The total value (market capitalization) of Yahoo has steadily declined over
the past several years. Maybe they could try something different, like
protecting their users' mailboxes and address books (while they deliver ads
to them).
Yahoo's fundamental business problem is that they've been losing
Hello, we have a job that was previously using Innovation's IAM file access
method. The file is over 6 million records. The job runs twice yearly and
usually takes an hour or less to complete. The product was removed to save on
SW costs, and the file was converted to VSAM. The programmer
In 886132E644ECAE808EED6EEFA317@graham, on 07/17/2012
at 11:15 AM, Graham Hobbs gho...@cdpwise.net said:
When someone uses the underscores between some words .. what does
that mean?
Underscore. ITYM when somebody uses underscore *around* a word. In
that case it means the same as
In
ofae475794.d0761284-on48257a3e.001cb9f7-48257a3e.001fa...@us.ibm.com,
on 07/17/2012
at 01:45 PM, Timothy Sipples timothy.sipp...@us.ibm.com said:
Most coffee shops, hotels, etc. still don't use encrypted wi-fi.
Bletch! I'd better check what my local library uses, if anything.
3. The
In
9b26bc6a6df52d4483dd73b1fe7b4b0658b83d6...@uspho-mxvs07.amer.thermo.com,
on 07/18/2012
at 10:37 AM, Hardee, Chuck chuck.har...@thermofisher.com said:
Uh, I don't think so.
You're thinking CLIST not REXX.
I doubt it. What he wrote was 'The problem is that ISPF/ISREDIT
evaluates/substitutes
On Thu, 19 Jul 2012 10:19:28 +0100, Rupert Reynolds wrote:
There is no need to send edit commands via ISPEXEC anyway:-)
What was the rationale for making the initial host command environment
when an edit macro is entered TSO rather than the obvious ISREDIT?
Was it merely that the ISPF
Shmuel ! A previous reply also suggested SCAN OFF. I tried it, just
tried it again, and it makes no difference. Please look at the example I
sent before and try it yourself.
From: Shmuel Metz (Seymour J.) shmuel+...@patriot.net
To: IBM-MAIN@LISTSERV.UA.EDU
Date: 07/19/2012 05:26 AM
Dave,
The application is CIMS. Are there any users of CIMS out there who could shed
some light on why VLSHRT is required?
Do you mean CIMS Mainframe, which IBM rebranded as TDSz Usage and Accounting
Collector (UAC)? If so, you might contact me off-list for specific application
questions.
Use a TOR connection. With that, you have a SSL/TLS encoded connection from
your PC to a local TOR router. And it bounces around in the TOR network until
it exits for a TOR end point to then go to the actual site you want. The site
doesn't know where you came from initially because it only sees
Shmuel ! I sent my original source, and it was REXX. Having a few spare
moments, I quickly converted the REXX to CLIST and all of the FIND's
worked as a clist. Oddly, they work with or withOUT SCAN OFF. Whether
the problem belongs to ISPF, REXX, or both is not my problem. These
commands
That's strange, they work fine as Rexx for me:
JCL: Note line 4
//REMOTE DD DISP=SHR,DSN=MSYS.UCMD.REMOTEPDQR.(SYSTEM)
//REMOTE DD DISP=SHR,DSN=MSYS.UCMD.REMOTEPDQR.(SYSTEM)
//REMOTE DD DISP=SHR,DSN=MSYS.UCMD.REMOTEPDQR(SYSTEM)
//* TEST LINE TO BE X ALL'ED AND NOT FOUND IN FIND ALLS
Thomas David Rivers wrote:
I'm debugging a program (no source), and trying to
figure out what BDAM does when the READ macro
is invoked without a BLKREF relative-block-address
specified.
This is an RBA-type BDAM, and I'm seeing a READ
where the BLKREF in the DECB is simply X'0'.
Binyamin
Hi,
Like others have suggested BLSR or SMB ACCBIAS=DO is the way to go if the
VSAM is accessed in a non-sequential manner (which seems to be the case,
giving the IAM vs. VSAM performance difference you've encountered).
Also, from the LISTCAT, if I read it correctly, many records seem to be
From original post, the job in question is only reading the file.
Any updates are done elsewhere, which at this point haven't yet been
described as a performance issue. BLSR Deferred writes could be useful
in other cases (not here) when a large number of updates are being done
in a batch job,
Yes, the updates are done outside this job. I've received a lot of good tips
from the list. Thank you very much everyone. Apparently, BLSR is not
activated, we get subsys not found message when we try that. I've asked our
systems folks to verify that and why not if that is the case. But,
And the grand prize goes to Tom Ambros
Yes, use DOUBLE AMPERSANDS in REXX and the FINDs work properly.
So simple when we finally see it. Many thanks to everyone.
From: Tom Ambros thomas_amb...@keybank.com
To: IBM-MAIN@LISTSERV.UA.EDU
Date: 07/19/2012 07:58 AM
Subject:
On Thu, 19 Jul 2012 09:12:54 -0700, John Mattson wrote:
And the grand prize goes to Tom Ambros
Yes, use DOUBLE AMPERSANDS in REXX and the FINDs work properly.
So simple when we finally see it. Many thanks to everyone.
So is the behavior of EDIT different when identical command
strings are
Different in CLIST or Rexx? Not according to the documentation.
From the Edit and Edit Macros doc:
Section 3.3.80 SCAN--Set Command Scan Mode
Examples
To set a line whose number is in variable LNUM to:
SYSDATE is a CLIST built-in function
set scan mode off and issue the
If the record count given is accurate (6.7M) and if the average record
length given (80) is realistic, then on the average a full data CI
should be able to hold around 51 records, a 3390 track around 612
records, and the full data portion fit in as few as 11,062 tracks, which
is 5.6% of the
not sure if you had an updated response for this, though there is no EOS
announcement IBM has a note regarding their strategic direction and
recommending to not use EKM for new encryptions @ following URL
EKM should no longer be downloaded for new tape encryption installations.
AFAIK that's old news. We're still running EKM and haven't found a
compelling reason to migrate to ISKLM. As long as Java SDK 6.0 is
supported, and we don't get any new hardware that requires the priced
product we're staying on EKM,
Mark Jacobs
On 07/19/12 14:08, Raja Mohan wrote:
not sure
Wow, the programmer dropped the bufsp parm, and his run time actually was
better than before with IAM - under an hour. Again, many thanks to all who
replied. If any of you are ever in St. Louis, let me know, and I'll buy you a
cold adult beverage.
Larry Brown
Rural Development
U.S.
cold adult beverage. Hum, 18 year old iced tea? Or perhaps you meant Macallan
18. Very generous of you: $139.99 for 750 ml at Amazon. Of course, 18 is in the
U.S. More adult would be 21, but that's $235.99 for 750 ml.
--
John McKown
Systems Engineer IV
IT
Administrative Services Group
SImple READ DI - no key.
I would think that you would have to give a starting block address for a
direct read. But it has been many years since I wrote BDAM code.
On Thu, 19 Jul 2012 11:00:08 -0400 Thomas David Rivers riv...@dignus.com
wrote:
:Thomas David Rivers wrote:
:
: I'm debugging a
Prompted a quick look in manual which reveals A valid BUFSP
specification generally overrides any BUFND or BUFNI specification, and
then of course the default rules for how buffers are apportioned to
Index and Data from BUFSP space is rarely what you want, as VSAM may not
have enough info at
Tom,
Thanks for catching my mistake. I read too quickly. Yes, the SRM constants
aren't speed ratings at all.
The part that is relevant is this: the ratio of MIPS per CP is the best way
for Charles to estimate the CPU time of his job on the new processor. As
another lister pointed out,
There is a subtle and dangerous difference with ISREDIT FIND / CHANGE in
REXX.
Say you have a simple change command and forget to use rather than
/* REXX */
TRACE I
ADDRESS ISPEXEC
ISREDIT MACRO (MEM) NOPROCESS
CONTROL ERRORS RETURN
ISREDIT SCAN OFF
ISREDIT C ALL 'DISP=SHR,DSN=AAA'
I am making changes to make re-entrant our assembler routines that are called
by COBOL programs. I'm trying to decide what are the best default options for
the program binder. It appears that if the option REUS=RENT is given to the
binder then the executable (PO or load module) is given the
28 matches
Mail list logo