IBM also announced:
1. No additional charge support extensions/lifecycles for CICS TS V3 and
CICS TS V4;
2. Price reductions (technology dividends) for all IBM AWLC software
products when moving to the new zEC12 model.
Note also that the announcement letter deals with IMS V9 and V10, not IMS
V11
For purposes of licensing its software running on Linux, IBM assigns a
metric called PVUs (Processor Value Units) to each type of processor
core. Most IBM software products for Linux are licensed according to the
number of PVUs at a price per PVU. Likewise, annual software subscription
and support
Hi all,
If I define a service class for specific jobs can I use rmf overview
Applper to know the CPU utilization or MSU allocation,? Many thanks
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to
On Fri, 31 Aug 2012 14:26:39 -0400, O'Brien, David W. (NIH/CIT) [C]
obrie...@mail.nih.gov wrote:
We use dcollect to gather input to CIMS for chargeback / reporting purposes. A
question has arisen regarding HSM migrated DB2 dataspaces. In the output of
the dcollect an entry appears for the
I have a question regarding DCOLLECT data for HSM migrated datasets.
The expiry date for the datasets is empty even when I know there are rules
based on the dataset name.
How can I obtain the expiry date for our datasets under SMS control?
From: IBM
The management class has the expiration information.
Regards,
Hervey
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Uriel Carrasquilla
Sent: Wednesday, September 05, 2012 7:28 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject:
STOW DELETE will do it.
--
John McKown
Systems Engineer IV
IT
Administrative Services Group
HealthMarkets®
9151 Boulevard 26 • N. Richland Hills • TX 76010
(817) 255-3225 phone •
john.mck...@healthmarkets.com • www.HealthMarkets.com
Confidentiality Notice: This e-mail message may contain
Man, the auditors came up with a new one!
Gap noted. Automated controls to prevent the installation of unapproved
software were not documented.
So I have been assigned the task of researching how to provide Automated
controls to prevent the installation of unapproved software.
I'm hoping
On Wed, 5 Sep 2012 01:05:26 -0500, Paul Gilmartin paulgboul...@aim.com wrote:
On Wed, 5 Sep 2012 00:25:32 -0500, Kenneth J. Kripke wrote:
DATA AT PSW 0001CE48 - 58101000 0A6B5023
Data shows a MODESET SVC which does require authorization.
Check the AUTHPGM specifications in IKJTSOxx in
W dniu 2012-09-05 14:21, Greg Dorner pisze:
Man, the auditors came up with a new one!
Gap noted. Automated controls to prevent the installation of
unapproved software were not documented.
So I have been assigned the task of researching how to provide
Automated controls to prevent the
What about IP liability concerns?
On Sep 5, 2012, at 06:47, R.S. wrote:
W dniu 2012-09-05 14:21, Greg Dorner pisze:
Man, the auditors came up with a new one!
Gap noted. Automated controls to prevent the installation of
unapproved software were not documented.
1. The requirement is plain
re:
http://www.garlic.com/~lynn/2012l.html#56 Blades versus z was Re: Turn Off
Another Light - Univ. of Tennessee
http://www.garlic.com/~lynn/2012l.html#57 Blades versus z was Re: Turn Off
Another Light - Univ. of Tennessee
http://www.garlic.com/~lynn/2012l.html#59 Blades versus z was Re: Turn
You have to show the whole picture of security involved in z/OS.
1) The instruction set is broken into general, semi-privileged and privileged.
2) The operating system has RACF, or equivalent, to control who can put what in
what libraries and data sets.
3) Data set (read as libraries) control the
W dniu 2012-09-05 15:16, Paul Gilmartin pisze:
There's a genuine IP concern here. An employee might bring in from
a former employer an SD RAM with a TSO TRANSMIT unloaded library
containing a licensed program product, not licensed at the new
site and expose the new employer to significant
Howdy,
Does anyone have the link for the PDF version of the August/September 2012
issue of Enterprise Tech Journal? There is an article that I want and for some
reason, I did not get their email for this issue. I did try to contact them
from the site, but the email address does not seem to
On Sep 5, 2012, at 8:16 AM, Paul Gilmartin paulgboul...@aim.com wrote:
Perhaps the auditor
should require that use of AMASPZAP be restricted.
We've restricted AMASPZAP since before I started working for the University.
We had a fun auditor request the other day. As a result of one request,
http://enterprisesystemsmedia.com/magazines/enterprise-tech-journal/etj-2012-08-09
For something like this Google is the best tool, rather than trying to
contact a human.
--
Rich Hintz
CENIC http://www.cenic.org
On Wed, Sep 5, 2012 at 6:45 AM, Neil Haley nha...@ca.ibm.com wrote:
Howdy,
Unless the rules have changed
The only time IEHPROGM needs to be APF authorized is for SCRATCH
VTOC. This could be a bug in IEHPROGM as well..
Ed
On Sep 5, 2012, at 12:25 AM, Kenneth J. Kripke wrote:
DATA AT PSW 0001CE48 - 58101000 0A6B5023
Data shows a MODESET SVC which does
Thanks, this I already have. In the email notifications that are sent for new
issues, it contains a link to a downloadable PDF version that you cannot get
from the web. They use an URL shortener (http://mfzne.com/0i1ie for example)
to get to the PDF. This short URL is what I am looking for.
I think if you subscribe (FREE) to the digital editions you will get the
download links.
Have you subscribed to the digital editions?
Lizette
Thanks, this I already have. In the email notifications that are sent for
new issues, it
contains a link to a downloadable PDF version that you
I strongly encourage programmers to write 'throwaway' programs that
investigate the files associated with a system. The idea is to obtain
answers to such questions as
o How many As? How many Bs?
o More Ds than Es after controlling for Cs?
that characterize the objects being manipulated by a
Howdy,
I have been subscribed for several years (I used to get the print, but switched
to digital 2 years ago), I tried the email address on their contact page but
got this bounce message:
--
Hi. This is the qmail-send program at mainframezone.com.
I'm afraid I wasn't able to deliver your
On Tue, Sep 4, 2012 at 7:03 PM, Paul Gilmartin paulgboul...@aim.com wrote:
snip.
You, Lynn, and John G. are correct to distrust null-terminated strings.
But if you write in C, you are pretty much stuck with them since the
library uses them.
Call it distrust if you want, but they work fine
Is this application software developed in house? ISV updates? What? Check
out ISPW or SysChange tools.
Mitch McCluhan
-Original Message-
From: Greg Dorner gdor...@wpsic.com
To: IBM-MAIN IBM-MAIN@LISTSERV.UA.EDU
Sent: Wed, Sep 5, 2012 5:21 am
Subject: Preventing the installation of
I *HATE* checklist auditors. This sounds like a WINTEL based checklist
It does indeed sound like the auditor is applying Wintel security principles
to a mainframe system.
The right questions to ask re mainframe security are:
(1) Are the users properly authenticated?
(2) Is the data properly
On Wed, 5 Sep 2012 07:17:38 -0700, Scott Ford wrote:
Here my example I was referring to initially..
Execution JCL:
typedef struct IRXJCL_type
{
short int arg_length;
char argument[22];
} IRXJCL_type;
puts(this_param.argument);
IDFRACFC USER AA1122BB
Without the memset in this
dest needs to be 23 chars long in order to hold 22 usable characters plus a
terminator.
This is the hazard of strcpy and strcat. You have a real hazardous program
here. What if I executed it with
PARM='NOWISTHETIMEFORALLGOODMEN TOCOMETOTHEAIDOFTHEPARTY'
?
Look into STL std::string.
Charles
On Wed, 5 Sep 2012 13:51:24 +, Pew, Curtis G wrote:
We've restricted AMASPZAP since before I started working for the University.
Seriously.
-- gil
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send
Lawrence
You should ask also on the HIS Forum:
http://social.technet.microsoft.com/Forums/en-US/biztalkhis/threads
Since you are using HIS 2000, you are probably using the LAN DLC, There should
be no problems; the protocols don't change.
Chris Mason
On Wed, 5 Sep 2012 22:07:49 +0800, Tsai
List -
This does not seem to apply the EC12 announcement any more. If Darren is
watching this probably should be terminated and a new proper thread started.
I like to keep my threads together and this is really wrecking my filtering
process.
Thanks for your attention and assistance.
Greg Dorner wrote:
Man, the auditors came up with a new one!
Gap noted. Automated controls to prevent the installation of unapproved
software were not documented.
DANGER! ALARM! EVACUATE! START DRP! GAP NOTED IN AUDITORS BRAIN CELLS! ;-D
After reading all those threads: I have one request
On Wed, 5 Sep 2012 07:19:34 -0700, Scott Ford wrote:
Yep Walt is right for sure, I have called IRXJCL rexx clist and done a LINKMVS
to an authorized RACF program , works like a champ
Walt is right, of course, but you misunderstand him, and what you
say is true but incomplete. The test JCL:
//
Good point.
Many of you out there seem to dislike C for such reasons like that
discussed here: you have to take more responsibility for manageing
the lengths of the used buffers etc. - but the same people often like
ASSEMBLER, where the chance to put errors in your program is
much higher.
My
Radoslaw Skorupka wrote:
BTW: What about pedophile porn pictures and movies? How can we control it?
Maybe your cow-worker keeps some of these pictures as members of
JSMITH.COBOL.VAR.OBJECT library?
Ahem, how did you know that dataset and its contents? ;-D
hm. ;-D
No, I'm just joking,
Will you pass these 'rants and expletives' to these auditors? :-D
I will be passing them on to my manager. We are talking Federal auditors and
billion dollar government contracts, so, no, I won't be telling the auditors
anything. I let management (who are trained not to put their foot in their
If we had the C compiler, I would use it. Of course, I wouldn't have learned
how to create DLLs use LE enabled HLASM, either. Yes, I've done that. As far as
compiled HLLs are concerned, I've always loved PL/I. I would probably like the
PL/X (or whatever) that IBM uses for much of their software
Well, that's the choice, isn't it? Either you do everything yourself, or the
compiler does things for you.
I really like C++. It provides a framework for organizing a large project
that is invaluable IMHO. If you just evaluate C++ as is it a better way to
write Hello World? then the answer is no
Greg,
I've always believed the mainframe allows the installation of software
with the ability to certify
only authorized data access is allowed via RACF (or equivalent),
access to potentially harmful actions against the OS must be granted, (APF
or otherwise), and
all access is (or at least
I agree that string handling with normal C string functions is
problematic and
error-prone; here the Pascal heritage (where strings are also arrays
of chars)
seems to be a problem.
But I recently had so much problems with C++ strings, that I don't
believe that
this is really a solution. The
I guess that I should preface this with another question. Does anybody use a z
for heavy numeric computation anymore? Or has that all gone to Intel and Power
boxes? Why is that? If it is because the z architecture is not good at
numeric computation, I have a question. The internals of the z has
(in XCFLOCAL mode)
I am pretty sure XCFLOCAL will not work in the GRSPLEX. I believe the doc
states that the system must be a MONOPLEX for GRS to be active. If you want
this rescue system to be XCFLOCAL, you will have to keep it outside of a
GRSPLEX, and then risk lockout or corruption due
On Wed, 5 Sep 2012 16:59:16 +0100, haralder haralder wrote:
We explained our auditor that the software instalation tool in z/OS is
SMP/E, which is protected by the GIM.* profile in the FACILITY class
in our RACF. We printed the accesses for that profile and they were
satisfied enough after we
Charles:
I get what your saying, this is a test program ..I understand, this is why I am
asking ok ?
This is why one asks questions of their collegues..
At least where I grew up in corn country .
Scott J Ford
Software Engineer
http://www.identityforge.com/
Sounds like these auditors are smoking funny cigarettes ...and not sharing ...
Scott J Ford
Software Engineer
http://www.identityforge.com/
From: Elardus Engelbrecht elardus.engelbre...@sita.co.za
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Wednesday, September 5,
OK, I'm reading the Redbooks on this. And I'm wondering something due to my
hardware ignorance. I've noticed that doing a P.O.R. is rather time consuming,
especially on my company's z9BC. I don't know what a P.O.R. actually does
internally. One thing that I am fairly sure of is that it loads
In many C++ implementations it is possible to replace 'new' with your own
'debug_new' via a macro, and trace or link all of the malloc's..
Both of the C++ environments that I use (IBM z/OS XLC and MS VS) have
built-in find the leak functions that I use routinely to make certain I am
not leaking
Since this is perfectly legal C and C++, it seems you should be opening a
PMR with your compiler vendor.
:: -Original Message-
:: From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
:: Behalf Of Paul Gilmartin
:: Sent: Tuesday, September 04, 2012 4:51 PM
:: To:
Any thoughts? I also accept rants and expletives.
-- ok, here's a rant for you:
auditors: their only function in life is to show up on the battlefield after
the battle, and shoot the wounded.
/s/ tuco bonno;
Graduate, College of Conflict Management;
University of SouthEast Asia;
In
fd20b743d96a9545b2420d8f28400f35025a2...@g2w2530.americas.hpqcorp.net,
on 09/05/2012
at 02:51 AM, Cifani, Domenic domenic.cif...@hp.com said:
I'm hoping someone can help me with an issue we are experiencing
following an upgrade from z/OS 1.11 to 1.13. We are running an
REXX EXEC in batch
In 1679112769409333.wa.paulgboulderaim@listserv.ua.edu, on
09/05/2012
at 02:00 AM, Paul Gilmartin paulgboul...@aim.com said:
But aren't there ways a nonauthorized program can delete PDS
members?
Yes. There are even way to do it by accident.
--
Shmuel (Seymour J.) Metz, SysProg and
Google search found the following Technote:
.Receiving IGD17054I on temp data sets since year 2010
In which the following lines appear:
Resolving the problem The ultimate solution to this problem is to change the
RNL exclusion list entry to SYS1. or SYS1.*, however, there are limits that may
The problem with using a pointer instead of an array is that the pointer
points to a string literal and any attempt to modify the literal invokes
undefined behavior. A statement of the form
s6[0] = 'x';
is legal with the array but not with the pointer.
The fact that the expression
Gil:
Your point well taken , cant show my code , we are a vendor ...
I just checked my code..my STC is AC=1 calls IRXJCl which does a LINKMVS to an
assembler routine which is AC=1 so do i assume ( bad word i know ) that
there is no authorization issue in this case since everyone
We are holding a sale that can provide affordable training
for z/OS application programmers (many of the topics here
are also of interest to systems programmers, so check it
out).
If you have people who can teach, here is an opportunity to
get them quality materials to teach from.
The materials
Rexx is so magical there is no real reason it could not support
Substr(a,3,1) = 'x' and actually be doing a = Substr(a,1,2) || 'x' ||
Substr(a,4) under the covers. Even, for that matter, Substr(a,3,1) = 'xyz'
or Substr(a,3,3) = 'x'
Charles
-Original Message-
From: IBM Mainframe
Well, maybe it's being developed? Maybe we should simply wait for next
generation? I'm serious.
BTW: there is something which I really consider stupid: ESCON. EC12
still supports old format of I/O cards. Both I/O Drawer and I/O Cage are
supported (with some *non-technical* limitations), one
W dniu 2012-09-05 17:50, Elardus Engelbrecht pisze:
Radoslaw Skorupka wrote:
BTW: What about pedophile porn pictures and movies? How can we control it?
Maybe your cow-worker keeps some of these pictures as members of
JSMITH.COBOL.VAR.OBJECT library?
Ahem, how did you know that dataset and
when I mention this weeks ago they all thought I was out of my mind
all the big Z/os shops were like ESCON who needs ESCON any more
well we do, and yes I know all about FICON to ESCON converters what a poor
excuse
for poor planning
From: R.S. r.skoru...@bremultibank.com.pl
To:
W dniu 2012-09-05 16:07, Tsai Laurence pisze:
Dear listers ,
as the subject, my client would like to know whether it is ok or not .
Appreciated those can reply . Thanks !
Some of us use (used) similar configuration.
Is it OK - well, it depends on what you want. Surely it works.
--
Radoslaw
On Wed, 5 Sep 2012 11:47:50 -0700, Scott Ford wrote:
Gil:
�
Your point well taken , cant show my code , we are a vendor ...
�
I just checked my code..my STC is AC=1 calls� IRXJCl which does a LINKMVS to an
assembler routine which is AC=1 so do i assume ( bad word i know ) that
there is
Gil,
Your right IRXJCL is unauthorized. I assume the LINKMVS is an ATTACH another
subtask ...
So that the authorization would be that of the Task initiator , am I close..
Scott J Ford
Software Engineer
http://www.identityforge.com/
From: Paul Gilmartin
In 50475f32.9050...@acm.org, on 09/05/2012
at 09:18 AM, Joel C. Ewing jcew...@acm.org said:
and this is the only
locally produced documentation that makes sense on z/OS,
While the auditors in question may be stark raving bonkers, there is
other relevant documentation; change control
In a6b9336cdb62bb46b9f8708e686a7ea0115baa1...@nrhmms8p02.uicnrh.dom,
on 09/05/2012
at 11:45 AM, McKown, John john.mck...@healthmarkets.com said:
If it is because the z architecture is not good at numeric
computation,
The z architecture is fine for numeric computations. The problem is
that the
In 1346854774.87382.yahoomail...@web164503.mail.gq1.yahoo.com, on
09/05/2012
at 07:19 AM, Scott Ford scott_j_f...@yahoo.com said:
Yep Walt is right for sure, I have called IRXJCL rexx clist and done
a LINKMVS to an authorized RACF program , works like a champ
Interesting, given that the
On Wed, Sep 5, 2012 at 2:28 PM, Shmuel Metz (Seymour J.)
shmuel+...@patriot.net wrote:
In a6b9336cdb62bb46b9f8708e686a7ea0115baa1...@nrhmms8p02.uicnrh.dom,
on 09/05/2012
at 11:45 AM, McKown, John john.mck...@healthmarkets.com said:
If it is because the z architecture is not good at
In sync with IOCD, LIC: These are kept on the SEs' HD. The SEs are associated
with a single CEC. So, when the SEs are updated, have it mirror the changes to
the SSD in the CEC. Perhaps, instead of HSA in SSD, just load the HSA from the
SSD and have some way, when needed, to reload the SSD from
With IBM's acquisition of SPSS several years ago the recent acquisition of
Netezza (for use as an attached processor for computational workloads on
zSeries), IBM's z/Series intentions seem to have changed. After the AS
(Application System) disaster (early eighties, great demo, not scalable,
I got answers like this, before.
These things work well, if you are in a development environment
or in an earlier test stage.
What we have: we have a production system or an almost production system
in a very late stage. Then, when combining severel hundred PL/1 modules and
DLLs and several
I have to give Mike Cowlishaw a lot of credit Rexx works well
Scott ford
www.identityforge.com
On Sep 5, 2012, at 3:51 PM, Charles Mills charl...@mcn.org wrote:
Rexx is so magical there is no real reason it could not support
Substr(a,3,1) = 'x' and actually be doing a = Substr(a,1,2) || 'x'
On Wed, 5 Sep 2012 14:05:10 -0700, Scott Ford wrote:
Your right IRXJCL is unauthorized. I assume the LINKMVS is an ATTACH another
subtask ...
So that the authorization would be that of the Task initiator , am I close..
(Why don't I get quotation indicators () when I quote your text?)
I
On 5 September 2012 15:51, Charles Mills charl...@mcn.org wrote:
Rexx is so magical there is no real reason it could not support
Substr(a,3,1) = 'x' and actually be doing a = Substr(a,1,2) || 'x' ||
Substr(a,4) under the covers. Even, for that matter, Substr(a,3,1) = 'xyz'
or Substr(a,3,3) =
On 5 September 2012 17:17, zMan zedgarhoo...@gmail.com wrote:
On Wed, Sep 5, 2012 at 2:28 PM, Shmuel Metz (Seymour J.)
shmuel+...@patriot.net wrote:
The z architecture is fine for numeric computations. The problem is
that the implementation is competing with processors manufactured in
bulk.
On Wed, 5 Sep 2012 18:02:51 -0400, Tony Harminc wrote:
On 5 September 2012 15:51, Charles Mills charl...@mcn.org wrote:
Rexx is so magical there is no real reason it could not support
Substr(a,3,1) = 'x' and actually be doing a = Substr(a,1,2) || 'x' ||
Substr(a,4) under the covers. Even, for
It would be easy enough to code one that returns as a numeric string the
address of one of its arguments.
My recollection is that when calling assembler from Rexx you get the address of
a copy of the string data, not the address of whatever internal control block
represents a variable in
Implement a RACF program control rule - if that is really what they want you to
do. You'll have everybody screaming, but you prevented the unauthorized
execution of programs.
Jerry Whitteridge
Lead Systems Programmer
Safeway Inc.
925 951 4184
If you feel in control
you just aren't going fast
t...@harminc.net (Tony Harminc) writes:
There *was* a single-chip 370 produced by someone in the late 70s - a
168i. I think it was a university or research institute, but not
IBM. I'm not finding anything on Google with a casual search, but
things like this are easily overwhelmed.
SLAC did
I have been trying to figure out how to code CSI with more than one field.
So far between the manual and sample from IBM, I am stumped.
Has anyone modified the sample REXX IGGCSIRX from IBM to use more than one
CSIFLDx in the function?
I want to pull the space fields for VSAM datasets. Or are
On Wed, 5 Sep 2012 15:41:15 -0700, Charles Mills wrote:
It would be easy enough to code one that returns as a numeric string the
address of one of its arguments.
My recollection is that when calling assembler from Rexx you get the address
of a copy of the string data, not the address of
ADDRESS LINKPGM ... allow the called program to modify the Rexx variables
passed as arguments
Could be -- but you still get the *string data*, right, not the address of
whatever internal control block represents a variable inside Rexx? My *guess*
would be that if you can indeed modify the
On Wed, 5 Sep 2012 16:18:07 -0700, Charles Mills wrote:
ADDRESS LINKPGM ... allow the called program to modify the Rexx variables
passed as arguments
Could be -- but you still get the *string data*, right, not the address of
whatever internal control block represents a variable inside Rexx?
What Open Object Rexx are strings handled the same way ?
Scott ford
www.identityforge.com
On Sep 5, 2012, at 7:18 PM, Charles Mills charl...@mcn.org wrote:
ADDRESS LINKPGM ... allow the called program to modify the Rexx variables
passed as arguments
Could be -- but you still get the
Thanks ,Chris.
2012/9/5 Chris Mason chrisma...@belgacom.net
Lawrence
You should ask also on the HIS Forum:
http://social.technet.microsoft.com/Forums/en-US/biztalkhis/threads
Since you are using HIS 2000, you are probably using the LAN DLC, There
should be no problems; the protocols
On 9/5/2012 7:03 PM, Lizette Koehler wrote:
CSIFIELD = CSIFILTK || CSICATNM || CSIRESNM || CSIDTYPS || CSIOPTS
CSIFIELD = CSIFIELD || CSINUMEN || CSIFLD1 || CSIFLD2
Each field name must be 8 bytes long (trailing blank fill),
which may be the problem.
However, the data is not coming back
In 1346879110.62512.yahoomail...@web126204.mail.ne1.yahoo.com, on
09/05/2012
at 02:05 PM, Scott Ford scott_j_f...@yahoo.com said:
Your right IRXJCL is unauthorized. I assume the LINKMVS is an ATTACH
another subtask ...
No. That would be ADDRESS ATTACHMVS, and it will still be in the same
In 3240638450612647.wa.paulgboulderaim@listserv.ua.edu, on
09/05/2012
at 06:09 PM, Paul Gilmartin paulgboul...@aim.com said:
Is this IRXEXCOM, IIRC?
From the GI:
3.1.3.2 TSO/E REXX programming services
IRXEXCOM - Variable Access
The IRXEXCOM variable access routine lets
Stellar Gil and very much appreciated
Scott ford
www.identityforge.com
On Sep 5, 2012, at 6:02 PM, Paul Gilmartin paulgboul...@aim.com wrote:
On Wed, 5 Sep 2012 14:05:10 -0700, Scott Ford wrote:
Your right IRXJCL is unauthorized. I assume the LINKMVS is an ATTACH another
subtask ...
So
Hi,
During IPL the system the last message which appear on the console is as
follows and after that the machine is not available any more.
I tried to IPL from HMC but the problem is exactly same.
CUN2046I AN EMPTY UNICODE ENVIRONMENT HAS BEEN ESTABLISHED
CUN2005I CONVERSION ENVIRONMENT
During IPL the system the last message which appear on the console is as
follows and after that the machine is not available any more.
I tried to IPL from HMC but the problem is exactly same.
CUN2046I AN EMPTY UNICODE ENVIRONMENT HAS BEEN ESTABLISHED
CUN2005I CONVERSION ENVIRONMENT
Yes, there are organizations that use zEnterprise servers for heavy
numeric computation. Like decimal floating point. Cryptography is another
excellent example. And you can buy optional CryptoExpress adapters if you
want to augment the excellent capabilities found in every machine. You can
also
I believe IBM produced a pc with a 370 to run VM on a PC. Merrill Lynch
had one. Somewhere in the late 80's I believe.
On Thu, Sep 6, 2012 at 1:52 AM, Timothy Sipples1 sipp...@sg.ibm.com wrote:
Yes, there are organizations that use zEnterprise servers for heavy
numeric computation. Like
90 matches
Mail list logo