. However, you may be

Re: zSeries Manpower Sizing

2012-02-22 Thread Hal Merritt
As others have posted, there are just too many variables to include the nature of the workload and the management strategies. For example, a shop may not accept a job for production if it cannot be managed by exception by the job scheduler. That way, a crew of four can provide 7x24 coverage

Re: TLS, AT-TLS, Encryption Requirements

2012-02-09 Thread Hal Merritt
All of our TN3270 traffic is now under TLS. The PROFILE entries are a little strange as you have to define a port (unlike FTP). We use ICSF, so it's been on the whole time. Many say it is not a deal breaker requirement. I think that TLS is a superset of SSL, so they might talk ok. Getting

Re: Turning on additional CPs

2012-02-09 Thread Hal Merritt
I suppose that is reasonable for a single threaded, CPU bound job as a little is lost from each engine as another is added. However, you should be able to run more concurrent work giving a better over all through put. Another benefit of another engine is that, if not needed for anything else,

Re: Turning on additional CPs

2012-02-09 Thread Hal Merritt
to compete are now running and using resources other than CPU that used to be more plentiful in a CPU-starved environment. JC Ewing On 02/09/2012 12:04 PM, Hal Merritt wrote: I suppose that is reasonable for a single threaded, CPU bound job as a little is lost from each engine as another

Re: Acceptable paging

2012-02-08 Thread Hal Merritt
The number and size of paging volumes set an upper limit to the amount of virtual storage that can be in use at any one time across all address spaces. This alone does not impact paging rates. Only the amount of real storage affects paging rates. (Note: this may not be 100% technically true,

Re: ACF2 and LDS

2012-02-08 Thread Hal Merritt
I have no idea, but I'm going to guess the answer is: no. Reason is that LDAP is a relitivaly new kid on the block, and I would not expect meaningful support unless you were on the very latest versions of the software. Indeed, many LDAP featres wen't offered in RACF until very recently. But

Re: Intrdr

2012-02-01 Thread Hal Merritt
Plenty of ways to skin a cat and plenty of cats to skin :-) KISS is important here. The more complex the solution, the more fragile. Why not use the FTP strategy? That is, the STC drives a FTP process to submit the job and retrieve the result. This is a snap in REXX. One concern, if the STC

Re: S0C4 in CEE3DMP

2012-02-01 Thread Hal Merritt
Ok - we are assuming that this is an LE problem. Let's not do that. If we assume we are looking at a plain old application program bug, we'd be right 99.9% of the time, so let's do that. So, what is the most common causes of an 0C4? Storage overlay is at the top of my list. Take a look at

Re: S0C4 in CEE3DMP

2012-01-31 Thread Hal Merritt
Good call! Mixed versions of COBOL and LE runtimes are good places to start. Eliminating them isn't as easy as you might think if the environment is 'dirty'. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Staller, Allan Sent:

Re: COBOL Upgrade

2012-01-25 Thread Hal Merritt
The COBOL migration guide is your friend. Study it, believe it, trust it, and DO WHAT IT SAYS. One thing that just can't be stressed enough is to use one and only one version of the LE runtimes. Trying to user more than version/level be they in linklist, steplib, concantonation, etc etc etc

Re: Peculiar issue related to TSO logons

2012-01-11 Thread Hal Merritt
using HOD and PCOMM. But as soon as I closed the emulators, those sessions went away too. The plot thickens... Bob -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Hal Merritt Sent: Tuesday, January 10, 2012 2:07 PM To: IBM-MAIN@bama.ua.edu

Re: Peculiar issue related to TSO logons

2012-01-11 Thread Hal Merritt
the emulators, those sessions went away too. The plot thickens... Bob -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Hal Merritt Sent: Tuesday, January 10, 2012 2:07 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Peculiar issue

Re: Peculiar issue related to TSO logons

2012-01-10 Thread Hal Merritt
I've heard rumors of some multi session emulators hanging a LOGON but never responding to the prompt. I've also seen this with old VTAM terminals (issue a LOGON command, but then just walk away). To reproduce: open any TN3270 emulator, and issue a LOGON command. Don't respond, just shrink the

Re: ACF2/RACF User Appliation Logical Access

2012-01-10 Thread Hal Merritt
Neither RACF nor ACF2 ... validates a users access to specific applications Rather, both respond to queries from applications. How the query is crafted and what is done with the results is up to the application. Therefore, the place I'd focus is in the application manager's code. HTH

Re: APPLY RSU Question

2012-01-10 Thread Hal Merritt
Wise advice. We'll be here for you but there are limits to how much we can help. That's because we don't know exactly how you are doing things. As for justifying the cost to your management, point out that a good consultant will be happy to show you what is being done, how, and why. The

Re: APPLY RSU Question

2012-01-05 Thread Hal Merritt
Technically, no. A receive just loads the updates. The APPLY CHECK also does not change anything. But that does not matter. You shouldn't be running on a live system and shouldn't be pointing to live datasets. The APPLY does change things. Yes, backups are a very good idea. Also, you'll

Re: Eight-character TSO Userid Support

2012-01-03 Thread Hal Merritt
Yea, I complained about beling allowed to create the segment only to have it ignored and wondered why I wasn't warned when I defined it. I was politely pointed to the: IKJ56644I NO VALID TSO USERID, DEFAULT USER ATTRIBUTES USED ... as my warning/error message. I believe that RACF should

Re: Tapeless Solutions

2011-12-22 Thread Hal Merritt
It's called a DS8800. Works great, small footprint. Has many replication/backup options. I would guess that the TCO is actually less than most tape or VTS solutions. You might combine with HSM to enjoy some compression and management features. Of course, you can still be 'tapeless' and have

Re: z/OS MPFLSTxx vs Control-O for console message suppression.

2011-12-22 Thread Hal Merritt
That would depend on your third party product. Some would incur a huge overhead having to process all of the messages. Indeed, some older versions of NETVIEW simply couldn't handle an unfiltered load without a CPU upgrade. The MPF is easy/safe enough to change, so it might make sense to you to

Re: Question on scheduling security for TWS ad-hoc jobs

2011-12-22 Thread Hal Merritt
One possibility is to have the scheduler trigger upon the creation of a dataset. The dataset could be real (as in the input data), or an empty dataset just for triggering. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Jousma,

Re: Determining MSUs

2011-12-13 Thread Hal Merritt
There are potentially lots of MSU values depending on the capping strategy. David's suggested display should show all of them to you. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of David Andrews Sent: Friday, December 09, 2011 1:42

Re: CPU service units on z9 and z196

2011-11-25 Thread Hal Merritt
I seem to recall six or so buckets for CPU time, and you are using only two. More, my information may be way out of date and there may be several more buckets. So, my first guess is that you may want to identify and capture more of the CPU time buckets. -Original Message- From:

Re: Data encrypt

2011-11-16 Thread Hal Merritt
What is the built in scalar function encrypt/decrypt? But the short answer is almost always: yes. Every program that 'touches' the encrypted data will need to be reviewed at the very least, and many may need changes. Any program that needs the real data will then need access to the keys and

Re: Data encrypt

2011-11-15 Thread Hal Merritt
The cryptogram (encrypted customer number) should be unique and therefore usable as a file key as well as any other context. By simply changing the content of the field from customer number to encrypted customer number, the effect ripples throughout all of the resident files as well as

Re: ZNALC Option for LICENSE Parameter

2011-11-15 Thread Hal Merritt
How so? -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Timothy Sipples Sent: Saturday, November 12, 2011 1:41 AM To: IBM-MAIN@bama.ua.edu Subject: Re: ZNALC Option for LICENSE Parameter Walter Marguccio writes: under zNALC you

Re: Data encrypt

2011-11-15 Thread Hal Merritt
Many seem to think that encryption is easy to do. It is hard, very expensive, and carries a risk of irrevocable loss of data. I would think that management should select a team to plan the implementation. An early step in the planning process is to select the encryption algorithm to be

Re: Connect Direct - Performance and efficiency

2011-11-10 Thread Hal Merritt
Um, I'm pretty sure that native z/os FTP supports both compression and checkpoint/restart. Of course, this is z/os to z/os. Other platforms vary widely on their interoperability and features. Oddly enough, many of these other platform products use Windows strategies rather than the RFC's.

Re: Netview FTP - Hardware or software compression?

2011-11-02 Thread Hal Merritt
Netview and FTP are generally considered two separate things. The FTP supplied with z/os uses software compression if certain conditions are met. Hardware compression may occur downstream in the network appliances. -Original Message- From: IBM Mainframe Discussion List

Re: STP and Time Change

2011-11-01 Thread Hal Merritt
First, I'm a little confused. You guys never changed your clock in the past? If so, than how/why would NTP make a difference? Second, if the application is intolerant to the time change, then, well, it is intolerant. It's not so much that it will see 1 am twice, but it will also see 1:01,

Re: CRLF in Unix being translated on Mainframe to x'25'

2011-10-25 Thread Hal Merritt
First, my short list for unexpected/undesired translations is: Windows. IIRC, the only way to prevent this is to use the binary (image) FTP command -and- suffix the file .BIN. I do seem to recall a FTP option on some flavors of *nix that causes z/os to run the data all together. Some digging

Re: GDG

2011-10-25 Thread Hal Merritt
Use any suitable utility to create an empty file for use the first time. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Ron Thomas Sent: Tuesday, October 25, 2011 6:01 AM To: IBM-MAIN@bama.ua.edu Subject: GDG Hi, I have a

Re: WTO Sample Program

2011-10-06 Thread Hal Merritt
I think we seem to be missing a basic chicken-and-egg issue. If I understand, the OP wants to -originate- the message from the console and does not say who/what is the intended recipient. Other than the SEND command, no one seems to know of a way to accomplish the OP's mission. Maybe if we

Re: WTO Sample Program

2011-10-06 Thread Hal Merritt
outubro de 2011 12:41 Para: IBM-MAIN@bama.ua.edu Assunto: Re: WTO Sample Program Hal Merritt Posted: I think we seem to be missing a basic chicken-and-egg issue. If I understand, the OP wants to -originate- the message from the console and does not say who/what is the intended recipient. I think

Re: WTO Sample Program

2011-10-06 Thread Hal Merritt
Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Roberts, John J Sent: Thursday, October 06, 2011 10:41 AM To: IBM-MAIN@bama.ua.edu Subject: Re: WTO Sample Program Hal Merritt Posted: I think we seem to be missing a basic chicken-and-egg issue. If I understand, the OP wants to -originate

Re: WTO Sample Program

2011-10-05 Thread Hal Merritt
Not clear what you are asking. There is a console command SEND that can send a message to a logged on TSO user, or (I think) inject a message into a batch job's joblog. There is a TSO SEND command that can be used to send a message to another TSO user or to be displayed on a suitable

Re: DS8000 migration stories?

2011-10-04 Thread Hal Merritt
IMHO, the DS8000 family of machines is awesome. You're gonna love it. The DS8000 family is powerful, and that means that there is a learning curve. Hit IBM or the business partner for conversion services to be included with the price. With the right tools in experienced hands, the conversion

Re: Looking for recommendations for web hosting

2011-09-27 Thread Hal Merritt
I'd say your root issue is spam/malware filters. I'm seeing very large numbers of false positives on my personal email. But I know to check the filter frequently, many don't. My email service uses Postini, which at one time was said to be the best. I'm seeing false positive / false negative

Re: Looking for recommendations for web hosting

2011-09-27 Thread Hal Merritt
[mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Shmuel Metz (Seymour J.) Sent: Tuesday, September 27, 2011 2:11 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Looking for recommendations for web hosting In 1910aea19cd2554fb59403184ebe43810377a39...@mmoexchmbs01.jhacorp.com, on 09/27/2011 at 12:44 PM, Hal

Re: IMSDC 9.1 - FMTLIB

2011-09-22 Thread Hal Merritt
The words to search for is 'Message Format Serves' or MFS. The ideal is to split an IMS message into four components: the format displayed on the actual device, the format of the data to be mapped to the device format, the format of the message that is sent from the device, and the mapping to

Re: Suggestion for a Job running Under a Loop

2011-09-20 Thread Hal Merritt
Sorry, but a 'loop' is what programs do. The idea is to somehow figure out if the 'loop' is due to a bug or not. What you can do is set CPU time limits. They are easy enough to do, and easy enough to justify. HTH and good luck -Original Message- From: IBM Mainframe Discussion

Re: TN3270 Session Hangs

2011-09-15 Thread Hal Merritt
Sounds like a firewall issue in that it times out before the session. Many emulators have a 'keep alive' feature. Try that. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Bill Hecox Sent: Thursday, September 15, 2011 7:57 AM To:

Re: SLR columns size D_MIGR_SP mbyte gbyte

2011-09-08 Thread Hal Merritt
Oh my. This brings memories from long ago. At the risk of totally misrembering, I seem to recall how SLR seemed to be a lot alike the DB2 product that came out later. Tables, fields, and relationships were defined (declared) in much the same way. So, like DB2, you are looking for table and

Re: load mmodules copying to other site

2011-08-31 Thread Hal Merritt
Don't use binary for z/os to z/os. This defeats compression which can speed things up quite a bit. Use binary only when passing through a Windows machine to avoid unwanted translation/corruption. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu]

Re: load mmodules copying to other site

2011-08-31 Thread Hal Merritt
. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Paul Gilmartin Sent: Wednesday, August 31, 2011 11:28 AM To: IBM-MAIN@bama.ua.edu Subject: Re: load mmodules copying to other site On Wed, 31 Aug 2011 11:19:55 -0500, Hal Merritt wrote: Don't

Re: tape alloc workflow or diagram

2011-08-25 Thread Hal Merritt
The exact process varies depending on your specific environment. I seem to recall years ago the StorageTek had a document that explained the process and where they fit in. It was a pretty lengthy process as the allocation snaked its way through each of the LPAR's first for the unit and later

Visera 22l

2011-08-16 Thread Hal Merritt
I have a Visara 22L driving a Visara UCT-L thin client with a standard PC keyboard. The biggest problem I have with this setup is that it is so darned stable that one forgets out to do things :) I am looking for the key combinations, specifically how to get to the connection menu screen. This

Re: ABEND - 637-04

2011-08-16 Thread Hal Merritt
I would offer a third option: check to see that you are using the maximum permissible block size. If not, then do so. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Staller, Allan Sent: Tuesday, August 16, 2011 8:10 AM To:

Re: Console hang

2011-08-10 Thread Hal Merritt
My first guess is that a very high priority task (JES2, perhaps) is running flat out causing heavy degradation which could be perceived as a 'hang' condition. I seem to recall that a mass job submission could do this. Another possibility is a full pack backup on a system volume. Another

Re: IOPS benchmark

2011-08-09 Thread Hal Merritt
In modern DASD, 3390-3, 3390-9, 3390-whatever are just logical constructs. More, hopefully most all of the I/O looks like it is directed to a volume, but actually is satisfied in cache or buffers and never really touches the physical disk. -Original Message- From: IBM

Re: Not able to Access OMVS

2011-08-04 Thread Hal Merritt
Does the file exist? -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of saurabh khandelwal Sent: Thursday, August 04, 2011 3:22 PM To: IBM-MAIN@bama.ua.edu Subject: Not able to Access OMVS Hello, I am not able to login to

Re: LPAR - MSU capping

2011-08-02 Thread Hal Merritt
That depends on your licensing agreements. For most that are under a 'sub capacity' agreement (and submit a report to IBM once a month), then all you may need to adjust is the 'soft cap' and set the 'hard cap' to the machine capacity. If you are under a fixed capacity license, then set the

Re: FTP from IBM's book server

2011-08-02 Thread Hal Merritt
Is Softcopy Librarian truly 'Windows only'? Has anyone tried running it under the Mac emulator? -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Ed Gould Sent: Tuesday, August 02, 2011 10:23 AM To: IBM-MAIN@bama.ua.edu Subject: Re:

Re: z/os SSH question

2011-07-28 Thread Hal Merritt
Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Paul Gilmartin Sent: Wednesday, July 27, 2011 5:25 PM To: IBM-MAIN@bama.ua.edu Subject: Re: z/os SSH question On Wed, 27 Jul 2011 15:11:32 -0500, Hal Merritt wrote: If you distribute the keys they become public information, so then what's

Re: disclosing business information on the internet

2011-07-28 Thread Hal Merritt
IMNSHO, the risk is real. There are some reports that very carefully crafted personalized attacks are growing in number and are enjoying some success. My $0.02 -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Frank Swarbrick Sent:

Re: Eight Position TSO Logonid

2011-07-28 Thread Hal Merritt
Will passphrase support help? That's getting pretty pervasive, or so I'm told. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Donnelly, John P Sent: Wednesday, July 27, 2011 5:00 PM To: IBM-MAIN@bama.ua.edu Subject: Eight Position TSO

Re: RACF hierarchy

2011-07-27 Thread Hal Merritt
There is a report DSMON (ICHDSM00) that our auditors ask for. Try that. Check the RACF pubs for details. Here is my job: //S1 EXEC PGM=ICHDSM00 //SYSPRINT DD SYSOUT=* //SYSUT2DD SYSOUT=* //SYSIN DD * LINECOUNT 55 FUNCTION ALL

Re: z/os SSH question

2011-07-27 Thread Hal Merritt
If you distribute the keys they become public information, so then what's the point? Secret keys need to be kept secret. So, strictly speaking, each user would need a unique key that only they can access. -Original Message- From: IBM Mainframe Discussion List

Re: looking for documentation

2011-07-27 Thread Hal Merritt
Download IBM Softcopy Librarian: http://www-01.ibm.com/support/docview.wss?uid=swg24000640 Install that, then build your personal softcopy repository. Of course, I think all the manuals are readable online, but I like this a little better. Caution: do not try to run the Reader program while

Re: IBM announces up to 5% increase in monthly Entry WLC

2011-07-27 Thread Hal Merritt
Hehe you sure could have fooled me; better dancing than many sales folks. :-D Thanks. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Timothy Sipples Sent: Wednesday, July 27, 2011 2:43 AM To: IBM-MAIN@bama.ua.edu Subject: Re: IBM

Re: Esoteric SDSF CMD

2011-07-26 Thread Hal Merritt
That did not work for me. However, using ! (exclamation point) instead of + (plus sign) did work. Wonder why the difference. Thanks for the tip!! I like to SORT POS A to see jobs in order from oldest to newest. Also, supposedly the command I! may include jobs still in execution. Very handy

TLS/SSL Encryption strenght

2011-07-26 Thread Hal Merritt
My auditors want me to restrict the minimum encryption strength to 128 bits. I have pounded the FM's but did not find anything that might help. I found where I could specify what schemes to use, but nowhere could I find a complete list of supported/installed schemes that I could use to

Re: ONTOP?

2011-07-20 Thread Hal Merritt
You are already paying for this support, and it is usually much less expensive than trying to do it yourself even if you had the resources (training, code listings, doc, etc). More, diagnosis is usually much faster if the person is very familiar with the code. So, why not? -Original

Re: Main memory usage

2011-07-19 Thread Hal Merritt
I think the ROT (rule of thumb) is that zero or near zero paging means that there is ample real storage. If there is paging, then zero or close demand page in rates indicate that there is no degradation. Demand page in is synchronous which means that some workload(s) have to wait. Page out

Re: Automatic email of condition codes and stats

2011-07-19 Thread Hal Merritt
Personally I believe that exits are very expensive and introduce risk. But so are long running tasks, and especially those looking at sensitive data. Both are popular audit targets. In addition, this sounds like one of those gee-whiz things that is a fad that soon falls into disuse.

Re: Cluster is Open during backup

2011-07-14 Thread Hal Merritt
I'd look for the root problem - why the clusters are not being closed properly by the last to access them. This could be a window for logical corruption. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of jagadishan perumal Sent:

Re: Cluster is Open during backup

2011-07-14 Thread Hal Merritt
That's actually not that easy to do. Not something an end user should be able to do. If this is really an improper close, then the offending program(s) should be considered defective and repairs scheduled. If the programmer(s) plead otherwise, then is becomes a political issue. Any file

Re: Overriding client FTP . DATA

2011-07-13 Thread Hal Merritt
I think a key might be that the member name is often FTPCDATA. You might find FTPDATA as the general repository for both client and server, FTPCDATA for the client specific settings, and FTPSDATA for the server specific settings. We use the SYSFTPD DD for exceptions. I suppose you could

Re: How many CPU seconds can I consume per 10minutes?

2011-07-07 Thread Hal Merritt
Your graphic based on the number of engines online is a pretty clever idea. But I was thinking that the number of online engines was just one way to implement CoD. Do I misunderstand? Plus, as others have pointed out, clock seconds don't give us a feel for how well that work would run on

Re: Web version of mainframes

2011-07-06 Thread Hal Merritt
Your question is a little confusing. Actually, there seem to be two separate questions. Question one: can the MF be a web server? Answer: yes. But you need the applications. Question two: can my user access the MF from a wireless Internet connection? Answer: yes. Actually, this is a

Re: If you found used gum in the parking lot, would you chew it?

2011-07-06 Thread Hal Merritt
The root issue is that Windows, by design, appears to search every nook and cranny for any sort of an executable and, if found, execute it. And there are a mind numbing number of nooks and crannies. The last I heard, MS never did figure out how to completely disable the autorun facility. I

Re: How many CPU seconds can I consume per 10minutes?

2011-07-05 Thread Hal Merritt
A couple of things: A CPU second is a constant. It has nothing to do with the hardware. It is the approximate number of seconds where a given CPU was observed to be doing work as opposed to being in a wait state. How much work is done -is- a variable that does depend on the hardware. You

Re: Run Time and Compiler Libs.

2011-06-28 Thread Hal Merritt
Compliers, yes. Runtimes, no. As others have posted, the only supported runtimes are furnished as a part of LE, and LE is pervasive. The manuals pretty clearly state that non LE runtimes should be completely removed from the system least there be those dreaded 'unpredictable results.' Note:

Re: Automation Point and HMC for CPU

2011-06-24 Thread Hal Merritt
When setting something like this up for the first time, I think it prudent to assume that a firewall is going to complicate things at best. If both ends seem to be working but nothing is being exchanged, the 'man in the middle' would be a logical place to look. HTH and good luck

Re: Obtaining System Information from a COBOL program

2011-06-23 Thread Hal Merritt
I have to question why you would be doing file stuff while in key zero. It seems to me that you would not only run into the security issues that Walt noted, but also run a higher risk to the system should something go wrong in your program. I'm not questioning your need to be in key zero for

Re: Obtaining System Information from a COBOL program

2011-06-23 Thread Hal Merritt
IMNSHO, The appl owners don't 'need' to do the security. Indeed, many auditors will insist that they don't. The appropriate way is to explain to the security administrator what they want and be the requestors/approvers. Separation of duties not to mention a gaping hole for 'funny' code

Re: Production MIPS

2011-06-21 Thread Hal Merritt
The MIPS of a typical production mainframe would be greater than that needed to provide acceptable service levels. That can vary form the teens to the thousands. IBM, your business partner, or independent contractors have tools that use your SMF/RMF data to evaluate your unique workload

  1   2   3   4   5   6   7   8   9   10   >