LE does that. It uses CICS storage.
On Wed, 3 Mar 2021 21:38:39 -0500 Brian Chapman wrote:
:>As a CICS SysProg, this makes me cringe. I would highly recommend rewriting
:>your program to conform to CICS standards, and use CICS to acquire the
:>storage for you. Take a look at the CICS prolog and
Hello
We are analysing if EMC DLM would be a right fit to replace IBM VTL.
I am trying to understand about backup cycles using EMC DLM when we use
single backup solution and single virtual tape library to backup both
mainframe and open systems.
Is there a possibility for contention ?
Will
If I understand zosmf is going to connect to IBM site over the internet to
download it's software.What if a mainframe data centre which doesn't
connect to internet or have restrictions ?
On Thu, 4 Mar, 2021, 6:48 am Ed Jaffe, wrote:
> On 3/3/2021 2:54 PM, Radoslaw Skorupka wrote:
> > I hate it!
On 3/3/2021 2:54 PM, Radoslaw Skorupka wrote:
I hate it!
IMHO there should be "vacation legis" - a period of coexistence of two
methods. Yes, there is some period, but it should be definitely longer.
When I first heard about this, there was no overlap period at all. There
must have been
As a CICS SysProg, this makes me cringe. I would highly recommend rewriting
your program to conform to CICS standards, and use CICS to acquire the
storage for you. Take a look at the CICS prolog and epilog macros with the
DFHEISTG macro. These macros make this super simple and I would wager that
I was hoping for Radoslaw Skorupka V2R5.
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Radoslaw Skorupka
Sent: Wednesday, March 3, 2021 2:51 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: z/OS v2r5 - Cert fingerprint
Typo!
+1 to Binyamin's answer. I have several assembler called subroutines that run
in either CICS or batch but they are all LE enabled (CEEENTRY / CEETERM macros
et. al.).
LE is your friend here. CICS automatically accommodates LE storage requests
from CICS user storage so operation of the
.
As many have already pointed out this is not a Trival effort.
And as I have worked on several of these solutions let my add my two cents.
.
To issue MVS Services within CICS You MUST be running on a Thread Safe Open TCB
(I think its an L8 TCB), YOU MUST NOT BE running under the QR TCB.
BUT !!
-- Original Message --
From: "Savor, Thomas" <0330b7631be3-dmarc-requ...@listserv.ua.edu>
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Acquire Storage
Date: Wed, 3 Mar 2021 21:30:04 +
Ok, got a question for you CICS Assembler folks.
I have a CICS Assembler program that works
I hate it!
IMHO there should be "vacation legis" - a period of coexistence of two
methods. Yes, there is some period, but it should be definitely longer.
--
Radoslaw Skorupka
(looking for new job)
Lodz, Poland
W dniu 03.03.2021 o 20:33, Dave Jousma pisze:
Well, it was foreshadowed here on
Typo!
*IT* was announced.
--
Radoslaw Skorupka
(looking for new job)
Lodz, Poland
W dniu 03.03.2021 o 18:29, Charles Mills pisze:
And here I was, busy coding.
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Radoslaw
If ACF2 doesn't start UADS usage becomes the norm for logging into TSO. The
MVS or Z/OS, has a definition to allocate UADS. Trying to recall where the
allocation for it is sine it has been a while, but I believe it is in the
Master JCL which in z/OS it is in Parmlib. From there it finds it
Im running in USER keyits an application program
Programs are AMODE(31) RMODE(ANY)
Thanks,
Tom
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of
Binyamin Dissen
Sent: Wednesday, March 3, 2021 5:09 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: EXTERNAL: Re: Acquire
I would recommend going to LE and let it take care of things.
You must consider whether you are using storage protection in which case you
are running in key9.
On Wed, 3 Mar 2021 21:30:04 + "Savor, Thomas"
<0330b7631be3-dmarc-requ...@listserv.ua.edu> wrote:
:>Ok, got a question for you
If ACF2 doesn't start, z/OS will default to the SAF interface, and WTOR for
access.
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of
John Lock
Sent: Wednesday, March 3, 2021 5:00 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Where UADS dataset name goes in case of
Itschak, Your post piqued my interest, but it’s around 35 years since I
was actually involved in RACF, ACF2, TSS and some other non-starters.
I can’t really help further. Sorry!
On Wed, Mar 3, 2021 at 15:23 Itschak Mugzach <
0305158ad67d-dmarc-requ...@listserv.ua.edu> wrote:
> John,
>
> I
You might want to read up on CICS storage protection and transaction
isolation, see
https://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/applications/designing/dfhp34g.html
On Thu, Mar 4, 2021 at 8:30 AM Savor, Thomas <
0330b7631be3-dmarc-requ...@listserv.ua.edu> wrote:
> Ok, got a
Tom,
One thing to check is the AMODE and RMODE, of all the programs and where the
OBTAIN is getting the vStorage from.
Jerry
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of
Savor, Thomas
Sent: Wednesday, March 3, 2021 4:30 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject:
Ok, got a question for you CICS Assembler folks.
I have a CICS Assembler program that works fineits Re-Entrant of course.
Now I also have some Assembler Sub-programs that can run in Batch.
And I want to add them to my Online Program.
But...in order to be able to execute in Online it needs
The issue here is fallback. Not production run.
*| **Itschak Mugzach | Director | SecuriTeam Software **|** IronSphere
Platform* *|* *Information Security Continuous Monitoring for Z/OS, zLinux
and IBM I **| *
*|* *Email**: i_mugz...@securiteam.co.il **|* *Mob**: +972 522 986404 **|*
*Skype**:
SYSUADS in MSTJCL**
On Wed, 3 Mar 2021 20:39:54 +0200 Itschak Mugzach
<0305158ad67d-dmarc-requ...@listserv.ua.edu> wrote:
:>UADS is in a bypass state. However, I still wonder what happens if ACF2
:>fails to start and we need to authenticate with UADS. Where is the UADS
:>dataset name saved?
On Wed, 3 Mar 2021, at 20:22, Itschak Mugzach wrote:
> I read the doc. It describes ACF2 coverage for UADS functionality. But what
> happens if ACF2 refuses to start?
Back out whatever you changed since it last worked?
Even if you can get around the UADS issue, /surely/ you would not run a
John,
I read the doc. It describes ACF2 coverage for UADS functionality. But what
happens if ACF2 refuses to start? In RACF, the UADS dataset is saved in
RCVTUADS. I looked at ACCVT mapping macro and there is no such field.
ITschak
*| **Itschak Mugzach | Director | SecuriTeam Software **|**
Well, it was foreshadowed here on IBM-Main not too long ago, probably by Marna.
Now its in writing…. Get your z/OSMF instances functional now! After January
2022 orders using the custompac dialogs will be gone!
I don't know of any way other than looking in the Mater address space. It's not
an IKJTSOxx parameter, so the PARMLIB command won't help.
--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
From: IBM Mainframe Discussion List
There are videos and other information, just search for previous posts about
this subject on the list server: https://listserv.ua.edu/archives/ibm-main.html
From: IBM Mainframe Discussion List on behalf of
Frank Swarbrick
Sent: Wednesday, March 3,
Sorry. Meant to say “on page 36”
On Wed, Mar 3, 2021 at 13:47 John Lock wrote:
> Some ancient info here ...
>
> http://vtda.org/docs/computing/IBM/Mainframe/MainframeSecurity/198501_Access%20Control%20Facility%20General%20Information%20Manual.pdf
>
>
> On Wed, Mar 3, 2021 at 13:40 Itschak
Some ancient info here ...
http://vtda.org/docs/computing/IBM/Mainframe/MainframeSecurity/198501_Access%20Control%20Facility%20General%20Information%20Manual.pdf
On Wed, Mar 3, 2021 at 13:40 Itschak Mugzach <
0305158ad67d-dmarc-requ...@listserv.ua.edu> wrote:
> UADS is in a bypass
UADS is in a bypass state. However, I still wonder what happens if ACF2
fails to start and we need to authenticate with UADS. Where is the UADS
dataset name saved? I don't think we can access the MSTRJCL data area (I
don;r think it is documented anywhere).
*| **Itschak Mugzach | Director |
On Wed, 3 Mar 2021, at 17:11, ITschak Mugzach wrote:
> I looked at RCVT in an ACF2 system, but the RCVTUADS is nullified. How can
> I locate the active UADS in this case?
What would a UADS be used for on such a system?
Wouldn't everything user-related be under ACF2 control?
--
Jeremy Nicoll -
Does anyone use this? Is it only useful for system programmers, or might
application developers find it of use? Is it in any way related to the Zowe
desktop? Are there any videos demonstrating it?
--
For IBM-MAIN subscribe /
And here I was, busy coding.
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Radoslaw Skorupka
Sent: Wednesday, March 3, 2021 8:33 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: z/OS v2r5 - Cert fingerprint
I was announced.
On Wed, 3 Mar 2021 17:03:55 +, Seymour J Metz wrote:
>Noted, 32760, truncated to a multiple of LRECL, reduces the number of calls.
>
>PDSE won't reblock if the dataset isn't PDSE. Or are you saying that FORCE
>SYSTEM DETERMINED BLOCKSIZE only applies to PDSE?
>
PDSE was mentioned earlier
I looked at RCVT in an ACF2 system, but the RCVTUADS is nullified. How can
I locate the active UADS in this case?
ITschak
ITschak Mugzach
*|** IronSphere Platform* *|* *Information Security Continuous Monitoring
for z/OS, x/Linux & IBM I **| z/VM coming soon *
Noted, 32760, truncated to a multiple of LRECL, reduces the number of calls.
PDSE won't reblock if the dataset isn't PDSE. Or are you saying that FORCE
SYSTEM DETERMINED BLOCKSIZE only applies to PDSE?
--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
Preview for 2.5 came out yesterday.
On Wed, Mar 3, 2021 at 10:31 AM Charles Mills wrote:
> I would guess you are not going to get anyone from IBM to admit publicly
> that there is such a thing as z/OS V2R5; not until it is announced.
>
> Charles
>
>
> -Original Message-
> From: IBM
On Wed, 3 Mar 2021 15:58:28 +, Seymour J Metz wrote:
>32760 is optimal for load libraries; I don't know of any reason to use it for
>PDSE.
>
32720 (as below) for FB80 minimizes overhead of calls to READ at the expense
of greater REGION. There's no concern of wasted space with PDSE 4Ki
I was announced.
https://www-01.ibm.com/common/ssi/ShowDoc.wss?docURL=/common/ssi/rep_ca/7/897/ENUS221-057/index.html_locale=en
--
Radoslaw Skorupka
(looking for new job)
Lodz, Poland
W dniu 03.03.2021 o 17:30, Charles Mills pisze:
I would guess you are not going to get anyone from IBM to
I would guess you are not going to get anyone from IBM to admit publicly that
there is such a thing as z/OS V2R5; not until it is announced.
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of kekronbekron
Sent: Wednesday,
32760 is optimal for load libraries; I don't know of any reason to use it for
PDSE.
I would expect FORCE SYSTEM DETERMINED BLOCKSIZE to break things, and not just
for RECEIVE. Consider old programs with hard wired buffer sizes and other
programs creating output for them. If SDB increases the
If RECEIVE sees that the original PDSE was blksize 27920 and allocates the
target that way, then the DSCB will have block size 27920 and SDB should not be
invoked. SDB is not supposed to do anything umless the block size is zero in
all of DCB, JFCB and DSCB. Either they're lying to you or
Just for the record, the blocksize for a PDSE is fake. A PDSE always uses
4K physical blocks (unless something changed in the last year or so). So
the pretend-blksize has no effect on track utilization.
I don't really understand what SDB is doing here either, but it should be
smart enough to
Shmuel, I believe that's the way it works for existing files that have been
opened and closed, whether SDB=Y or N. SDB comes into play when a file is
allocated but not written to by the allocating program. This is from the ISMF
help for the SDB setting:
Use the FORCE SYSTEM DETERMINED
It's hard to tell exactly what's going on under the covers, but as best I've
been able to deduce in this particular case is:
1) RECEIVE reads the INMR02 record, sees the original PDSE was blksize 27920
and allocates it that way, but does not open it.
2) SDB steps in, says "they really want
Recently, there was a question about identifying certs being used in an
environment.
I had suggested looking for the cert fingerprint(s) in the TLS inspection
proxy's logs.
It looks like z/OS v2r5 is adding cert fingerprints, so I think it means usage
will get recorded to SMF?
Would be great
45 matches
Mail list logo