Chiming in to say that the big screen consideration is a real (seeing the whole
screen without moving much) reason to want curved.
However, if you have 2 screens you can experiment with, just set them tilted in
and see if that works for you.
I'm assuming big, curved screens cost more, compared
I have a 42 inch curved. The curved screen is very clear and everything is the
same size all the way from left to right. Previously I had a 42 in flat screen
(which I gave to my kid who loves it), but the problem I had was that as I age,
my eyesight isn't able to refocus as quickly so I had
OK. So we've established that the key is set via software.
Software can be hacked.
And now there's only a single spit of data to focus all the effort
on. Years ago at a SHARE presentation, I caught an IBMer after the
session and they admitted that I was correct.
/Leonard
P.S. Someone
On Mon, Jan 15, 2024 at 02:41:45PM -0600, Walt Farrell wrote:
> On Mon, 15 Jan 2024 16:15:38 +, Eric D Rossman
> wrote:
> For encryption, the analogous method might be: Once a jobstep has
> Opened an encrypted data set to read it, they cannot write to, nor Open,
> an unencrypted output data
Remembering the creator of Pascal, a champion of lean and elegant code,
and a vital figure in the evolution of software development.
https://thenewstack.io/tribute-niklaus-wirth-1934-2024/
--
Gabriel Goldberg, Computers and Publishing, Inc. g...@gabegold.com
3401 Silver Maple Place,
I have used a curved screen and I have used flat screens as
monitors for doing programming and monitoring of LPARs (VM and or
z/OS). Curved was something over 30" and flat was a 43" 4K monitor.
The curved screen, if you are in the middle, you can just use
your eyes to look left or right, the
For me I want to get some real estate back on my desk and keep it all on one
Screen
Sent from my iPhone
No one said I could type with one thumb
> On Jan 15, 2024, at 16:41, Bob Bridges wrote:
>
> Tell me why. I'm trying to visualize, and can't see why curved would make a
> big
Tell me why. I'm trying to visualize, and can't see why curved would make a
big difference. I'm interested in being persuaded, though.
---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
I still believe that standing up for the truth of God is the greatest thing
in the world. This is the
I use curved monitor standing on a stand sit desk. And a folded treadmill,
so I can walk while programming...
*| **Itschak Mugzach | Director | SecuriTeam Software **|** IronSphere
Platform* *|* *Information Security Continuous Monitoring for Z/OS, zLinux
and IBM I **| *
*|* *Email**:
I use curved monitor standing on a stand sit desk. And a folded treadmill,
so I can walk while programming...
*| **Itschak Mugzach | Director | SecuriTeam Software **|** IronSphere
Platform* *|* *Information Security Continuous Monitoring for Z/OS, zLinux
and IBM I **| *
*|* *Email**:
In CICS one can have encrypted and non-encrypted files open
simultaneously.
This is kind of a MUAS, Multiple User Address Space.
I was going to mention the problem of Connect:Direct but let it
go. But since the CICS thing was also brought up
C:D has similar issues to CICS where it can
Joe R wrote
I got to a X'89' is a header the doc say that decrementing that would
bring to a new linkage frame I specifically remember looking - 32 bytes from
there and it was all zeros.
Not having ready access to that document, but knowing who wrote it, I'll bet
that it does not say that. It
On Mon, 15 Jan 2024 14:45:06 -0600, Joe Monk wrote:
>How would that be practical? How would you, for instance, do a batch update
>to an encrypted dataset from a CICS vsam file?
Sorry; I don't understand the question. How do you do it today?
--
Walt
Peter
Would you know where I could find that info
Thanks
> On Jan 15, 2024, at 2:32 PM, Peter Relson
> <056a472f7cb4-dmarc-requ...@listserv.ua.edu> wrote:
>
> Here is the SDWA as you can see the PSW matches how come the registers
> don't?
> Because the registers are not saved in the
Opinions in general:
Having used a 4K 43" flat TV/monitor and having had access to a
curved monitor once, I'd go curved every time the $$$ were
available for such a device.
Note: I have a 8' wide desk that is ~3' "deep". So a 43" monitor
sits on the back edge of the desk, center. I
How would that be practical? How would you, for instance, do a batch update
to an encrypted dataset from a CICS vsam file?
Joe
On Mon, Jan 15, 2024 at 2:42 PM Walt Farrell wrote:
> On Mon, 15 Jan 2024 16:15:38 +, Eric D Rossman
> wrote:
>
> >Answering a number of comments in order, in one
On Mon, 15 Jan 2024 16:15:38 +, Eric D Rossman wrote:
>Answering a number of comments in order, in one message.
>
>First: I don't think being able to encrypt load libraries is worth it.
>Encrypted executables, in general, are not going to increase security.
>
>Jousma, David:
>
>>
Here is the SDWA as you can see the PSW matches how come the registers
don't?
Because the registers are not saved in the same RB that the
scrunched-to-8-bytes PSW is saved in.
Peter Relsonz/OS Core Technology Design
--
For
Dell 4919dw has served me well for 4 years
Matt Hogstrom
PGP key 0F143BC1
> On Jan 15, 2024, at 13:28, Joe Monk wrote:
>
> Second this. I have a DELL 42" monitor which I used with multiple computers.
--
For IBM-MAIN
I turn my monitors vertical, as we tend to scroll up/down more than left/right.
With three, I turn them to give much the same effect as curved monitors.
Sent from [Proton Mail](https://proton.me/mail/home) for iOS
On Mon, Jan 15, 2024 at 1:10 PM, Lionel B. Dyck <[lbd...@gmail.com](mailto:On
Second this. I have a DELL 42" monitor which I used with multiple computers.
Joe
On Mon, Jan 15, 2024 at 12:26 PM Henri Kuiper
wrote:
> All I can say is, if you have multiple devices, go for a monitor that also
> acts as a KVM-switch... I've a DELL Dell C3422WE at "only" 34" but the
> ability
All I can say is, if you have multiple devices, go for a monitor that also
acts as a KVM-switch... I've a DELL Dell C3422WE at "only" 34" but the
ability to switch between the laptop and the desktop is a-ma-zing :)
you got me pondering on a 49" now thanks :)
[image: __tpx__]
[image: photo]
I use two 34" curved monitors side by side
Lionel B. Dyck <><
Github: https://github.com/lbdyck
“Worry more about your character than your reputation. Character is what you
are, reputation merely what others think you are.” - - - John Wooden
-Original Message-
From: IBM Mainframe
Steve,
I have not used that specific monitor, but I do use a curved monitor. Love it!
For me, much better than a flat monitor. I was hooked after I tried the first
one (a Samsung).
Bill Hitefield
> -Original Message-
> From: IBM Mainframe Discussion List On
> Behalf Of Steve Beaver
>
Does anyone have an opinion on
LG - 49" IPS LED Curved UltraWide Dual QHD 144Hz FreeSync and G-SYNC
Compatible Monitor with HDR (HDMI, DisplayPort, USB) - Black
Steve Beaver
--
For IBM-MAIN subscribe / signoff /
I really like ICSF (having worked on it for over 25 years), but I will say this
right now: address-space-switch PCs are not cheap.
Trying to shave a handful of instructions to call ICSF is not going to save
enough cycles (or elapsed time) to be worthwhile. As Colin points out, storage
Answering a number of comments in order, in one message.
First: I don't think being able to encrypt load libraries is worth it.
Encrypted executables, in general, are not going to increase security.
Jousma, David:
> Encrypt everything with the same HLQ, with the same key
> that's a big
W dniu 15.01.2024 o 05:16, Phil Smith III pisze:
Steve Estle wrote, in part:
but we'd like to encrypt as much as possible in our environment
Why? What problem are you trying to solve? Remember that DSE provides
protection against exactly two attacks:
1) Someone getting at the wire between
It is being done everytime you buy new machine and use ICSF.
TKE can be used for that, but even without it is feasible and secure.
...and secure. :-)
1. Master key is divided into parts. How many? 2 or more.
2. Each part is know to only one security officer. Note, the officers
need not to know
Programs are data. Keys are data. IEFBR14 code is datum.
However there are different needs and requirements for data.
Auditor always asked me about financial (application) data security.
Never about programs.
Of course one would like to have everything SECURE. Encryption is on of
means. What to
While I strongly believe there is a technical reason behind, it is NOT
the one described below.
Both PDSE and basic PS can be encrypted.
The requirement: SMS-managed.
--
Radoslaw Skorupka
Lodz, Poland
W dniu 14.01.2024 o 06:50, Attila Fogarasi pisze:
It is indeed a technical reason: PDS
It might be difficult to satisfy timing constraints using TCP/IP to connect
Hercules to some real hardware.
--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3
עַם יִשְׂרָאֵל חַי
נֵ֣צַח יִשְׂרָאֵ֔ל לֹ֥א יְשַׁקֵּ֖ר
From: IBM Mainframe Discussion List
On 1/14/24 01:07, Phil Smith III wrote:
aul Gilmartin asked:
What about Format preserving encryption?
Format-Preserving Encryption is for structured data, i.e., specific fields. You
would not use it on a binary blob; at that point, you'd use XTS or one of the
other AES modes whose
On 1/13/24 11:28, Steve Estle wrote:
I know this seems innocuous, but we'd like to encrypt as much as possible in
our environment ...
Forgive my tone, Steve. And please don't take this as directed at you,
but at the broader industry, especially at "seatback magazine management".
Many
It can be set via software but can be disabled by control points. There are
RACF controls on the Crypto services that are needed. There are controls that
can used to stop one domain setting the key for another. More serious users
will have TKE workstations with card readers and multiple key
35 matches
Mail list logo