I have copied the source code for Jol up to the www.Oscar-Jol.com
website. IBM examined and approved the code many years ago.
Jol effectively replaces the JCL interpretor and quite a lot of the
initiator when using Dynamic Allocation instead of JCL. It is part
compiler with PL/I style syntax,
I was thinking about my last post
First off let me say a little bit about background
I have had some experience with vendors but it’s very light
Doing this type of programming was my passions unfortunately for me I got into
it after 2000 when IT destabilized
I am fortunate to have a landed a mo
On Wed, 14 Nov 2018 04:25:18 +, Chris Hoelscher wrote:
>
>In Java you have other issues, every programming lanuaages has pluses and
>minuses..
>
>Indeed they do - without them, adding and subtracting would become quite
>difficult
>
What about COBOL ADD ... GIVING ...
... and LISP?
Or
In Java you have other issues, every programming languages has pluses and
minuses..
Indeed they do - without them, adding and subtracting would become quite
difficult
The information transmitted is intended only for the person or entity to which
it is addressed
and may contain CONFIDEN
profitable
> to offer certification courses in Windows.
> > :>
> > :>Peter
> > :>
> > :>-----Original Message-
> > :>From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
> On Behalf Of Steve Smith
> > :>Sent: Monday, N
; :>
> :>Peter
> :>
> :>-Original Message-
> :>From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Steve Smith
> :>Sent: Monday, November 12, 2018 3:33 PM
> :>To: IBM-MAIN@LISTSERV.UA.EDU
> :>Subject: Re: Why ar
List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Seymour J Metz
Sent: Tuesday, November 13, 2018 5:04 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Why are sophisticated system-level coding examples not available?
[was: RE: Recommended method for accessing secondary access spaces]
While I
onday, November 12, 2018 5:11 PM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: Why are sophisticated system-level coding examples not available?
[was: RE: Recommended method for accessing secondary access spaces]
And that was my whole point -- Where are the examples for programmers to see
how to do i
While I really wish IBM really would have some better examples than what is in
SAMPLIB and SHASSRCE, you really can learn most of what you will need from
manuals and the rest of it is (unfortunately for me) trial and error. When you
are developing Systems programming code, if you son'e have an
ion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Tony Thigpen
Sent: Monday, November 12, 2018 8:28 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Why are sophisticated system-level coding examples not available?
[was: RE: Recommended method for accessing secondary access spaces]
Speaking as a
uld help them avoid?
Just my $0.02USD worth.
Peter
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Ed Jaffe
Sent: Monday, November 12, 2018 11:35 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Recommended method for accessing secondary a
LISTSERV.UA.EDU
Subject: Re: Why are sophisticated system-level coding examples not
available? [was: RE: Recommended method for accessing secondary access
spaces]
Then the not-yet-available examples ought to include all the error recovery
infrastructure needed to assure the least system impact possible.
.UA.EDU] On
Behalf Of Binyamin Dissen
Sent: Monday, November 12, 2018 5:54 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Why are sophisticated system-level coding examples not
available? [was: RE: Recommended method for accessing secondary access
spaces]
There are a large number of parts to make sur
: RE: Recommended method for accessing secondary access
spaces]
Then the not-yet-available examples ought to include all the error recovery
infrastructure needed to assure the least system impact possible.
Like the brief discussions I had with others on this list a few years back
about code to set
Just my $.02...
Back when I was learning to program I was told the best way to learn to
program well was to read well-written code.
Lou
--
Artificial Intelligence is no match for Natural Stupidity
- Unknown
On Mon, Nov 12, 2018 at 4:21 PM Paul Gilmartin <
000433f07816-dmarc-requ...@listse
lf
Of Binyamin Dissen
Sent: Monday, November 12, 2018 5:54 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Why are sophisticated system-level coding examples not available?
[was: RE: Recommended method for accessing secondary access spaces]
There are a large number of parts to make sure that things a
.
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of Ed
Jaffe
Sent: Monday, November 12, 2018 10:35 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Recommended method for accessing secondary access spaces
On 11/12/2018 7:28 AM, Joseph Reichman wrote:
> I can use CSA storage to pass b
st [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Steve Smith
:>Sent: Monday, November 12, 2018 3:33 PM
:>To: IBM-MAIN@LISTSERV.UA.EDU
:>Subject: Re: Why are sophisticated system-level coding examples not
available? [was: RE: Recommended method for accessing secondary access spaces]
:>
:>
On Mon, 12 Nov 2018 22:11:15 +, Farley, Peter x23353 wrote:
>
>Of course, all that isaancient history now. No university or education center
>offers anything like that anymore. Much more profitable to offer
>certification courses in Windows.
>
Marist? But still, a limited choice.
-- gil
Re: Why are sophisticated system-level coding examples not available?
[was: RE: Recommended method for accessing secondary access spaces]
There are some good SHARE presentations on some of these techniques.
Unfortunately for you, I'm too lazy to search for them.
However, and this is importan
I was in several of the OCO sessions at SHARE. They were heated but in summary
there were two major points. Intellectual property(the clones were trying to
reverse engineer MVS), change control-Hursley was saying the large majority of
their problems were coming from modified IBM code. Our post S
not available? [was: RE: Recommended method
> for accessing secondary access spaces]" (in
> ):
>
> > Not jumping on Ed Jaffe or Peter Relson or any of the other thoughtful
> > and helpful responders in this email chain, but it still rankles me
> > that there are no good exa
coding examples not available?
[was: RE: Recommended method for accessing secondary access spaces]
On Mon, 12 Nov 2018 10:52:02 -0800, Charles Mills wrote:
>+1
>I would say that sometimes right after a feature comes out there is a
>presentation at SHARE, e.g., "How to use the n
On 11/12/2018 10:56 AM, David W Noon wrote:
I think most of the low-level techniques were derived from code seen on
the IBM-supplied microfiche (remember that?) that arrived with MVS
installation media. It would benefit the mainframe industry if
microfiche (or a more modern medium) were reinstat
On Mon, 12 Nov 2018 10:52:02 -0800, Charles Mills wrote:
>+1
>I would say that sometimes right after a feature comes out there is a
>presentation at SHARE, e.g., "How to use the new PC-ss facility." That is not
>optimal if your first need to use PC-ss comes five or ten years after it first
>is
On Mon, 12 Nov 2018 18:13:30 +, Farley, Peter X23353
(peter.far...@broadridge.com) wrote about "Why are sophisticated
system-level coding examples not available? [was: RE: Recommended method
for accessing secondary access spaces]" (in
):
> Not jumping on Ed Jaffe or Peter Relson
November 12, 2018 10:14 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Why are sophisticated system-level coding examples not available?
[was: RE: Recommended method for accessing secondary access spaces]
Not jumping on Ed Jaffe or Peter Relson or any of the other thoughtful and
helpful responders in t
ouble that
you could help them avoid?
Just my $0.02USD worth.
Peter
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Ed Jaffe
Sent: Monday, November 12, 2018 11:35 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Recommended method for accessing seco
On 11/12/2018 7:28 AM, Joseph Reichman wrote:
I can use CSA storage to pass back the data if after I copy it over I
release it
We used to do that back in the pre-ESA/390 days.
That technique carries with it all sorts of hideous timing/cleanup
issues that simply don't exist with the PC-ss tec
M
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: Recommended method for accessing secondary access spaces
>
> I can use CSA storage to pass back the data if after I copy it over I
> release it
>
> On Mon, Nov 12, 2018 at 10:26 AM Ed Jaffe
> wrote:
>
> > On 11/12/2018 5:
LISTSERV.UA.EDU
Subject: Re: Recommended method for accessing secondary access spaces
I can use CSA storage to pass back the data if after I copy it over I release it
On Mon, Nov 12, 2018 at 10:26 AM Ed Jaffe
wrote:
> On 11/12/2018 5:21 AM, Joseph Reichman wrote:
> > I’m changing my code t
I can use CSA storage to pass back the data if after I copy it over I
release it
On Mon, Nov 12, 2018 at 10:26 AM Ed Jaffe
wrote:
> On 11/12/2018 5:21 AM, Joseph Reichman wrote:
> > I’m changing my code to use a SRB
>
>
> That's what we do in many similar situations... and then PC-ss back to
> t
On 11/12/2018 5:21 AM, Joseph Reichman wrote:
I’m changing my code to use a SRB
That's what we do in many similar situations... and then PC-ss back to
the requesting address space from the SRB to pass back the necessary data.
--
Phoenix Software International
Edward E. Jaffe
831 Parkview D
I’m changing my code to use a SRB
On Nov 12, 2018, at 7:38 AM, Peter Relson wrote:
>> ASCBFLG1,ACBLSAS+ACBTERM
>
>
> These are not programming interfaces. You use them at your client's risk.
>
>
> Peter Relson
> z/OS Core Technology Design
>
>
>
>ASCBFLG1,ACBLSAS+ACBTERM
These are not programming interfaces. You use them at your client's risk.
Peter Relson
z/OS Core Technology Design
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to l
On Sun, 11 Nov 2018 09:39:31 -0500, Joseph Reichman
wrote:
>on second there maybe another way of getting the
>information besides going into XMEM
>
There is another way, already mentioned in this thread: do all your
"cross-memory" data gathering by scheduling SRBs into the other address spaces
, November 11, 2018 8:55 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Recommended method for accessing secondary access spaces
I think for SSAR I might need to set the AX value to 1 Via AXSET macro
correct ?
Since the question is insufficient, the answer is no. There's more to it.
And it i
I think for SSAR I might need to set the AX value to 1
Via AXSET macro correct ?
Since the question is insufficient, the answer is no. There's more to it.
And it is not important what service(s) you might use unless you are in an
environment where it is appropriate to do so. AXSET is intended
Would IEFUSI pick up *MASTER*
Beyond that wouldn’t want to have that permanently installed the number of jobs
run durning the day
Thanks
> On Nov 11, 2018, at 2:53 AM, Binyamin Dissen
> wrote:
>
> On Sat, 10 Nov 2018 18:45:03 -0500 Joseph Reichman
> wrote:
>
> :>I’m writing windows front
On Sat, 10 Nov 2018 18:45:03 -0500 Joseph Reichman
wrote:
:>Im writing windows front end to display system info from a z/os system. The
program getting the info is a Assembler z/os TCP/IP server
:>Certain information such as executing program name ACEE is in not in common
Ah, you want to exam
There is no real supported way to access private storage in another address
space uninvited.
The general consensus amongst developers, typically ISVs, who are confronted
with this requirement is to schedule a SRB into the target ASID and use some
sort of shared memory buffer to relay the inform
Unless I missing something I have to set the secondary address space in order
to use an alet of 1
> On Nov 10, 2018, at 6:52 PM, Binyamin Dissen
> wrote:
>
> As Peter mentioned, there is no reason for either SSA(I)R or adding the ALET.
> The ALET 1 is useable as it is. Simply LAM it into the
As Peter mentioned, there is no reason for either SSA(I)R or adding the ALET.
The ALET 1 is useable as it is. Simply LAM it into the AR and go AR mode.
What is the issue you are trying to solve?
On Sat, 10 Nov 2018 17:37:50 -0500 Joseph Reichman
wrote:
:>I think for SSAR I might need to set the
I’m writing windows front end to display system info from a z/os system. The
program getting the info is a Assembler z/os TCP/IP server
Certain information such as executing program name ACEE is in not in common
As for swappable issues my Estae can catch the s0c4 and bypass that address
space
It might help matters if you outline what you are trying to achieve.
On 10 Nov 2018 22:38, Joseph Reichman wrote:
I think for SSAR I might need to set the AX value to 1
Via AXSET macro correct ?
> On Nov 10, 2018, at 8:43 AM, Peter Relson wrote:
>
>
> Given the choice of using the SSAR ins
I think for SSAR I might need to set the AX value to 1
Via AXSET macro correct ?
> On Nov 10, 2018, at 8:43 AM, Peter Relson wrote:
>
>
> Given the choice of using the SSAR instruction with a ALET of 1
> And adding a access list entry via ALESERV which is the preferred method
>
>
> I do n
The recommended method for accessing secondary address spaces is to have a
valid cross memory bind that permits it, for example PC-ss or spawned ASID via
ASCRE.
Do NOT use CHKEAX=NO on ALESERV
On 9 Nov 2018 18:13, Joseph Reichman wrote:
Hi
Given the choice of using the SSAR instruction with a
Given the choice of using the SSAR instruction with a ALET of 1
And adding a access list entry via ALESERV which is the preferred method
I do not accept the conditions of contest. Neither is an acceptable method
in general.
You might not have authorization to SSAR. And a target address space
On 11/9/2018 10:12 AM, Joseph Reichman wrote:
Given the choice of using the SSAR instruction with a ALET of 1
And adding a access list entry via ALESERV
which is the preferred method
I would get the feeling Peter Relson and Rob Scott would say ALESERV
If '1' is already a valid ALET you can us
Hi
Given the choice of using the SSAR instruction with a ALET of 1
And adding a access list entry via ALESERV
which is the preferred method
I would get the feeling Peter Relson and Rob Scott would say ALESERV
Thanks
--
For
50 matches
Mail list logo