This was recently discussed. PSATOLD is for the active TCB. The program has a
TCB that is paused at TEST breakpoints. The active TCB is a different TCB
because TESTAUTH is now active so you can issue TESTAUTH commands.
Jon Perryman.
From: MichealButz
variable
substitution. I can't remember if it's REXX or UNIX environment variables.
Either use the parenthesis or REXX variable substitution but not both because
you don't have a variable defined with the file name string.
Jon Perryman.
From: Paul Gilmartin
It sounds like the FREE is not working properly. LISTDS ST would display the
allocated datasets See if your datasets are actually being freed or what is
causing the large number of dynamic datasets
Jon Perryman.
From: Paul Gilmartin paulgboul...@aim.com
I'm not sure what you are asking or what you are saying is incorrect. LISTCB
will display the TCB for the program you are testing which is what you see in
R15. Obviously it should not be the TCB where LISTTCB is running which is
PSATOLD.
Jon Perryman
STDOUT and STDERR to disk.
Look at those disk files after running your REXX.
Jon Perryman.
- Original Message -
From: jan de decker jan.je...@gmail.com
When trying to invoke the same compiled program from HTML the browser
stays connecting and eventually times out
Have you tried running PGM=BPXBATCH instead and run the exec as a UNIX script?
You would need to place the exec in a UNIX file and change ALLOC to BPXWDYN.
As for the truncation error, have you tried changing the dataset's attributes
(LRECL, BLKSIZE and RECFM)?
Jon Perryman
MVS archive datasets are supported by the PAX command. The first paragraph of
the MAN PAX page says the archive can be HFS file or MVS dataset. I only have
access to the EFGLOBE.COM system so it may now say something different but
along the same lines.
Jon Perryman
criteria such as
module and offsets.
You should to the CICS sysprogs to see if they can help..
Jon Perryman.
From: John Chase jonboy...@gmail.com
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Thursday, January 16, 2014 9:26 AM
Subject: Need help setting up SLIP trap
to?
Jon Perryman
From: Donald Likens dlik...@infosecinc.com
I agree that one would not use indirect volume reference for any file that is
shared across LPARs. This would only be for files that are unique for each
LPAR.
Jon… I thought being SYS1 removed
.
Jon Perryman.
From: Juergen Kehr kehrjuer...@t-online.de
I would need some good ideas for console command which will give the current
version/release of the product running.
The products I'm looking for are:
Omegamon
NetView
TWS
Alternatively it would
It's not a requirement that it be a SYS1 dataset. There are advantages to it
being SYS1 such as you know immediately it is in the mastercat and is covered
by SYS1 RACF rules.
Jon Perryman
- Original Message -
From: Donald Likens dlik...@infosecinc.com
So it must be a SYS1 dataset
. To do a RECATALOG, you will need to uncatalog it (DELETE NOSCRATCH).
I don't have a system available to try it out but I think the commands would be:
DEFINE CL(NAME('ZFS.ROOT') LINEAR TRACKS(100) VOL(RESVOL))
DELETE 'ZFS.ROOT' NOSCR
DEFINE CL(NAME('ZFS.ROOT') LINEAR VOL(SYSR1) RECATALOG)
Jon
Perryman.
From: Jon Perryman jperr...@pacbell.net
I don't understand the quest How does this really help. I assume you just
want to catalog the zFS datasets with symbolic volume.
From: Donald Likens dlik...@infosecinc.com
It says
Wouldn't the DELETE NOSCRATCH mark the VVCR as not in a catalog and available
for RECATALOG? Otherwise we couldn't RECATALOG to another UCAT or must it
always be recataloged to the original catalog?
Jon Perryman.
- Original Message -
From: Pearce, Colin E colin.pea...@baml.com
T he
applying PTF's.
2. Don't apply huge number of PTF's at one time.
3. Apply critical component PTF's seperate from other PTF's.
4. Always have another system available to apply PTF's if this system becomes
unusable.
5. Don't IPL the system with an incomplete PTF installed (if possible).
Jon Perryman
without the sysprog.
Jon Perryman.
From: Shmuel Metz (Seymour J.) shmuel+ibm-m...@patriot.net
In 4384793391606637.wa.paulgboulderaim@listserv.ua.edu, on
01/09/2014
at 11:51 AM, Paul Gilmartin paulgboul...@aim.com said:
Is this cloning, sometimes called
Linking a program AC(1) does not mean it runs authorized. It simply means it
can make it's self authorized thru MODESET MODE=SUP.
It's real easy to see if this is your problem. Just add MODESET MODE=SUP before
the ISGENQ.
Jon Perryman.
From: Donald
LOAD allows GLOBAL=YES,EOM=NO to put the module in CSA. Or you could use MVS
commands to add the module to MLPA and activate it as an exit. .
Jon Perryman.
From: Peter Relson rel...@us.ibm.com
If I understand the processing for this exit, the exit
routine
Are you saying that your program did a MODESET AUTH=SUP prior to issuing
ISGENQ? If not, then you are not running authorized. Otherwise you are correct
and you should get reason code 040D.
Jon Perryman.
From: Donald Likens dlik...@infosecinc.com
My
What are you talking about? SDSF has 2 different presentation modes. Either TSO
or ISPF. Type TSO SDSF from the ISPF command line and it won't have any ISPF
capabilities such as split screen.
Jon Perryman
From: Paul Gilmartin paulgboul...@aim.com
On Mon
, by too many
sessions or too many stats/exceptions being collected.
Jon Perryman.
From: lltvw ll...@126.com
I got from my friend that Omegamon address spaces use XM to send and receive
data, and sometimes our omemgamon did not work well, so I suppose maybe
breakpoints on FTINCL and FTOPEN.
Jon Perryman.
From:John Norgauer john.norga...@ucdmc.ucdavis.edu
A vendor software task fails to insert JCL's into my SPFTEMP0.CNTL
dataset. I get the message:
IKJ56265I THE DATA SET IS EMPTY.
The vendor says that there is an ISPF
for lack of a
better term.
Jon Perryman.
From: Paul Gilmartin paulgboul...@aim.com
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Wednesday, December 25, 2013 9:20 AM
Subject: Re: SMP/E ++HOLD FMID() for dependent FUNCTION SYSMOD
On Tue, 24 Dec 2013 19:27:07 -0800, Jon
instances, it also refers to the current state of the
socket—for instance, calling accept on a socket that is not listening.
My guess would be that you need to use an older version of the .NET framework
(maybe 3.5 or even earlier). You should be able to download it from MS.
Jon Perryman
about? A function
sysmod applies to it's self. It may pre or co-req another function but it does
not apply to another FMID.
As for ++RELEASE, the reason code must match the ++HOLD reason code. It clearly
documents it under REASON for ++RELEASE.
Jon Perryman
want to save money,
some software may run authorized that might not have been authorized in the
past.
IBM decided on this method because rarely will customers risk running their own
programs in an authorized environment.
Jon Perryman.
From: Clark Morris
. There is no
parent, just pre-req function. Everything within the dependent function shows
as to belonging to the dependent function.
Jon Perryman.
From: Paul Gilmartin paulgboul...@aim.com
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Tuesday, December 24, 2013 3:52 PM
The message should have included a reason code. If so, then TSO BPXMTEXT
x will display information that will help you determine what may be
your problem.
Jon Perryman.
From: Brett Danals bdan...@hastingsmutual.com
I am attempting to mount my
Return codes are documented in 'SYS1.MACLIB(BPXYERNO)'.
Using BPXMTEXT with the reason code usually provides the information you need
in resolving these problems.
Jon Perryman.
From: Scott Ford scott_j_f...@yahoo.com
Good, return codes for modules
WTL won't help either. It's just a more specific form of WTO.
Jon Perryman.
From: Scott Ford scott_j_f...@yahoo.com
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Thursday, December 19, 2013 4:16 PM
Subject: Re: WTO confusion
zMan, did you look at the WTL macro
a product. As
someone mentioned earlier, you should check for cross product dependencies but
if you did miss something, then you can just re-install the product.
Jon Perryman.
From: Mike Schwab mike.a.sch...@gmail.com
Not IBM approved, but method we did.
1
I think that the first user assigned to OMVS UID 12345 was deleted, or it's
OMVS segment was deleted or it was assigned to a new UID. My suggestion is that
you modify the user to which you want displayed.
Jon Perryman.
From: venkat kulkarni venkatkulkarn
6 extents times 10 tracks is only 60 tracks but you say it's 157 tracks. There
must be another job that is also adding to this dataset. I suspect there is
more than just the TYPE(89) records in this dataset.
Jon Perryman.
- Original Message -
From: Charles Mills charl...@mcn.org
be
less than or equal to 6 extents times 10 tracks (60) tracks.
Jon Perryman
- Original Message -
From: Charles Mills charl...@mcn.org
6 extents times 10 tracks is only 60 tracks but you say it's 157
tracks.
Not me! ISPF 3.4 says it's 157 tracks. g
Some of the jobs must have
With the exception of DISP=MOD with multiple open/writes and that the last
block will always be, I don't see the difference between FB and FBS. How would
FB create a short block in the middle?
Jon Perryman
- Original Message -
From: nitz-...@gmx.net nitz-...@gmx.net
To: IBM-MAIN
be the blocksize. If you specified blocksize 32760, then each track
would contain one physical record of 32760 bytes and the rest of the track. To
make it optimal, you specified a blocksize of half a track.
Jon Perryman.
- Original Message -
From: Robert A. Rosenberg hal9...@panix.com
I feel
of the track if desired. I suspect this is what the
binder does.
Jon Perryman.
- Original Message -
From: Paul Gilmartin paulgboul...@aim.com
On Sat, 7 Dec 2013 10:01:14 -0800, Jon Perryman wrote:
FBS and VBS work the same as FB and VB except for records spanning into the
next block
to
change because it's impact outweighs it's advantage.
Jon Perryman.
From: Ze'ev Atlas zatl...@yahoo.com
Ze'ev appears to me to want to graft what are essentially interactive,
conversational facilities onto JCL, which is a batch facility. This
may well
SYSLOGD and CRON work the same as on UNIX. Talk to your UNIX admin about these
to get a solution that is suitable for your environment. If you have an MVS
automation product or job scheduler, then you can use it in place of CRON.
Jon Perryman.
From: Fred
. I think abend
analysis came to syslogd but not positive.
Jon Perryman.
From: Fred Kaptein fred.kapt...@hp.com
We have installed maintenance onto our z/OS R1.13 system and have now noticed
that our crontab task is no longer running.
We are looking at what
will be used at the alias entry point. When not specified, the ENTRY
will be used for the ALIAS.
Jon Perryman.
From: Paul Gilmartin paulgboul...@aim.com
On Tue, 26 Nov 2013 23:46:07 -0600, Robert A. Rosenberg wrote:
At 16:48 -0800 on 11/26/2013, retired mainframer
DD DSN=TLOAD1
//SYSIN DD *
INCLUDE DLIB(MYMOD)
INCLUDE DLIB(WXMOD)
ENTRY MYMOD
ALIAS MYPGM
NAME JUNK1
//LINK EXEC PGM=IEWL,PARM='RENT,REUS'
//SYSLMOD DD DSN=TLOAD2
//SYSIN DD *
INCLUDE DLIB(MYMOD)
ENTRY MYMOD
ALIAS MYPGM
NAME JUNK2
Jon Perryman
already know the functionality from using the UNIX version.
Jon Perryman.
From: esst...@juno.com esst...@juno.com
The issue with the Reason Code has to do with the setting
of the MSG_TYPE. The documentation does not expalin it well enough that the
MSG_ID
For BPX1QSN, message type is the first word of the message. It contains 0.
Jon Perryman.
From: esst...@juno.com esst...@juno.com
L 15,16 CVT - communication vector table
L 15,544(15) CSRTABLE
L
Are you talking about IXGBRMLT? The doc for IXGBRWSE has it listed in the
programming notes.
Jon Perryman.
From: Jose ADAUTO Ribeiro jada...@uol.com.br
Thank you for your answer. I would like to complement my question: the
IXGBRWSE macro with REQUEST
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/CN7P4000/CCONTENTS?DT=19920626112004
From: MichealButz michealb...@optonline.net
I am trying to use 3270 Datastream Attribute Bytes under TSO using TPUT
could somebody point me to where these bytes
Thanks Kenneth for the explanation. It's really good stuff. All the
serialization that I've seen was prior to the PLO instruction. I now see that
it has certainly improved our ability to serialize.
Jon Perryman.
From: Kenneth Wilkerson redb...@austin.rr.com
The example was simply to show a point without using an involved sample. At a
minimum, I should have included a USING for the queue entry. Sorry for the
confusion.
Jon Perryman.
From: Shmuel Metz (Seymour J.) shmuel+ibm-m...@patriot.net
In 1384218943.19861
complicated but
often doable).
In Pauls case, you need to ask why he can't use the standard methods and must
find a way around the controls that the company obviously decided to implement.
Doesn't he have access to an APF library? Doesn't he have access to
SYS1.PARMLIB?
Any time
Jon Perryman
complex
the process can be. You need to think about the small details. Even the support
staff is considered a risk because they may not fully understand the
serialization requirements you implement.
Jon Perryman.
From: Scott Ford scott_j_f...@yahoo.com
Can
because it could be a
significant amount of storage.
Thanks, Jon Perryman.
From: Tony Harminc t...@harminc.net
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Monday, November 11, 2013 7:07 PM
Subject: Re: Serialization without Enque
On 11 November 2013 20:15, Jon Perryman
uses the DEVTYPE
macro which is not suitable for UNIX files.
Jon Perryman.
From: Shmuel Metz (Seymour J.) shmuel+ibm-m...@patriot.net
In 1383936555.77181.yahoomail...@web181006.mail.ne1.yahoo.com, on
11/08/2013
at 10:49 AM, Jon Perryman jperr...@pacbell.net
The DARK SIDE was not in reference to TCP/IP.
As far as TCP over SNA, we can easily list as negative TCP attributes (e.g.
security and timeliness). Can you imagine what SNA would have been today had
efforts remained with implementing the desirable TCP attributes into SNA.
Jon Perryman
is storage overlays that are not immediately
apparent. Even worse is when they affect unrelated programs.
Jon Perryman.
From: Donald Likens dlik...@infosecinc.com
Thank You for your help (all of you) but Peter's statement below does not make
sense to me (maybe
Perryman.
From: Paul Gilmartin paulgboul...@aim.com
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Friday, November 8, 2013 8:58 AM
Subject: Re: Aging Sysprogs = Aging Farmers
On Thu, 7 Nov 2013 22:36:30 -0800, Jon Perryman wrote:
As for concatenating an MVS dataset before
does not get any
CPU because of CPU load or swapped out address space in multi-address space
serialization).
Jon Perryman.
From: Kenneth Wilkerson redb...@austin.rr.com
A storage overlay cannot occur in a properly implemented PLO with a counter
as long
implementation
Jon Perryman.
From: Kenneth Wilkerson redb...@austin.rr.com
Yes, I was talking about all references using PLO. I was also assuming this
was a work queue where deletion from the chain was the methodology for
claiming ownership of the element
but only
lists a couple examples. UNIX support in these macro's has never been a
priority for me.
Jon Perryman.
From: Paul Gilmartin paulgboul...@aim.com
On Fri, 8 Nov 2013 10:49:15 -0800, Jon Perryman wrote:
... IBM modified IEBGENER (and other utilities
step would be to locate the entry to be updated. If you If you
are deleting entries, you might need to use PLO compare and load when scanning
thru the chain.
Is it more efficient to continue using CS / reverse chain or to use PLO to
build the chain in the correct sequence?
Jon Perryman
I don't see acronyms in different industries a problem. The ones that get me
are within IBM's own website. I can't remember specific's. More than once, I
read something that used a well known z/OS acronym. Very confusing until you
realize it's the same acronym but from a different area.
Jon
or even relavent?
Jon Perryman.
From: Paul Gilmartin paulgboul...@aim.com
On Wed, 6 Nov 2013 16:51:03 -0500, Shmuel Metz (Seymour J.) wrote:
What's a data set?
Anything that can be allocated to a ddname.
As I said, I have attempted to invoke that definition
a dataset that supports RECFM,
LRECL and BLKSIZE, AMATERSE now has information it needs. Secondary DD's are
not scrutinized as much as the first dataset in a concatenation.
Maybe GIMZIP (from SMP/E) or zip from the UNIX utilities page might help.
Jon Perryman.
From
if anything failed. (IEFACTRT).
You may hate JCL but you probably love what it gives you.
Jon Perryman.
From: David Crayford dcrayf...@gmail.com
On 6/11/2013 10:33 AM, Gerhard Postpischil wrote:
On 11/5/2013 7:26 PM, David Crayford wrote:
I don't think it's
the COPY or REPRO command. REPRO came
out with VSAM so it could not use the command name COPY.
Jon Perryman.
From: Paul Gilmartin paulgboul...@aim.com
And I find cp terribly confusing - to a neophyte does it stand for
copy, or compare, or compress (as in disk
to support screen
datasets.
Jon Perryman.
From: Paul Gilmartin paulgboul...@aim.com
saw no advantage to it, and reverted. Does it play well
with ISPF?
--
For IBM-MAIN subscribe / signoff
used to it but it's certainly not natural. I never
understood why they did this but when in Rome, do as the Romans do. Placing JCL
before or after the exec is a nit you easily get used to.
Jon Perryman.
From: David Crayford dcrayf...@gmail.com
To: IBM-MAIN
Sorry for the confusion. I was talking about TSO and IDCAMS REPRO. We have this
same problem with acronyms now having multiple meaning.
Jon Perryman.
From: John Gilmore jwgli...@gmail.com
The REPRO [assembler] instruction causes the data specified
to manually logging information, they are worlds
apart. JCL has CC's for each step and if you implement CC display in the job
log. Almost everyone has this installed. It's automatic and I can quickly find
the steps that have non-0 CC without manually logging it.
Jon Perryman
is the equivalent of running multiple TN3270 session. Think of
it Nothing more so it doesn't have anything to do with single user signon for
TSO.
As far as TSO COPY, it is so heavily used that IBM could not withdraw it. I
don't know if it's still priced.
Jon Perryman
He's talking about visual sequence
address TSO ALLOC DDN(XX) DSN('xxx') SHR
address LINKMVS XXX
versus
//STEP1 EXEC PGM=XXX
//XX DD DSN=XXX,DISP=SHR
Jon Perryman.
From: Gerhard Postpischil gerh...@valley.net
Yeah, once you get past the backwards
It's been a long time but I though DFS had a server (SMB or NFS) that did
exactly what you want. I think this was one of the configuration I setup. I
won't swear to it though.
Jon Perryman.
From: Paul Gilmartin paulgboul...@aim.com
I would make an addition
Sorry, I must have been thinking of a different product. Not sure which one.
Jon Perryman.
From: Bill Godfrey yak36...@yahoo.com
In case this is causing confusion to some readers, the Session Manager that
includes the SMCOPY command, which was mentioned
I've run the XTERM and EMACS clients a few years ago. It worked first time
without a problem. I wish we had EMACS fully setup for z/OS. I use XEMACS on my
PC which has similarities.
Jon Perryman.
From: Frank Swarbrick frank.swarbr...@yahoo.com
To: IBM-MAIN
and saves time/money, then why not just use it. I would think
you might as well use it. It's far less overhead than running an X-client on
z/OS.
Jon Perryman.
From: Paul Gilmartin paulgboul...@aim.com
On Wed, 6 Nov 2013 12:15:34 -0800, Jon Perryman wrote
performing the
stores.
I think the window is so small that even under heavy usage, you would only see
an error every couple of months but it does exist. I think TCB2 must also use
the PLO compare and load to avoid this situation.
Thanks for the great information, Jon Perryman.
From: Kenneth
if they weren't so restrictive. This dinosaur hasn't died yet and probably
won't in the near future.
Jon Perryman.
From: Dana Mitchell mitchd...@gmail.com
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Tuesday, November 5, 2013 7:01 AM
Subject: Re: Aging Sysprogs = Aging Farmers
. E.g. standard security on z/OS is provided by a single programming
interface regardless of the ESM you are using.
Jon Perryman.
From: Elardus Engelbrecht elardus.engelbre...@sita.co.za
Could you be kind to list the differences between these systems
I meant to say when TCP/IP was publicly available. I think ARPANET was only
available to the military.
Jon Perryman.
From: Anne Lynn Wheeler l...@garlic.com
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Tuesday, November 5, 2013 2:14 PM
Subject: Re: z/OS is antique
be improvements but that's true
for anything.
Jon Perryman.
From: Mark Post mp...@suse.com
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Tuesday, November 5, 2013 1:40 PM
Subject: Re: z/OS is antique WAS: Aging Sysprogs = Aging Farmers
On 11/5/2013 at 02:49 PM, Jon Perryman
convinced many to use the VM editor but even by the
time I left, there was still a few using that program.
Jon Perryman.
From: David Crayford dcrayf...@gmail.com
On 6/11/2013 12:37 AM, John Gilmore wrote:
I do of course agree that z/OS is perceived
Thanks Kenneth. Excellent example. I didn't consider that the load for the
counter must be first to cause the serialization.
Jon Perryman.
From: Kenneth Wilkerson redb...@austin.rr.com
I have used PLO almost exclusively for serialization in multi-address
Thanks Binyamin. Also a great example but it brings me to another question.
What is the advantage of using PLO compare and fetch? Is it just saving CPU
time in the case where the counter has changed? Is there another advantage that
I'm not thinking about?
Jon Perryman
programming
languages.
Jon Perryman.
From: John Gilmore jwgli...@gmail.com
His riposte---It is not responsive---to my last post employs a
rhetorical device that was familiar to the Alexandrian Greeks
. In Kenneth's example where he uses PLO to save
64 bit addresses (which is 2 words), he can't use LG to reference the 64 bit
address otherwise he risks using high and low register values that do not
match. Is that correct?
Jon Perryman.
From: Binyamin Dissen
] On
Behalf Of Jon Perryman
Sent: Monday, November 04, 2013 2:42 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Serialization without Enque
Thanks for pointing out that it's required to do the PLO COMPARE against the
counter and FETCH of the value otherwise there is no guarantee that value1
is consistent
of the authorized state. Something as simple as overlaying storage
could create a security exposure and give them access to the authorized state.
Jon Perryman.
- Original Message -
From: Peter Relson rel...@us.ibm.com
SRB's are a big security exposure so customers are unlikely to open
. This is exactly where a hacker would want to
be in order to hide their tracks and do devious things without getting caught.
Jon Perryman.
From: Itschak Mugzach imugz...@gmail.com
SRB mode is only needed if you use IBM's supplied API to zIIP. WLM is the
part of z/os
being
consider SRB eligible. Some of that code run's under TCB's that never had
authorization where end users could never abuse it will now be a potential
exposure.
Proverbial saying: can't see the forest for the tree's.
Jon Perryman
From: John Gilmore jwgli
I think Itschak is saying that SRB's can't do I/O, therefore they can't write
files to embed a virus or read confidential data. I think he's under the
impression that SRB's can't get access to everything they desire.
Jon Perryman.
From: Ed Jaffe edja
storage, there is not any method that will guarantee the 3 values
are consistent with the others. A counter as suggested by Peter Relson won't
help either for this same reason.
I can't think of a situation where PLO CSDST is useful. Can anyone describe a
situation where it is useful?
Jon Perryman
probably steal it.
Jon Perryman.
From: Robert A. Rosenberg hal9...@panix.com
At 21:16 + on 10/30/2013, DASDBILL2 wrote about Re: Interesting? How
_compilers_ are compromising applicati:
At first, aggressive drivers drove faster than the posted speed limit
As a last resort, a GRS latch could be used.
Jon Perryman.
From: Tony Harminc t...@harminc.net
On 1 November 2013 16:22, Donald Likens dlik...@infosecinc.com wrote:
I have a situation where I need to serialize processing and cannot use CDS
because
sign a non-disclosure agreement about this special enclave. I suspect that
IBM includes some sort of usage clause in that agreement.
Jon Perryman
From: Scott Ford scott_j_f...@yahoo.com
After reading this thread, I understand the need for zIIP processors
more
expensive to run. If this overhead makes the software significantly more
expensive, then vendors will allow both methods. For other vendors, this may be
insignificant (e.g. using a single SRB for the life of the product may be
possible which would eliminate a lot of the overhead).
Jon
as IEBGENER RECFM=U
support.
Jon Perryman.
From: Thomas Berg thomas.b...@swedbank.se
-Original Message-
Behalf Of nitz-...@gmx.net
It's certainly possible to have DSORG=PS,RECFM=U data set that does
not contain load modules. I've used them. I
Since zVM supports zLinux, it makes sense that it allows IFL. Is there a userid
option that allows the usage of IFL processors? Or do they use some other
method?
Does CMS also use that instruction to ensure it runs on a CP?
Jon Perryman.
From: Mark Post mp
this, they are discouraged from allowing it because their employee's could
easily write programs to access anything they wanted.
Jon Perryman.
From: Clark Morris cfmpub...@ns.sympatico.ca
6. zIIP is first restricted by requiring programs run under an SRB. SRB's
experienced
avoid posting for fear of making a mistake.
Thanks Shmuel doubt that I would make such a mistake.
Jon Perryman..
From: Shmuel Metz (Seymour J.) shmuel+ibm-m...@patriot.net
In 5161261496916553.wa.paulgboulderaim@listserv.ua.edu, on
10/25/2013
it catalogs
the new version instantaneously without interrupting current users. There's no
need to rename the dataset. IBM could easily implement IDCAM's ALTER ALIAS to
serve this purpose but GDG's have served us so well for so long that we don't
really need to be a UNIX variant.
Jon
.
As for other commands, you can run your own tests to find out how you can use
them.
Jon Perryman.
- Original Message -
From: Paul Gilmartin paulgboul...@aim.com
To: IBM-MAIN@LISTSERV.UA.EDU
Cc:
Sent: Saturday, October 26, 2013 2:13 PM
Subject: Re: GDG question
On Sat, 26 Oct 2013 10:57:09
501 - 600 of 642 matches
Mail list logo