How do you know it's a simple spam and not a hook for malware? That is, click
on the link out of curiosity and get infected.
Some say that if you are not paranoid then you just don't understand.But
others say how can you be paranoid if they really are out to get you?
-Original
As Radoslaw said, the answer is far more political than technical.
Indeed, some might offer the following:
Departmental budget/number of seconds in budget cycle/nCPU.
It also matters if the department is a cost center or a profit center.
-Original Message-
From: IBM Mainframe
Hammers, football games, and panties don't usualy have passwords. LinkedIn
isn't as pervasive as Yahoo, but does serve a higher value clientel, at least
in the US.
Major portals such as Yahoo, Google+, Hotmail, etc all do and I would say that
getting the word out about a major breech is a
I believe that these sizes are actually negotiated with each appliance in the
path. All it would take is one device configured such and all along that path
would follow suit.
I'd try a trace route on each path and compare the results. Then have the
network folks check the routers/firewalls in
software costs based on MIPS
In 1e7a8b5a967dfb42b888c2c05cfe0f5b047...@mmoex10mbs03.jhacorp.com,
on 05/30/2012
at 03:26 PM, Hal Merritt hmerr...@jackhenry.com said:
No ISV wants a pricing strategy that potentially reduces income.
Does that include a pricing policy that gives customers an incentive
No ISV wants a pricing strategy that potentially reduces income. And very few
will give in willingly.
There were some that stubbornly hung on to the old models and just refused to
budge. They are mostly gone now. This is double bad news for you if you have
one of these as you can't expect
I believe the general case is always need-to-know. That is, there needs to be
some business/technical justification for access.
The rational is to deny information to a potential intruder. I read that most
intruders are those that already have some level of access to the system.
I moved the object code out of the job stream into a parmlib like PDS. My job
scheduler was taking exception to the object code being in stream.
The JCL changes have been uncommon and not hard to hand jive.
-Original Message-
From: IBM Mainframe Discussion List
SU_SEC = SU_HOUR / (ENGINES * 60 * 60)
Not quite, I think. You don't get the full 60 seconds for each additional
engine. Better:
SU_SEC = SU_HOUR / ((ENGINES * 60 * 60)*FACTOR)
Where FACTOR is less than 1.0.
-Original Message-
From: IBM Mainframe Discussion List
Too many unknowns to be of much help.
Can't even begin to answer your question about what software would produce a
given corruption pattern; there are -so- many possibilities where a translation
might occur and thus corrupt the data. Indeed, the corruption might be as
massive as what you are
I'm not a lawyer and don't pretend to understand the ramifications, but this
sounds huge.
The result is that the court finds that ideas and principles which underlie
any element of a computer program are not protected by copyright under that
directive, only the expression of those ideas and
You answered your own question. 'Marketing names' are perceived to 'sound much
better than...' by marketing types.
The names may or may not reflect anything technical.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
R.S.
Sent:
We started with PPRC on Sharks, upgraded to XRC on DS8100's, then later added
GDPS. This has been stable plus or minus for a year or two and seems to be
working well.
I imagine that you'll find that details of your implementation will be somewhat
unique to your specific situation.
I read about such, um, issues a while back. Seems that there were more and more
shipboard systems, but each was evolving on its own way lacking a common
strategy. That means the systems were often fundamentally incompatible and
therefore unable to communicate. Sounds silly, but I think an
Indeed, Dr. Merrill literally 'wrote the book' on every performance issue known
to man (and a few known only to women) :-)
The manual that Lizette refers to evolved from that book.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Um, be careful about drawing any conclusions from a simple test other than the
syntax is close. Data sharing is a very complex issue with gotcha's aplenty.
You cannot possibly test every variation of access, update, and timings. The
VSAM folks have, IMHO, done a fine job of preventing you
10, 2012 at 11:27 AM, Hal Merritt hmerr...@jackhenry.comwrote:
But I can envision the Navy wanting a integrated situation where the
OIC could point to a target and click 'kill'. The ship would then use
all of its resources optimally to attack and destroy while, at the
same time, defending
We use the base (free) product for source only - we never could figure out how
to do C compiles.
I'd suggest the full product and some expert help in getting you going.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Scott Ford
, 2012 1:02 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Sclm
We've been using it for two or three years. Our only issue is that it requires
PDSEs, which, until last month, broke frequently.
Tom
- Original Message -
From: Hal Merritt [mailto:hmerr...@jackhenry.com]
Sent: Wednesday, April 04
One (of many) possible explanations is that there are more hits on the type 5
and more rewrites. Depending on your VSAM options, a rewrite can be -very-
expensive.
Try a comparison run without the type 4 logic.
Also try BLSR and DISP=OLD. That makes the best use of VSAM buffering.
Actually, Greg's point number 2 is spot on.
Upon close inspection, they actually be asking for some change control /
management approval to protect sensitive load and source libraries.
Over the years, I've found it helpful to not jump to conclusions when presented
with such. Rather, press
An old trick: write the instructions first. Make them clear, easy to get it
right, hard to screw up.
Then write the code to implement the instructions as written.
There may be some perceived technical need for null, splat, blank, or no value
at all, but the difficulty in trying to explain to
IIRC, 'execution velocity' is rooted in the ratio of the time spent waiting for
the CPU and the time actually using the CPU. The 'mean time to wait' metric.
But I think the CPU critical attribute pretty much negates the effects of
velocity. I seem to recall a display or report somewhere that
'Screen scrapers' are a bad idea. BTDT.
Using the credentials of the requestor is a good idea.
FTP or some such can be too slow to be tolerable.
I'd suggest a client that crafted a, say, CICS transaction using the user's
credentials then format/display the result.
However, you may be
As others have posted, there are just too many variables to include the nature
of the workload and the management strategies.
For example, a shop may not accept a job for production if it cannot be managed
by exception by the job scheduler. That way, a crew of four can provide 7x24
coverage
All of our TN3270 traffic is now under TLS. The PROFILE entries are a little
strange as you have to define a port (unlike FTP). We use ICSF, so it's been on
the whole time. Many say it is not a deal breaker requirement.
I think that TLS is a superset of SSL, so they might talk ok. Getting
I suppose that is reasonable for a single threaded, CPU bound job as a little
is lost from each engine as another is added. However, you should be able to
run more concurrent work giving a better over all through put.
Another benefit of another engine is that, if not needed for anything else,
to compete are now running and using resources other than CPU that used
to be more plentiful in a CPU-starved environment.
JC Ewing
On 02/09/2012 12:04 PM, Hal Merritt wrote:
I suppose that is reasonable for a single threaded, CPU bound job as a little
is lost from each engine as another
The number and size of paging volumes set an upper limit to the amount of
virtual storage that can be in use at any one time across all address spaces.
This alone does not impact paging rates. Only the amount of real storage
affects paging rates. (Note: this may not be 100% technically true,
I have no idea, but I'm going to guess the answer is: no.
Reason is that LDAP is a relitivaly new kid on the block, and I would not
expect meaningful support unless you were on the very latest versions of the
software. Indeed, many LDAP featres wen't offered in RACF until very recently.
But
Plenty of ways to skin a cat and plenty of cats to skin :-)
KISS is important here. The more complex the solution, the more fragile.
Why not use the FTP strategy? That is, the STC drives a FTP process to submit
the job and retrieve the result. This is a snap in REXX.
One concern, if the STC
Ok - we are assuming that this is an LE problem. Let's not do that. If we
assume we are looking at a plain old application program bug, we'd be right
99.9% of the time, so let's do that.
So, what is the most common causes of an 0C4? Storage overlay is at the top of
my list. Take a look at
Good call! Mixed versions of COBOL and LE runtimes are good places to start.
Eliminating them isn't as easy as you might think if the environment is
'dirty'.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Staller, Allan
Sent:
The COBOL migration guide is your friend. Study it, believe it, trust it, and
DO WHAT IT SAYS.
One thing that just can't be stressed enough is to use one and only one version
of the LE runtimes. Trying to user more than version/level be they in linklist,
steplib, concantonation, etc etc etc
using HOD and
PCOMM. But as soon as I closed the emulators, those sessions went away too. The
plot thickens...
Bob
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Hal Merritt
Sent: Tuesday, January 10, 2012 2:07 PM
To: IBM-MAIN@bama.ua.edu
the emulators, those sessions went away too.
The plot thickens...
Bob
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On
Behalf Of Hal Merritt
Sent: Tuesday, January 10, 2012 2:07 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Peculiar issue
I've heard rumors of some multi session emulators hanging a LOGON but never
responding to the prompt. I've also seen this with old VTAM terminals (issue a
LOGON command, but then just walk away).
To reproduce: open any TN3270 emulator, and issue a LOGON command. Don't
respond, just shrink the
Neither RACF nor ACF2 ... validates a users access to specific
applications Rather, both respond to queries from applications. How the
query is crafted and what is done with the results is up to the application.
Therefore, the place I'd focus is in the application manager's code.
HTH
Wise advice.
We'll be here for you but there are limits to how much we can help. That's
because we don't know exactly how you are doing things.
As for justifying the cost to your management, point out that a good consultant
will be happy to show you what is being done, how, and why. The
Technically, no. A receive just loads the updates. The APPLY CHECK also does
not change anything.
But that does not matter. You shouldn't be running on a live system and
shouldn't be pointing to live datasets.
The APPLY does change things.
Yes, backups are a very good idea. Also, you'll
Yea, I complained about beling allowed to create the segment only to have it
ignored and wondered why I wasn't warned when I defined it. I was politely
pointed to the:
IKJ56644I NO VALID TSO USERID, DEFAULT USER ATTRIBUTES USED
... as my warning/error message.
I believe that RACF should
It's called a DS8800. Works great, small footprint. Has many replication/backup
options. I would guess that the TCO is actually less than most tape or VTS
solutions.
You might combine with HSM to enjoy some compression and management features.
Of course, you can still be 'tapeless' and have
That would depend on your third party product. Some would incur a huge overhead
having to process all of the messages. Indeed, some older versions of NETVIEW
simply couldn't handle an unfiltered load without a CPU upgrade.
The MPF is easy/safe enough to change, so it might make sense to you to
One possibility is to have the scheduler trigger upon the creation of a
dataset. The dataset could be real (as in the input data), or an empty dataset
just for triggering.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Jousma,
There are potentially lots of MSU values depending on the capping strategy.
David's suggested display should show all of them to you.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
David Andrews
Sent: Friday, December 09, 2011 1:42
I seem to recall six or so buckets for CPU time, and you are using only two.
More, my information may be way out of date and there may be several more
buckets.
So, my first guess is that you may want to identify and capture more of the CPU
time buckets.
-Original Message-
From:
What is the built in scalar function encrypt/decrypt?
But the short answer is almost always: yes. Every program that 'touches' the
encrypted data will need to be reviewed at the very least, and many may need
changes.
Any program that needs the real data will then need access to the keys and
The cryptogram (encrypted customer number) should be unique and therefore
usable as a file key as well as any other context.
By simply changing the content of the field from customer number to encrypted
customer number, the effect ripples throughout all of the resident files as
well as
How so?
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Timothy Sipples
Sent: Saturday, November 12, 2011 1:41 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: ZNALC Option for LICENSE Parameter
Walter Marguccio writes:
under zNALC you
Many seem to think that encryption is easy to do. It is hard, very expensive,
and carries a risk of irrevocable loss of data. I would think that management
should select a team to plan the implementation.
An early step in the planning process is to select the encryption algorithm to
be
Um, I'm pretty sure that native z/os FTP supports both compression and
checkpoint/restart. Of course, this is z/os to z/os. Other platforms vary
widely on their interoperability and features. Oddly enough, many of these
other platform products use Windows strategies rather than the RFC's.
Netview and FTP are generally considered two separate things.
The FTP supplied with z/os uses software compression if certain conditions are
met. Hardware compression may occur downstream in the network appliances.
-Original Message-
From: IBM Mainframe Discussion List
First, I'm a little confused. You guys never changed your clock in the past? If
so, than how/why would NTP make a difference?
Second, if the application is intolerant to the time change, then, well, it is
intolerant. It's not so much that it will see 1 am twice, but it will also see
1:01,
First, my short list for unexpected/undesired translations is: Windows. IIRC,
the only way to prevent this is to use the binary (image) FTP command -and-
suffix the file .BIN.
I do seem to recall a FTP option on some flavors of *nix that causes z/os to
run the data all together. Some digging
Use any suitable utility to create an empty file for use the first time.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Ron Thomas
Sent: Tuesday, October 25, 2011 6:01 AM
To: IBM-MAIN@bama.ua.edu
Subject: GDG
Hi,
I have a
I think we seem to be missing a basic chicken-and-egg issue. If I understand,
the OP wants to -originate- the message from the console and does not say
who/what is the intended recipient.
Other than the SEND command, no one seems to know of a way to accomplish the
OP's mission.
Maybe if we
outubro de 2011 12:41
Para: IBM-MAIN@bama.ua.edu
Assunto: Re: WTO Sample Program
Hal Merritt Posted:
I think we seem to be missing a basic chicken-and-egg issue. If I understand,
the OP wants to -originate- the message from the console and does not say
who/what is the intended recipient.
I think
Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Roberts, John J
Sent: Thursday, October 06, 2011 10:41 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: WTO Sample Program
Hal Merritt Posted:
I think we seem to be missing a basic chicken-and-egg issue. If I understand,
the OP wants to -originate
Not clear what you are asking. There is a console command SEND that can send a
message to a logged on TSO user, or (I think) inject a message into a batch
job's joblog.
There is a TSO SEND command that can be used to send a message to another TSO
user or to be displayed on a suitable
IMHO, the DS8000 family of machines is awesome. You're gonna love it.
The DS8000 family is powerful, and that means that there is a learning curve.
Hit IBM or the business partner for conversion services to be included with the
price. With the right tools in experienced hands, the conversion
I'd say your root issue is spam/malware filters. I'm seeing very large numbers
of false positives on my personal email. But I know to check the filter
frequently, many don't. My email service uses Postini, which at one time was
said to be the best. I'm seeing false positive / false negative
[mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Shmuel Metz (Seymour J.)
Sent: Tuesday, September 27, 2011 2:11 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Looking for recommendations for web hosting
In
1910aea19cd2554fb59403184ebe43810377a39...@mmoexchmbs01.jhacorp.com,
on 09/27/2011
at 12:44 PM, Hal
The words to search for is 'Message Format Serves' or MFS. The ideal is to
split an IMS message into four components: the format displayed on the actual
device, the format of the data to be mapped to the device format, the format of
the message that is sent from the device, and the mapping to
Sorry, but a 'loop' is what programs do. The idea is to somehow figure out if
the 'loop' is due to a bug or not.
What you can do is set CPU time limits. They are easy enough to do, and easy
enough to justify.
HTH and good luck
-Original Message-
From: IBM Mainframe Discussion
Sounds like a firewall issue in that it times out before the session. Many
emulators have a 'keep alive' feature. Try that.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Bill Hecox
Sent: Thursday, September 15, 2011 7:57 AM
To:
Oh my. This brings memories from long ago. At the risk of totally misrembering,
I seem to recall how SLR seemed to be a lot alike the DB2 product that came
out later. Tables, fields, and relationships were defined (declared) in much
the same way.
So, like DB2, you are looking for table and
Don't use binary for z/os to z/os.
This defeats compression which can speed things up quite a bit. Use binary only
when passing through a Windows machine to avoid unwanted
translation/corruption.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu]
.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Paul Gilmartin
Sent: Wednesday, August 31, 2011 11:28 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: load mmodules copying to other site
On Wed, 31 Aug 2011 11:19:55 -0500, Hal Merritt wrote:
Don't
The exact process varies depending on your specific environment. I seem to
recall years ago the StorageTek had a document that explained the process and
where they fit in. It was a pretty lengthy process as the allocation snaked its
way through each of the LPAR's first for the unit and later
I have a Visara 22L driving a Visara UCT-L thin client with a standard PC
keyboard. The biggest problem I have with this setup is that it is so darned
stable that one forgets out to do things :)
I am looking for the key combinations, specifically how to get to the
connection menu screen. This
I would offer a third option: check to see that you are using the maximum
permissible block size. If not, then do so.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Staller, Allan
Sent: Tuesday, August 16, 2011 8:10 AM
To:
My first guess is that a very high priority task (JES2, perhaps) is running
flat out causing heavy degradation which could be perceived as a 'hang'
condition.
I seem to recall that a mass job submission could do this.
Another possibility is a full pack backup on a system volume.
Another
In modern DASD, 3390-3, 3390-9, 3390-whatever are just logical constructs.
More, hopefully most all of the I/O looks like it is directed to a volume, but
actually is satisfied in cache or buffers and never really touches the physical
disk.
-Original Message-
From: IBM
Does the file exist?
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
saurabh khandelwal
Sent: Thursday, August 04, 2011 3:22 PM
To: IBM-MAIN@bama.ua.edu
Subject: Not able to Access OMVS
Hello,
I am not able to login to
That depends on your licensing agreements.
For most that are under a 'sub capacity' agreement (and submit a report to IBM
once a month), then all you may need to adjust is the 'soft cap' and set the
'hard cap' to the machine capacity.
If you are under a fixed capacity license, then set the
Is Softcopy Librarian truly 'Windows only'? Has anyone tried running it under
the Mac emulator?
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Ed Gould
Sent: Tuesday, August 02, 2011 10:23 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re:
Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Paul Gilmartin
Sent: Wednesday, July 27, 2011 5:25 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: z/os SSH question
On Wed, 27 Jul 2011 15:11:32 -0500, Hal Merritt wrote:
If you distribute the keys they become public information, so then what's
IMNSHO, the risk is real. There are some reports that very carefully crafted
personalized attacks are growing in number and are enjoying some success.
My $0.02
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Frank Swarbrick
Sent:
Will passphrase support help? That's getting pretty pervasive, or so I'm told.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Donnelly, John P
Sent: Wednesday, July 27, 2011 5:00 PM
To: IBM-MAIN@bama.ua.edu
Subject: Eight Position TSO
There is a report DSMON (ICHDSM00) that our auditors ask for. Try that. Check
the RACF pubs for details. Here is my job:
//S1 EXEC PGM=ICHDSM00
//SYSPRINT DD SYSOUT=*
//SYSUT2DD SYSOUT=*
//SYSIN DD *
LINECOUNT 55
FUNCTION ALL
If you distribute the keys they become public information, so then what's the
point? Secret keys need to be kept secret.
So, strictly speaking, each user would need a unique key that only they can
access.
-Original Message-
From: IBM Mainframe Discussion List
Download IBM Softcopy Librarian:
http://www-01.ibm.com/support/docview.wss?uid=swg24000640
Install that, then build your personal softcopy repository.
Of course, I think all the manuals are readable online, but I like this a
little better.
Caution: do not try to run the Reader program while
Hehe you sure could have fooled me; better dancing than many sales folks. :-D
Thanks.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
Timothy Sipples
Sent: Wednesday, July 27, 2011 2:43 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: IBM
That did not work for me. However, using ! (exclamation point) instead of +
(plus sign) did work. Wonder why the difference.
Thanks for the tip!!
I like to SORT POS A to see jobs in order from oldest to newest. Also,
supposedly the command I! may include jobs still in execution. Very handy
My auditors want me to restrict the minimum encryption strength to 128 bits. I
have pounded the FM's but did not find anything that might help. I found where
I could specify what schemes to use, but nowhere could I find a complete list
of supported/installed schemes that I could use to
You are already paying for this support, and it is usually much less expensive
than trying to do it yourself even if you had the resources (training, code
listings, doc, etc).
More, diagnosis is usually much faster if the person is very familiar with the
code.
So, why not?
-Original
I think the ROT (rule of thumb) is that zero or near zero paging means that
there is ample real storage. If there is paging, then zero or close demand
page in rates indicate that there is no degradation.
Demand page in is synchronous which means that some workload(s) have to wait.
Page out
Personally I believe that exits are very expensive and introduce risk. But so
are long running tasks, and especially those looking at sensitive data. Both
are popular audit targets.
In addition, this sounds like one of those gee-whiz things that is a fad that
soon falls into disuse.
I'd look for the root problem - why the clusters are not being closed properly
by the last to access them. This could be a window for logical corruption.
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of
jagadishan perumal
Sent:
That's actually not that easy to do. Not something an end user should be able
to do.
If this is really an improper close, then the offending program(s) should be
considered defective and repairs scheduled. If the programmer(s) plead
otherwise, then is becomes a political issue.
Any file
I think a key might be that the member name is often FTPCDATA. You might find
FTPDATA as the general repository for both client and server, FTPCDATA for the
client specific settings, and FTPSDATA for the server specific settings.
We use the SYSFTPD DD for exceptions.
I suppose you could
Your graphic based on the number of engines online is a pretty clever idea.
But I was thinking that the number of online engines was just one way to
implement CoD. Do I misunderstand?
Plus, as others have pointed out, clock seconds don't give us a feel for how
well that work would run on
Your question is a little confusing. Actually, there seem to be two separate
questions.
Question one: can the MF be a web server? Answer: yes. But you need the
applications.
Question two: can my user access the MF from a wireless Internet connection?
Answer: yes. Actually, this is a
The root issue is that Windows, by design, appears to search every nook and
cranny for any sort of an executable and, if found, execute it. And there are a
mind numbing number of nooks and crannies.
The last I heard, MS never did figure out how to completely disable the autorun
facility. I
A couple of things:
A CPU second is a constant. It has nothing to do with the hardware. It is the
approximate number of seconds where a given CPU was observed to be doing work
as opposed to being in a wait state. How much work is done -is- a variable that
does depend on the hardware. You
Compliers, yes. Runtimes, no. As others have posted, the only supported
runtimes are furnished as a part of LE, and LE is pervasive.
The manuals pretty clearly state that non LE runtimes should be completely
removed from the system least there be those dreaded 'unpredictable results.'
Note:
When setting something like this up for the first time, I think it prudent to
assume that a firewall is going to complicate things at best. If both ends seem
to be working but nothing is being exchanged, the 'man in the middle' would be
a logical place to look.
HTH and good luck
I have to question why you would be doing file stuff while in key zero. It
seems to me that you would not only run into the security issues that Walt
noted, but also run a higher risk to the system should something go wrong in
your program.
I'm not questioning your need to be in key zero for
IMNSHO, The appl owners don't 'need' to do the security. Indeed, many auditors
will insist that they don't. The appropriate way is to explain to the security
administrator what they want and be the requestors/approvers. Separation of
duties not to mention a gaping hole for 'funny' code
The MIPS of a typical production mainframe would be greater than that needed to
provide acceptable service levels. That can vary form the teens to the
thousands.
IBM, your business partner, or independent contractors have tools that use
your SMF/RMF data to evaluate your unique workload
1 - 100 of 1345 matches
Mail list logo