IBM fixed IEBGENER to not clobber the SYSUT2 directory. Changing the behavior
of OPEN would have broken a lot of code.
The decision that file globbing should be in the shell makes it much more
fragile than it would otherwise have been. I prefer the TSO approach of proving
services and letting
> Probably there's a "dusty deck" somewhere whose inexcusably clever
> author relied on the behavior
Well, you can certainly see some JCL somewhere where there is for example
// SET DSN1=SOME.PDS(FOO)
And there are a bunch of references to DSN=, most of which really "want"
the member
"When the only tool you have is a pipe, everything looks like a filter."
--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of
Paul Gilmartin
https://opensource.com/business/14/12/linux-philosophy
On Thu, 5 Nov 2020 06:46:15 -0800, Charles Mills wrote:
>What the heck were the UNIX designers thinking when they allowed the casual
>creation of a filename of -x? There may be a legitimate reason why someone
>would want to create a file
According to here:
https://www.ibm.com/support/knowledgecenter/HW213_7.2.0/com.ibm.storage.ssic.help.doc/f2c_drivesets.html
You might need feature code 1754 to deactivate encryption...
Joe
On Thu, Nov 5, 2020 at 10:39 AM Sonny Gupta wrote:
> Hello All, I have run into a unique problem with a
> -Original Message-
> From: IBM Mainframe Discussion List On
> Behalf Of R.S.
> Sent: Thursday, November 05, 2020 4:20 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: JES2 Policies
>
> Joe,
>
> And I'm pretty sure no business department is interested in ACCNT field
> and its content.
Eunix was designed for a PDP-7, and we are suffering from some of the design
decisions made then. But the myth of windows being user friendly is just a
myth; the reality is quite different. So, yes, z/OS suffers from some really
bad decisions made decades ago, but so do the other systems. The
It's fine that UNIX is designed for professionals but (a.) some of us are
professionals at many things but have to use UNIX only occasionally; and (b.)
no one is born a professional. If you make it hard for folks to get started as
non-professionals, then they will gravitate elsewhere and become
Let me update this a little. When I said "professional", I should have said
something like "power user" in today's vernacular. The shell is a field
full of mines for those who are not familiar with it. I've been using Linux
for about 20 years, and I still get tripped up at times with BASH. I
Caution -- tacky in-line comment.
On Thu, Nov 5, 2020 at 8:46 AM Charles Mills wrote:
> What the heck were the UNIX designers thinking when they allowed the
> casual creation of a filename of -x?
They were thinking that UNIX is for professionals who know what they're
doing and didn't want to
Hello All, I have run into a unique problem with a DS8870 that I recently
acquired.
The DS8870 is not using encryption and when we try to replace the drives, we
are receiving following error: The DS8700 is not under IBM Maintenance.
2107-104 Error from Action applicationLevelActivateRepair.
Step 1 I would put the default CLASS= in every job. Easier to change
the default than add a new line.
On Thu, Nov 5, 2020 at 6:09 AM R.S. wrote:
>
> Now we know more. Maybe still not enough ;-)
> However we may assume:
> a) there is finite number of the jobs
> b) you know all the jobs - that
What the heck were the UNIX designers thinking when they allowed the casual
creation of a filename of -x? There may be a legitimate reason why someone
would want to create a file named -x but if so, then *they* should be made to
jump through some small hoop and "escape" the name in some way.
Skippy, a number of misapprehensions in there.
A certificate never "consists of a public and private key." A certificate
contains a public key, and somewhere there is a corresponding private key. A
PKCS12 package may contain both the certificate and the private key, but a
certificate itself
Sorry FTPS - x.509 certs need to be exchanged and loaded onto the RACF keyring
specified in the TLS rule in PAGENT and if you have client auth enabled the
cert will need to be on the client PC/Device also
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of
Marshall
Public keys need to be exchanged between partners - client stores it usually in
a file called /etc/ssh/known_hosts - server stores public key in
/u/userid/.ssh/authorized_keys
MS
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of
Skippy the Ancient
Sent: Thursday,
I am asking in regards to FTPS.
I know gskkyman can create/import/export certs. The cert consists of a public
and private key.
I'm asking because it's my understanding that the public key should be loaded
up and installed on a client computer. Is that correct?
When looking at a directory full
On 11/4/2020 12:35 PM, Bill Giannelli wrote:
We have software at 2 different maintenance levels, with separate CSIs and
zones.
Is there a report I can run to compare the maintenance levels and get the holddata needed
for the "higher level" maintenance?
I hope my question makes sense.
thanks
That was the first place I looked. It mentions key 0 and supervisor mode, but
no more.
--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of
Mike Myers
Part of real need is complying with lawful management edicts, even when they
are not wise. You have an obligation to point out the problems, but if
management wants to do it regardless, then you must shut up and code.
Of course, in that situation it is prudent to retain an audit trail showing
Joe,
This is not my call (honestly I don't know this idiom). This is not my
dog, this is not my business.
I can leave it with no answer, but my willing is to help.
And part of the help is not to just code the exit, but discuss about
solution.
And I'm pretty sure no business department is
Now we know more. Maybe still not enough ;-)
However we may assume:
a) there is finite number of the jobs
b) you know all the jobs - that means all PDS/PDSE's with the jobs. No
secret libraries, no forgotten user libraries, etc.
c) the jobs are not generated dynamically by some "black box" tool,
"However I think it not valid
requirement, there is no business need behind it."
Thats not your call to make. They are entitled to run their business how
they see fit.
Joe
On Thu, Nov 5, 2020 at 5:53 AM R.S. wrote:
> W dniu 04.11.2020 o 19:50, Lizette Koehler pisze:
> > Can RACF see the
W dniu 04.11.2020 o 19:50, Lizette Koehler pisze:
Can RACF see the account code and make a decision?
Obviously not. RACF is also unable to see submitters trousers, check how
many days left to nearest holiday, etc.
That is what (as I understand it) the initial requirement is.
Yes, that
W dniu 04.11.2020 o 19:29, Lizette Koehler pisze:
[...]
I worked in a shop with over 500 exits in JES2/zOS/Vtam etc... Each upgrade
took longer to do - basically do to validation of the code. One upgrade we
decided to reduce that down and let the system perform its own functions. Went
Seymour:
I found this also which shows an example of a seldom-ending channel
program, used in a communications function.
Channel program for HPDT MPC data transfer
z/OS Communications Server: SNA Diagnosis Vol 1, Techniques and Procedures
Pretty cool. Thanks for this jogging my memory
Probably using an exit, or maybe more than one.
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of
kekronbekron
Sent: Thursday, November 5, 2020 10:12 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: JES2 Policies
Is it an option to ask how they managed this in the
Is it an option to ask how they managed this in the source site?
- KB
‐‐‐ Original Message ‐‐‐
On Thursday, November 5, 2020 10:51 AM, Gadi Ben-Avi wrote:
> Hi Everone.
> Thanks for responding.
>
> We 'purchased' a system from another site.
> The jobs that came with the system do not
Seymour:
I found there is documentation online. I searched for: IBM z/OS EXCP
appendage and came back with a hit:
EXCP and EXCPVR Appendages
in
z/OS DFSMSdfp Advanced Services
It has been several years, but I have explored use of the appendages
dating back to OS/360, where I used to teach
29 matches
Mail list logo