Ok. in that case what does this statement does?
OCINSTR1+1(1),0(R5)
I believe this will have the function either CLI,NI,TM,OI,XI. so why this
OR aganist XL8'8040201008040201'. So how is the result going to be ?
Thanks .
Ron T
Timothy Sipples wrote:
ICSF would be the way to go in terms of maintainability, serviceability,
and related concerns.
I think ICSF allows querying for supported algorithms/hardware to allow
fallback to algorithms that your customer is capable of running. Thus you
should be able to use ICSF to
afterwards ... all corporate
copying machines were retrofitted with serial number that would appear
on all copies made.
Ah - I definitely remember the serial numbered copiers, but I never new the
original reason they did that! I always figured it was to discourage people
from using IBM
It is *theoretically* possible for someone with physical access to the
zSeries processor to open it up and install some customized hardware
that could intercept the clear key. Is that a reasonable risk for the
dats you need to protect, when weighed against the improved performance?
For
Landmark Software built several products that would display storage and format
it as defined by Assembler DSECTs. One was TMON/MVS (now probably named
TMON/zOS). They are all now marketed by Allen Systems Group in Naples, FL.
Bill Fairchild
Franklin, TN
- Original Message -
On
it did _not_ generate an INCLUDE for GOODMOD even though the JCLIN
should have added to its MOD entry an LMOD subentry for LOADMOD and
MOD element GOODMOD was delivered in the PTF.
This smells fishy to me. I'd report this to IBM Support. Be prepared
with complete APPLY output.
snip
No
Guys,
Does SHOWMVS do this ?
Scott ford
www.identityforge.com
from my IPAD
'Infinite wisdom through infinite means'
On Apr 29, 2013, at 8:38 AM, DASDBILL2 dasdbi...@comcast.net wrote:
Landmark Software built several products that would display storage and
format it as defined by Assembler
Phil Smith wrote:
It's certainly easy to look at the Crypto CVT created by ICSF and see what's
supported.
snip
ICSF also has a query algorithms service that will tell you what's
supported and whether each algorithm is run in HW or SW on the machine
the code runs on. It's a callable
Yes, but not protected key.
Lloyd
- Original Message
From: Scott Ford scott_j_f...@yahoo.com
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Sat, April 27, 2013 2:27:59 PM
Subject: Re: Crypto Facility performance.
Guys,
I have a question , can a vendor use crypto services on Z without the crypto
Scott,
The newer version of z/PDT support crypto cards. I am not sure which version
added it, but I know that the last two or three versions support them. They
have to be configured in the zPDT device map.
Lloyd
- Original Message
From: Scott Ford scott_j_f...@yahoo.com
To:
From the CBT tape.
//***FILE 264 IS FROM B.F. GOODRICH IN AKRON OHIO
//*
//* 1 LOOK- A TSO COMMAND PROCESSOR THAT ALLOWS
//* FULL SCREEN DISPLAY OF REAL TIME
//* MEMORY. THIS COMMAND HAS BEEN
//*
On Sat, 27 Apr 2013 14:07:17 -0400, Anne Lynn Wheeler wrote:
...
part of this was slightly earlier, paper copy of document describing 370
virtual memory (available for all 370s) showed up at an industry
publication (before virtual memory for 370 was announced). investigation
was sort of
On 04/29/2013 07:11 AM, Bill Godfrey wrote:
On Mon, 29 Apr 2013 03:58:41 -0500, Ron Thomas wrote:
Ok. in that case what does this statement does?
OCINSTR1+1(1),0(R5)
I believe this will have the function either CLI,NI,TM,OI,XI. so why this
OR aganist XL8'8040201008040201'. So how is
It is not at all a bad subroutine. In many contexts the form of the
second argument would be gratuitously clumsy, but this routine was
(almost certainly) intended to be called from COBOL, and eight '0' or
'1' characters is appropriate for COBOL.
I would not myself have used assembler mnemonics,
On Mon, 29 Apr 2013 10:50:25 -0400, John Gilmore wrote:
It is not at all a bad subroutine. In many contexts the form of the
second argument would be gratuitously clumsy, but this routine was
(almost certainly) intended to be called from COBOL, and eight '0' or
'1' characters is appropriate for
I think it's important to point out that ANSI X9.24 applies to financial (PIN)
transactions/data. And there are federal regulations, at least in the U.S.
that mandate meeting this requirement of providing tamper resistant/tamper
responding technology as specified in a number of standards. The
IBM Mainframe Discussion List IBM-MAIN@LISTSERV.UA.EDU wrote on
04/29/2013 11:06:34 AM:
From: Paul Gilmartin paulgboul...@aim.com
Has the z nowadays any memory protection mode that forbids fetching
instructions from data storage? (Many other processors have such.)
they have different
I would be surprised if a binary search could beat a linear search with
only five items in the list, which is the case in the example code
here. If usage of the function request codes were uniformly
distributed, the average number of list item comparisons with five items
for binary search
On 4/29/2013 1:56 PM, Ed Jaffe wrote:
My ROT has always been to prefer linear search for single-digit
quantities and prefer binary or hash algorithms for ten or more.
A long time ago I implemented Knuth's balanced tree algorithm (AoP Vol.
3, sect 6.2) as a generalized subroutine, and
I am currently converting my physical tape environment to Virtual and have
found a snag. I have started the RECYCLE
process and I found a problem. A user recalled a dataset that was on a
recycled tape, HSM asks for the correct volume to be mounted, but it wants it
mounted on an old 3490
I posted the formulæ for match-seeking binary and linear search in a
'related' thread.
Following Knuth, the standard figure of merit for match-seeking binary
search if the total number of ternary comparison operations required
to search a set with 2n + 1 argments. For the n keys k(1) k(2) .
.
Thank you for the reply..
I do have the USERUNITTABLE defined for my esoteric. My Virtual is defined as a
9484 and HSM does not recognize that.
I'm not having a problem with remembering the drive.. the oddest thing is, that
we haven't used these tape drives for HSM since the late 90's. There
The 3490 unit assignment could be a default being set somewhere in z/OS; if
this is the case, then you're falling through somewhere(possibly in ACS
routines) and by default z/OS assigns the default unit type.
Regards,
Hervey
-Original Message-
From: IBM Mainframe Discussion List
On Mon, 29 Apr 2013 13:16:59 -0400, John Gilmore wrote:
The question which is faster depends in detail upon
1) whether binary search is implemented in assembly language, in which
case ternary comparison operations are available, or in a
statement-level language other that PL/I, in which case
Ahh ha! I think you are onto something.. We are not managing tape datasets,
but I started looking at routines and it looks like it verifies the device to
decide if it needs managed... I did not add my virtual tape esoteric
I'll do that straight away and update when done...
Thanks!!!
Hello,
Another question .. I have four PDS's of copybooks, pgms, sysexec, proclib. I'd
like to search the four for something. Have looked at 3.14 and 3.15 but seems
that I can only search one PDS at a time. Is this the case, have I missed
something?
Please, thanks,
Graham Hobbs
In article 3FBE8841A32941B492C2148EABF8D156@graham you wrote:
Hello,
Another question .. I have four PDS's of copybooks, pgms, sysexec, proclib.
I'd like to search the four for something. Have looked at 3.14 and 3.15 but
seems that I can only search one PDS at a time. Is this the case, have
If you have SimpList you can use the MRG command to logically (not physically)
merge the libraries together and search them all at once. Another advantage of
MRG is that it allows you to be in one member (e.g. a COBOL program) and look
at members (e.g. copybooks) that exist in the other merged
On 4/29/2013 2:40 PM, Graham Hobbs wrote:
Hello,
Another question .. I have four PDS's of copybooks, pgms, sysexec, proclib. I'd
like to search the four for something. Have looked at 3.14 and 3.15 but seems
that I can only search one PDS at a time. Is this the case, have I missed
something?
On 4/29/2013 2:48 PM, Don Poitras wrote:
In article 3FBE8841A32941B492C2148EABF8D156@graham you wrote:
Hello,
Another question .. I have four PDS's of copybooks, pgms, sysexec, proclib. I'd
like to search the four for something. Have looked at 3.14 and 3.15 but seems
that I can only search
At least two options to do what you want:
3.15 brings up panel ISRSFPRI. If you blank out the DS Name and Member
List fields, it will bring up panel ISRSFCON which allows you to specify up to
four datasets to search.
If you use 3.4 to bring up a dataset list containing the datasets
Uhm.. well . that didn't work..
I have entries to test the device and it would set the storage class to '', in
a sense it would bypass SMS routines.
Back to square one
--
For IBM-MAIN subscribe / signoff / archive
The subroutine that was originally posted didn't modify itself, but it
constructed a
little subroutine (one instruction and branch for return) in a working
area which was
provided as a parameter by the caller. So there is no reentrant problem
and no
flushing of the I-cache.
Thank you for
Gentlemen,
Thanks again, after ten years away from mainframe had forgotten 'srchfor' so
finally came up with
//SEARCH JOB (CONRAD),'GH',
// CLASS=A,MSGCLASS=0,MSGLEVEL=(1,1)
// EXEC PGM=ISRSUPC,
// PARM=(SRCHCMP,ANYC,IDPFX,NOPRTCC)
//NEWDDDD
On 2013-04-29 16:59, Graham Hobbs wrote:
Gentlemen,
Thanks again, after ten years away from mainframe had forgotten 'srchfor' so
finally came up with
//SEARCH JOB (CONRAD),'GH',
// CLASS=A,MSGCLASS=0,MSGLEVEL=(1,1)
// EXEC PGM=ISRSUPC,
//
IBM Mainframe Discussion List IBM-MAIN@LISTSERV.UA.EDU wrote on
04/29/2013 06:47:16 PM:
From: Bernd Oppolzer bernd.oppol...@t-online.de
Another story:
I once had a hard time to understand a (very old) assembler module. It
searched
strings in another string, and the string to look for was
Graham,
You might want to add SDUPM as parm option to search for duplicate
members. SDUPM Searches all members found in concatenated PDS data sets,
even if the members have the same name and are at a higher level. The
Default is to ignore duplicate members
Kolusu
IBM Mainframe Discussion
Paul
I'm a total novice at this. Your specific questions: responses are below (
was going to say 'answers' but that would be a funny:-)
cheers
graham
- Original Message -
From: Paul Gilmartin paulgboul...@aim.com
Newsgroups: bit.listserv.ibm-main
To: IBM-MAIN@LISTSERV.UA.EDU
Sent:
In FDD1A4F653CC4D9380931CC4899381AD@graham, on 04/27/2013
at 08:27 PM, Graham Hobbs gho...@cdpwise.net said:
Subject: Run a REXX from JCL stream
That's not how IKJEFT011 works.
Am a 'not a sysprog'
You don't need to be an SP to use IKJEFT01.
//SYSTSIN DD DSN=VENDOR.SYSEXEC(JOB2),DISP=SHR
At a guess, how many COBOL/CICS developers have ever heard of IKJEFT01?
Start your count at 2.
- Original Message -
From: Shmuel Metz (Seymour J.) shmuel+...@patriot.net
Newsgroups: bit.listserv.ibm-main
To: IBM-MAIN@LISTSERV.UA.EDU
Sent: Monday, April 29, 2013 9:54 PM
Subject: Re:
In 78a9dade-c8c5-4d7a-809d-df4db28ff...@comcast.net, on 04/28/2013
at 10:57 PM, Ed Gould edgould1...@comcast.net said:
I think the edit mask was 40202020214B2020 (example the 21 forced a
period before any numbers)
'21'x is significance starter.
my memory says (and I might be wrong) that
Scott Ford asks:
I have a question , can a vendor use crypto services on Z
without the crypto Card ?
Lloyd Fuller replies:
Yes, but not protected key.
Protected Key is supported with CPACF (CP Assist Cryptographic Facility)
and does not *require* a CryptoExpress option. Perhaps you meant to write
On 30/04/2013 4:12 AM, Paul Gilmartin wrote:
On Mon, 29 Apr 2013 13:16:59 -0400, John Gilmore wrote:
The question which is faster depends in detail upon
1) whether binary search is implemented in assembly language, in which
case ternary comparison operations are available, or in a
43 matches
Mail list logo