Re: IEBPTPCH questions

2012-06-19 Thread Paul Gilmartin
On Tue, 19 Jun 2012 08:51:12 -0500, Tom Marchant wrote:

I didn't see anything in the OP's query that required instream data.

I'm sorry.  I violated the cardinal rule of IBM-MAIN, that a followup
never addresses matters not raised by the OP.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Co:Z SPTF OMVS segment duplicate

2012-06-21 Thread Paul Gilmartin
On Thu, 21 Jun 2012 10:41:59 -0500, Mark Steely wrote:

I have several ID's that share the same UID. 

Don't do that.  Would different UIDs and a common HOME directory
work for you?  Would separate home directories and symlinks to
a project/group directory, group-writable work?

Some times the wrong ID gets used and the default home directory does not 
contain a RSA key. Is there a way to pass which or where to look for the RSA 
key ...

Would symbolic links from the various home directories to a
shared RSA key work?  But beware; some security facilities
prudently decline to operate when the key cache is readable
by other UIDs or even by the owning group.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Shrinking a ZFS aggregate

2012-07-05 Thread Paul Gilmartin
On Thu, 5 Jul 2012 08:50:25 -0500, McKown, John wrote:

What is needed is for IBM to write a zfsresize command. This command would 
reorganize the internals of a zfs, compacting the used portions towards the 
front of the dataset, adjusting the internal pointers, and marking some 
portion (based on the user's input) as unusable. Once the UNIX people have 
written this code, the DFSMS people will need to write code which allows the 
excess space in a VSAM LDS file to be released. Or is this functionality 
already in SMS. I have a vague memory. Like so many of my memories.
 
You neglected to say that this all must be done nondisruptively, while
the filesystem may be in use and files may be open for update.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Import image to overlay

2012-07-12 Thread Paul Gilmartin
On Thu, 12 Jul 2012 00:26:49 -0400, Ed Finnell *@AOL.COM wrote:

_www.printers.ibm.com_ (http://www.printers.ibm.com)  redirects to  the
Ricoh site. ...
 
It's worse than that.  There, I see:

You may have JavaScript disabled in your browser.
Instructions for enabling JavaScript can be found here:

   http://support.microsoft.com/gp/howtoscript

... where I read:
...
Mozilla Corporation’s Firefox version 2
On the Tools menu, click Options. 


Firefox version 2!?  I have Firefox 13.0.1.  And my Tools menu has
no Options entry.  Perhaps they mean Preferences on the Firefox
menu.  The instructions are Windows-centric, to be expected of
Microsoft, but Infoprint errs in not providing more generic (and
contemporary) instructions.

On the bright side, whether by enhancements from AOL or LISTSERV,
I can now follow links in your postings without editing them.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: OT Yahoo Accounts Hacked

2012-07-12 Thread Paul Gilmartin
On Thu, 12 Jul 2012 11:58:17 -0700, Lizette Koehler wrote:

  
 http://www.cnn.com/2012/07/12/tech/web/yahoo-users-hacked/index.html?hpt=hp_t2


(CNN) -- Hackers posted online what they say is login information for more 
than 450,000 Yahoo users.
 
Does this imply that Yahoo is storing passwords in clear text?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Relationship of C signals to z/OS terminology?

2012-07-13 Thread Paul Gilmartin
I stand corrected about SIGKILL vs. SIGILL.

On Fri, 13 Jul 2012 09:45:00 -0700, Charles Mills wrote:

BTW, this is z/OS batch (STC actually). Does operator CANCEL generate a 
SIGKILL? Or ...?
 
I once suggested that for compatibility with existing UNIX conventions
z/OS system shutdown should send SIGTERM to all dubbed processes
so they could perform orderly shutdown.  The suggestion wasn't very
popular.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: COBOL packed decimal

2012-07-14 Thread Paul Gilmartin
On Sat, 14 Jul 2012 14:39:04 -0400, John Gilmore wrote:

Some years ago this situation changed dramatically.  Mike
Cowlishaw---he who designed REXX---devised what is now ANSI decimal
floating point  (DFP).  DFP behaves consistently in ways that do not
surprise accountants.  (All three floating-point formats are supported
by zArchitecture hardware.)

I understand (I have very little firm knowledge of these things) that DFP
supports setting an absolute rather than relative rounding point, and
that is required by GAAP.  I don't know that Rexx has such support
(but I haven't sought it -- I'm a numeric rather than accounting kinda
guy.  And I notice you merely cited a common authorship without
asserting that Rexx has the facility).

Much of Rexx's numeric architecture was driven by Cowlishaw's
objective of supporting no data type other than string in Rexx.

Surely there must be GAAP conformance testing suites.  Have DFP,
Rexx, Cobol, PL/I, etc. been vetted against such?  The multiplicity
of choices for rounding and truncation provides a strong incentive
for OO design.  I could imagine different classes with methods for
the various rounding conventions.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek

2012-07-16 Thread Paul Gilmartin
On Mon, 16 Jul 2012 13:31:07 -0400, zMan wrote:

On Mon, Jul 16, 2012 at 12:00 PM, John Gilmore wrote:

 Passwords or userids that may be at most 8 characters in length are
 unacceptable today.

Passwords, yes; userids, meh -- I don't consider a userid to be a secure
data point.
 
It's not a matter of security; rather that many IT departments nowadays
have a standard of 8-character userids.  IBM is a tail that can no longer
wag that dog; the CIO can cite refusal to comply with corporate standards
as one more strike against z/OS in a purchase decision.

And ID administration must be via LDAP from the corporate standard
Linux server.  There are 3rd party products that enable this; none AFAIK
for 8-character userids.

Hmm... what's the length limit of aliases in USERIDALIASTABLE?  Is
USERIDALIASTABLE processed for connections to FTP server, or only
for logins?  Does it affect the output of getpwuid()?  Etc.?

http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/bpxzb2c0/3.7.4.5

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek

2012-07-17 Thread Paul Gilmartin
On Tue, 17 Jul 2012 13:45:51 +0800, Timothy Sipples wrote:

4. It's a big problem when practically everybody in the security community
criticizes Yahoo! for their intransigence in fixing the problem. It's an
even bigger problem when my own mother suffered from Yahoo's decade plus
long failure to turn on HTTPS.
 
Of course, turn on implies commiting the CPU (micro)cycles to peform
the encryption.

(*) It would certainly help if the wi-fi industry adopted a Public
WPA2 (a.k.a. coffee shop) addition to their standards, requiring
adoption and compliance among manufacturers. Such an amendment would be
similar to HTTPS, allowing simple walk up encryption of wi-fi
connections. Hopefully it would also have reputation-based client
evaluation of wi-fi hotspots to reduce spoofing risk. Oddly, wi-fi doesn't
yet have a great, easy-to-use security solution for the coffee shop/hotel
scenarios where wi-fi is so popular. Maybe Apple will figure this out.
 
And WEP/WPA provides encryption as far as the coffee shop's router.
Upstream from that the communication is still susceptible to interception.
And an unscrupulous coffee shop itself could log and mine its traffic.

There are enterprises providing VPN services commercially to their
hubs, often geographically dispersed.  But the VPN provider itself
has access to all the customer's traffic.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek

2012-07-17 Thread Paul Gilmartin
On Tue, 17 Jul 2012 13:13:03 +0800, Timothy Sipples wrote:

You're referring to TSO/E only, which has a 7 character user ID limitation.
Yes, if you're shopping for TSO/E, maybe that's a strike against TSO/E.
Also (consequently?) if you're shopping for a Lockheed Martin F-22 Raptor
military fighter aircraft. Its design support and parts database is limited
to 7 character user IDs, too:

http://www.lockheedmartin.com/us/aeronautics/materialmanagement/scm-engineering/scm-emap.html
 
I suppose that's some kind of endorsement.  The (consequently?) may
be significant.

Fact: Every z/OS licensee receives Tivoli Directory Server for z/OS with
LDAP. There's no such limit there, and, like TSO/E, it's part of base z/OS.
If you want N-character user IDs (N7), go for it. Enjoy.
 
But do users with such IDs then have access to TSO/E?  And how do
IDs with N8 play with other components, such as batch?  For
simple examples, what ID is displayed in messages such as IRR010I?
What ID does getpwuid() return as *pw_name?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek

2012-07-17 Thread Paul Gilmartin
On Tue, 17 Jul 2012 07:36:49 -0500, McKown, John wrote:

 -Original Message-
 [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Timothy Sipples
 Sent: Tuesday, July 17, 2012 12:13 AM
 
snip
 
 Fact: Every z/OS licensee receives Tivoli Directory Server  for z/OS with
 LDAP. There's no such limit there, and, like TSO/E, it's part  of base z/OS.
 If you want N-character user IDs (N7), go for it. Enjoy.

Hum, I didn't know we had Tivoli Directory Server built into and free to 
use with z/OS. I may give a look at this. It __might__ be of some interest. 
But not really likely, given the MS-centric world view of everybody here who 
is not directly using z/OS.
 
And, again, is that LDAP an LDAP client or an LDAP server.  If IT
management has decreed that IDs should be managed via LDAP
hosted on, e.g., a Linux server, z/OS needs not an LDAP server but
an LDAP client in order to play well with others.  With such a decision
a fait accompli, that management will be little moved by arguments
of the technical superiority of Tivoli.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Unsetting a JCL symbol.

2012-07-17 Thread Paul Gilmartin
Just curious.

Once a JCL symbol has been set, is there any way subsequently
to restore it to exactly the state and behavior it had before it
was set?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Unsetting a JCL symbol.

2012-07-17 Thread Paul Gilmartin
On Tue, 17 Jul 2012 16:43:32 -0500, Bass, Walter W wrote:

Try this ...

//* SAVE CURRENT VALUE OF MYSYM
// SET SAVESYM=MYSYM
//* SET MYSYM TO A NEW VALUE
// SET MYSYM='NEWVAL'

...
//* RESTORE MYSYM
// SET MYSYM=SAVESYM

Probably not the answer you wanted, but it works.  

Actually, it doesn't work:

3 //BEFORE   EXEC  PGM=IEFBR14,PARM='MYSYM.X'
  //* 
  //* SAVE CURRENT VALUE OF MYSYM 
4 // SET SAVESYM=MYSYM   
  //* SET MYSYM TO A NEW VALUE
5 // SET MYSYM='NEWVAL'   
6 //DURING   EXEC  PGM=IEFBR14,PARM='MYSYM.X'
  //* 
  //* RESTORE MYSYM   
  IEFC653I SUBSTITUTION JCL - PGM=IEFBR14,PARM='NEWVALX'  
7 // SET MYSYM=SAVESYM   
  IEFC653I SUBSTITUTION JCL - MYSYM=MYSYM
8 //AFTEREXEC  PGM=IEFBR14,PARM='MYSYM.X'
  IEFC653I SUBSTITUTION JCL - PGM=IEFBR14,PARM='MYSYMX'  
9 //  

... notice the difference between lines 3 and 8.

Another possibility is to take advantage of the fact that symbols that
are SET within a PROC automatically revert to their former value after
the PROC terminates.

That one I believe.  Steve suggested it too.  But in open code, there
seems to be no solution.  Symbols are initially in a Garden of Eden
state (which John G. dislikes).  Once they leave they can never return.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: REXX ISPF edit FIND failing

2012-07-19 Thread Paul Gilmartin
On Thu, 19 Jul 2012 10:19:28 +0100, Rupert Reynolds wrote:

There is no need to send edit commands via ISPEXEC anyway:-)
 
What was the rationale for making the initial host command environment
when an edit macro is entered TSO rather than the obvious ISREDIT?
Was it merely that the ISPF developers were not well versed in Rexx
lore when Rexx burst upon the TSO/E v.2 (whatever) scene?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: REXX ISPF edit FIND failing

2012-07-19 Thread Paul Gilmartin
On Thu, 19 Jul 2012 09:12:54 -0700, John Mattson wrote:

And the grand prize goes to Tom Ambros 
Yes, use DOUBLE AMPERSANDS in REXX and the FINDs work properly.
So simple when we finally see it.  Many thanks to everyone.
 
So is the behavior of EDIT different when identical command
strings are issued from Rexx vs. CLIST?  Ugh!

But might this be because the ISPF developers recognized
that '' symbolics would be elaborated by CLIST but not by
Rexx and made a misguided attempt to make the Rexx
behavior superficially more CLIST-like by processing Rexx
command strings in a front-end?  Did they break an API
to offset their misunderstanding of Rexx?

What's the behavior when the macro is written in Assembler/
PL/I/C using the CALL interface?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: COBOL packed decimal

2012-07-21 Thread Paul Gilmartin
On Fri, 20 Jul 2012 11:43:45 -0400, Shmuel Metz (Seymour J.) wrote:

Is this because Unisys is deficient in conformance to the standard,
or because IBM's implementation contains an extension to the
standard?

No, it's because UNIVAC used ones complement arithmetic on most of its
lines, Including the 1108 et al that Unisys inherited.
 
That's pretty vague.  Does the standard specify the behavior as
implementation defined, in which case a conforming program
intended to be portable should avoid relying on either vendor's
behavoir; or does one of the vendors deviate from the standard?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: REXX ISPF edit FIND failing

2012-07-21 Thread Paul Gilmartin
On Fri, 20 Jul 2012 15:55:28 -0700, John Mattson wrote:

Shmuel !  Its amazing how much you contribute without access to a z
system.  Hope my memory and research is that good when we go off zOS
(we're being SAPonified).
  
So, are you on a slippery slope?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Passwords and user-ids was Re: Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek

2012-07-21 Thread Paul Gilmartin
On Fri, 20 Jul 2012 23:22:38 -0300, Clark Morris wrote:

  If you believe that user-ids should be larger than 7
characters or even 8, then what are the implications for SMF records
and various control blocks in z/OS? 
 
Many modern products use XML to avoid such hard limits.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: REXX ISPF edit FIND failing

2012-07-22 Thread Paul Gilmartin
On Sun, 22 Jul 2012 13:50:25 +0100, CM Poncelet wrote:

Same
question as earlier: Do identical command strings issued to ISREDIT
from CLIST and CALL have identical effect?

I would expect the ISREDIT effects of REXX/Clist v. ISPLINK calls to be
identical, because the command strings in the call are passed as data
constants.
 
But if issuing identical commands issued from Rexx vis-a-vis CLIST
produce different results, the result from ISPLINK must differ from
at least one of them.

I suppose I can consider myself blessed never to have encountered this
problem, possibly because I have never attempted a FIND command
containing an ampersand.  I shall continue to strive to avoid doing so.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Submitting a requirement for z/OS to at least acknowledge SIGNAL SHUTDOWN by printing a message

2012-07-22 Thread Paul Gilmartin
On Sun, 22 Jul 2012 15:17:11 -0500, David Boyes wrote:

For those of you who haven't seen it, VM, VSE and Linux register for a 
specific fully-architected hardware external interrupt (in the PoPs) that 
indicates that the LPAR is being shut down. VSE issues a message, VM reflects 
the interrupt to all virtual machines which are registered to receive it, and 
Linux (if configured to register for it) triggers a user-specified command 
(usually 'shutdown -h now'). I'd like to have z/OS register for that 
interrupt, and at least print a unique message if/when that specific interrupt 
arrives.
 
In Linux, which process handles the shutdown signal?  Init?  Or is it sent
to all processes with a default of ignore, with at least one superuser
process handling it by issuing shutdown?

Some years ago, I suggested in MVS-OE that MVS shutdown should
send SIGTERM to all dubbed processes so that processes coded to
UNIX conventions could perform orderly shutdown.  The suggestion
was not well received.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Submitting a requirement for z/OS to at least acknowledge SIGNAL SHUTDOWN by printing a message

2012-07-22 Thread Paul Gilmartin
On Sun, 22 Jul 2012 18:23:36 -0400, zMan wrote:

 Some years ago, I suggested in MVS-OE that MVS shutdown should
 send SIGTERM to all dubbed processes so that processes coded to
 UNIX conventions could perform orderly shutdown.  The suggestion
 was not well received.

Can you elaborate? Why would orderly shutdown not be A Good Thing?
 
They didn't say.  Too UNIXy for them.  But I'll conjecture:  Many address
spaces get dubbed nowadays by incidental use of UNIX services such as
TCP/IP.  The default action for SIGTERM if a process doesn't handle it
is that the process is terminated.  This would be unwelcomed by a process
that was waiting rather for a legacy MODIFY command to shut itself down.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: AW: Cbttape Freeware isn't available

2012-07-23 Thread Paul Gilmartin
On Mon, 23 Jul 2012 08:50:35 -0400, Shmuel Metz (Seymour J.) wrote:

Could someone post the IP, the problem still seems to exist for
some of us. Maybe DNS corruption.

I'd guess a firewall issue. Does yours allow ICMP packets through?
Have you tried a tracerte[1] for the same sites?

[1] The name may vary depending on system.

There are  sites that will do these things for you.  E.g.:

http://network-tools.com/

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Gordon Crovitz: Who Really Invented the Internet?

2012-07-23 Thread Paul Gilmartin
On Mon, 23 Jul 2012 15:57:16 -0400, Mitch wrote:

you mean it wasn't Al Gore?

No, he just eponymously supplied some of the algorithms.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Authorized Rexx Assembler Function

2012-07-23 Thread Paul Gilmartin
On Mon, 23 Jul 2012 19:35:04 -0700, Garry G. Green wrote:

Also TSO has an APF list.  When you request invocation of a program that is on 
the APF list (today this is in Parmlib IKJTSO; in the SPF days it was a zap to 
IKJEFTE2/8) - instead of running the program, IKJEFT02 posts IKJEFT01 
(remember, it IS running APF) that you want to run a program APF.  IKJEFT01 
then ATTACHs a 2nd copy of IKJEFT02, referred to as a Parallel TMP, the same 
as the first one except it is told which program to execute, and the 2nd 
IKJEFT02 has a JSCB whose JSCBAUTH flag is on.
 
Why have such a special list rather than merely verifying that the program
resides in an APF authorized library and was linked with AC=1?

(TMI -- Is ISPF better, now?  How?)

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: AW: Cbttape Freeware isn't available

2012-07-24 Thread Paul Gilmartin
On Tue, 24 Jul 2012 06:11:45 -0400, Shmuel Metz (Seymour J.) wrote:

There are  sites that will do these things for you.

There are sites that do DNS and whois lookups for you. There are no
sites that analyze what your own firewall is blocking.
 
Granted.  And the firewall design probably considers it a security feature
not to disclose to users what it blocks because otherwise they'd be able
to infer more easily what it doesn't block.

But introducing a third party helps isolate the problem.  If you can
access network-tools but network-tools can't access cbttape,
there's stronger reason to suspect cbttape.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: REXX ISPF edit FIND failing

2012-07-24 Thread Paul Gilmartin
On Tue, 24 Jul 2012 08:39:35 -0400, Shmuel Metz (Seymour J.) wrote:

Address ISREDIT does not in general require quotes either. The quotes
are only needed because you want constants with special characters.

And remembering that Rexx considers lower case characters special.

Had you wanted, e.g.,

  Address ISREDIT F NEXT

then you wouldn't have needed quotes, assuming that you haven't
assigned values to F or NEXT.
 
And assuming you're not trapping references to undefined variables.

By IPCS call and ISREDIT call do you mean expressions beginning
with IPCS or ISREDIT? If so, it's indirect. OTOH, if you mean
expressions recognized by IPCS or ISREDIT, then it's direct.

 Address ISREDIT
 ISREDIT foo/* indirect */
 foo/* direct   */
 
Do these have different semantics?

No; there's a clash between the way ISPF works and your preconceptions
about how it works. From an ISPF and CLIST perspective, REXX is just a
consumer of strings; how it interprets those string is beyond the
scope of the scripting language.
 
If ISPF assumes that an ampersand in a command string has special
meaning to the scripting language to the scripting language, and
allows its behavior to be influenced by that (sometimes incorrect)
assumption, ISPF is overstepping its proper scope.

But I'm accustomed to accessing script variables (in Rexx) by
coding their names in parentheses, e.g.:

ILine = 42
'(L) = LINE' ILine

Is this yet another convention?  Is it not sufficient?  Why do we
need idiosyncratic treatment of ampersands also?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Who's blacklisting IBM-MAIN

2012-07-25 Thread Paul Gilmartin
Attempting to connect to the archives from my
employer's WAN, I get:

Compliance Alert:URL - http://listserv.ua.edu/cgi-bin/wa?A0=ibm-main; 
Category - Malicious Sites

And access to the archives is unbearably slow to
impossible from elsewhere.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Using SSH or SCP in REXX under TSO

2012-07-25 Thread Paul Gilmartin
On Wed, 25 Jul 2012 22:12:01 +, Uriel Carrasquilla wrote:

Does anybody have a sample REXX that can be shared to either scp or ssh to 
remote Unix from TSO?
I have seen JCL to that effect using BPXBATCH but I have not tried it since I 
need the REXX.

Crudely (error recovery is left as an exercise for the student), but it works:

/* Rexx */ signal on novalue; /*
   Doc: Using ssh from a Rexx EXEC.
run on  or 
*/
trace R

user_host   = ***  /* Sorry!  */
source_file = ***

parse source .
RC = SYSCALLS( 'ON' )
address 'SYSCALL'
'open /dev/null' O_RDWR  /*  busy out stdin, stdout, stderr.  */
'open /dev/null' O_RDWR
'open /dev/null' O_RDWR
say RC RETVAL

'open (source_file)' O_RDONLY
stdin = RETVAL

map.0 = stdin
map.1 = 1
map.2 = 2

arg.1 = 'ssh'
arg.2 = user_host
arg.3 = 'set -x; cat foo-sshtest; echo done'
arg.0 = 3

env.1 = 'PATH=/bin:/usr/sbin'
env.0 = 1

'spawn /bin/ssh 3 map. arg. env.'
say RC RETVAL
'close' stdin
say RC RETVAL
exit( RC )

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Using SSH or SCP in REXX under TSO

2012-07-26 Thread Paul Gilmartin
On Thu, 26 Jul 2012 09:55:07 -0500, McKown, John wrote:

Remember! that scp on z/OS does an EBCDIC to ASCII translation. If you need a 
binary transfer,
you'll need to use sftp.
 
I've not tried sftp.  I'd expect that sftp and scp are both variants of ssh,
and the EBCDIC-ASCII translation is intrinsic to the socket interface.
Does z/OS sftp have a BINARY subcommand?  Are you extrapolating too
much from Co:z?

I used ssh rather than sftp or scp in the example I posted (I've enhanced
it since) partly because of familiarity; partly it gives most control with
least terminal interaction.  Between two ASCII systems, I have done:

ssh remote-host cd wherever amp; tar -cf - . | tar -xvf -

With EBCDIC, I'd need an iconv in the pipe.

I believe that if ssh (or kindred) needs to prompt for confirmation
or password it will write the prompt to stderr and read the response
from /dev/tty.  This might work from native z/OS UNIX (USS), perhaps
even from TSO OMVS.  It's less likely from TSO or BPXWUNIX.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Using SSH or SCP in REXX under TSO

2012-07-26 Thread Paul Gilmartin
On Thu, 26 Jul 2012 10:37:28 -0500, McKown, John wrote:

No. sftp uses a separate SSH subsystem which does not do the code 
translation. IIRC, sftp as distributed by IBM only does a binary transfer. The 
Dovetailed Technologies enhancments to z/OS sftp allows for code translation. 
And, in addition, allows transfers to/from z/OS legacy data sets and access to 
the JES SPOOL (get output and put, as in submit, jobs).
 
Thanks.  I was unaware of that.

 ssh remote-host cd wherever amp;amp; tar -cf - . | tar -xvf -
 
 With EBCDIC, I'd need an iconv in the pipe.

You mean to do the equivalent of a binary transfer? I don't think you'd 
succeed. I almost never use ssh for file transfer. I guess because I find scp 
easier, for me.
 
I take that as a challenge.

scp /wherever/* user@remote-host:/wherever/
 
On Linux, I've also done:

cd /wherever; echo -e 'cd /wherever\nmput *\nquit\n' | sftp user@remote; cd -
 
But will either of those do a recursive copy of an entire directory hierarchy?

You cannot do ssh under TSO OMVS. That is documented by IBM in the OpenSSH 
manual. The reason given on one of the forums was the fact that there is no 
way to nodisplay what you type in for the passphrase or password when 
running under TSO OMVS.
 
Another challenge?  If my Rexx works from the ISPF command line,
I'd hardly expect it to fail from TSO OMVS.  Need to try.

I believe ftp (not sftp) successfully masks the password from the
TSO OMVS command line.  There's a Rexx utility, getpass(prompt)
to do that.  But years ago I submitted a PMR that neither stty -echo
nor the underlying syscall masked the command line for password
entry. IBM fixed stty but not the underlying syscall.  Go figger.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Using SSH or SCP in REXX under TSO

2012-07-26 Thread Paul Gilmartin
On Thu, 26 Jul 2012 16:13:12 +, Uriel Carrasquilla wrote:

For the source_file, is it a USS file? or can it be a zOS file?

open() requires a USS file.

 'open (source_file)' O_RDONLY
reads the file but where is it used?

The descriptor gets assigned to map.0

 map.1 = 1
 map.2 = 2
shouldn't these two parameters be pointing to STDOUT and STDERR recpectively?
 
It was hasty.  I'll attach an enhanced instance.

Or I may have to use:
'waitpid (spid) waitpid. 0' 
xrc = waitpid.W_EXITSTATUS  

To get the actual return code for the spawn child.
 
Ah, but that's error handling, left as an exercise ...

John M.:  They fixed password masking ad hoc in ftp long ago.
They never fixed ioctl/fcntl/whatever where the real problem that
should have been fixed lies.  They feel that getpass() is a
satisfactory circumvention.

/* -*/
trace R
signal on novalue
parse source sys invoked exfn exft exfm excmd subenv .
RC = SYSCALLS( 'ON' )
address 'SYSCALL'

'open (source_file)' O_RDONLY
stdin = RETVAL

if subenv=='SH' then do
stdout = 1
stderr = 2
end; else do
'pipe P.'
stdout = P.2
stderr = P.2;  end

map.0 = stdin
map.1 = stdout
map.2 = stderr

arg.1 = 'ssh'
arg.2 = user_host
arg.3 = 'set -x; cat foo-sshtest; : Done'
arg.0 = 3

env.1 = 'PATH=/bin:/usr/sbin'
env.0 = 1

'spawn /bin/ssh 3 map. arg. env.'
say RC RETVAL
'close' stdin
if subenv'SH' then do
'close' P.2
'readfile /dev/fd/'P.1 'L.'
'close' P.1
do I = 1 to L.0
say L.I;  end I;  end

exit( RC )

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Is it possible to open a ZIP file with PAX?

2012-07-26 Thread Paul Gilmartin
On Thu, 26 Jul 2012 12:24:34 -0400, Bill Ashton wrote:

Is it possible to use the PAX program to open a .zip file on the mainframe,
or does anyone have any other suggestions? I know I can open it on the PC
and transfer the file components over...just looking to see if I can cut
out a step.
 
No.  Use jar.  Or if your PC utility will do it, repack it in pax/tar format
and transfer that.

Beware ASCII-EBCDIC problems; I hate EBCDIC!

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Who's blacklisting IBM-MAIN

2012-07-26 Thread Paul Gilmartin
On Wed, 25 Jul 2012 15:16:38 -0500, Jonathan Goossen wrote:

When I click the first link, it gets translated to https and works fine.
 
Which is probably redirection by LISTSERV, so you got that far.


 From: Farley, Peter x23353 
 Date: 07/25/2012 02:23 PM

 Interesting.  I get the same results using my employer's network,
 which uses McAfee WebWasher to intercept non-business web
 browsing.  The second url works fine but the first url is blocked.
 Maybe it's the fact that the second url you provided is https and
 thus is (potentially) secure in some fashion?  Why would access to
 a non-secured university web page be considered non-business or
 bad reputation?  What if you are trying to discover if the
 university has courses for your professional career development?

 I really hate it when the nanny-techs interfere.

We're mcAfee, too.

Darren says:

Subject: Re: IBM-MAIN archives unresponsive?
From: Darren Evans-Young 
Date: 07/26/12 16:28
To: Paul Gilmartin

I'll look into it. Slow for me too.
Probably related to the new server they migrated
Listserv to.
 
Darren

(I know; I'm violating etiquette by distributing a private
communication.  Judgment call; I'm not very sorry.)

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Friday: What you've been waiting for! Build an 80 column punched card reader!

2012-07-27 Thread Paul Gilmartin
On Fri, 27 Jul 2012 07:21:26 -0500, McKown, John wrote:

For the truly strange hardware hackers among us.

Hardware:
http://codeincluded.blogspot.co.nz/2012/07/punch-card-reader-hardware.html

software:
http://codeincluded.blogspot.co.nz/2012/07/punchcard-reader-software.html

Ummm...  USB interface.  For Herc on Raspberry Pi?  Driver?  What code
page?  For that matter, what was the code page for IBM card readers?
I doubt that it was selectable.

Almost as easy to put 3 at a time on a scanner with black construction paper
backing.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Top posting

2012-07-29 Thread Paul Gilmartin
On Sun, 29 Jul 2012 11:32:19 -0400, Gord Tomlin wrote:

While there is an RFC (I'm not going to hunt for the number on a Sunday)
that specifies that bottom posting is correct, as a reader I find
bottom posting to be hugely counterproductive. When reading a thread in
order, bottom posting requires the reader to scroll past what has
already been written. The longer the thread gets, the more painful this
becomes. I do not use the web interface, so I am not aware of the
problems its users are encountering, but bottom posting is enough of an
annoyance for me in my email client.
 
RFCs of the same vintage also deprecate quoting the entire preceding
thread in each ply.  This was almost self-enforcing when bandwidth
and storage were expensive.  I have always followed that practice.

Perhaps LISTSERVs and Majordomos are obsolete and should be
replaced by blogs or wikis.

Painful?  What's painful?  With a good reader, scrolling to the bottom
is a single keystroke.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Friday: What you've been waiting for! Build an 80 column punched card reader!

2012-07-30 Thread Paul Gilmartin
On Sun, 29 Jul 2012 22:03:06 -0400, Shmuel Metz (Seymour J.) wrote:

Paul Gilmartin is almost right.  Both the reader and the punch
read and punched what they were presented with.

What is that supposed to mean? Bit 2 of the CCW opcode selected
whether to read/punch EBCDIC or column binary.
 
Was that uniformly true?  A colleague of mine who had been using a
CDC 6400 as a graduate student  took a job with IBM in NY.  He took
some useful information with him in CDC column binary format;
two CDC Display Code characters per column.  He set himself his
first IBM Assembler exercise reading the data and converting to
EBCDIC.

When he got there, he was dismayed to be told that the CDC
binary format could not be read on IBM equipment, at least
not without a (separately priced?) feature.  (Hardware?  Software?)
True?  Or just brush off of a newbie by an admin who didn't
want to make a configuration change to enable a feature?

No S/360 operating system used column binary for object decks. I don't
recall whether SOS, FMS and IBSYS used column binary or row binary on
the earlier 704, 709, 704x and 709x.
 
IIRC, data were generally column binary.  Some readers read row
binary with software matrix transposition.

Hard as it may be to do so, let's also try to avoid 'punch card',
using 'punched card' instead.

Why? It is a card that you can punch holes in, but it is not punched
when you initially take it out of the box.
 
Punchable card?

Is motor oil not motor oil until it's installed in a motor?
Is cat food not cat food until ...?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Unix file system - space release question

2012-07-30 Thread Paul Gilmartin
On Mon, 30 Jul 2012 15:31:13 +1000, NAIDOO, Raleigh wrote:

SSBoYXZlIGNvbmZpZ3VyZWQgc2Z0cCB0byBydW4gdW5kZXIgVVNTIG9uIG15IHovT1MgVjEuMTEg
c3lzdGVtLiBUaGUgcGh5c2ljYWwgSEZTIGZpbGUgc3lzdGVtIGFzc29jaWF0ZWQgd2l0aCBzZnRw
  
A.  C'mon!

Are you using the df -v command to investigate this further?

As long as any process holds a file open, its space is not released,
even after it's unlinked.  I would not expect sftp to misbehave in
this respect.  But do you have other processes, perhaps batch jobs,
that may be holding files open?  I believe there's a utility (fuser?
perhaps on the Tools and Toys page?) that shows open files.  But
I don't know whether it reports unlinked files.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Unix file system - space release question

2012-07-30 Thread Paul Gilmartin
On Mon, 30 Jul 2012 09:05:44 +0200, Miklos Szigetvari  wrote:

 Hi

I don't know if it is an sftp specific issue or not
We have here never used sftp, but we are using ZFS instead of HFS.
For me it would be interesting to know who is writing full the file system.
Maybe a TRAP on errno2 if it is not clear

On 30.07.2012 07:31, NAIDOO, Raleigh wrote:
 I have configured sftp to run under USS on my z/OS V1.11 system. The 
 physical HFS file system associated with sftp files seems to continuously 
 run out of space.  The data in this physical file system is transient in 
 that it is removed once it has been copied to the mainframe for inbound 
 files and sent on for outbound files. Therefore, we should not see any 
 cumulative growth in size of the physical file system but there is. I read 
 somewhere that there is a sync daemon which runs at specified intervals 
 which release unused space. How does work and what can I check to see if it 
 setup correctly? Any other suggestions on how to manage this fragmentation 
 like space creep.
 
Sync typically runs every few seconds.

http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/bpxza4c0/17.15

Title: z/OS V1R13.0 UNIX System Services User's Guide
Document Number: SA22-7801-14

describes 

17.15 Listing process IDs of processes with open files

It appears that fuser -cu might provide useful information.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Top posting

2012-07-30 Thread Paul Gilmartin
Synthesizing a compromise:

On Mon, 30 Jul 2012 10:42:02 -0500, Mark Zelden  wrote:

Sorry, I use the web interface and I still hate (is that too strong a word) 
top posting.
I naturally read from the top down and scrolling down, reading, then scrolling 
up,
while scrolling down again to read a post, then scrolling up again gets me 
dizzy.
 
I use NoScript to disable scripts as much as feasible, in a vain
attempt to send a message to web authors (who are making it
ever less feasible.)  So I don't see mouseovers.  Except I see
(some of) xkcd's mousovers.  How?

I enabled scripts for ua.edu.  Still no mouseovers.  Something
in Preferences?  (LISTSERV's or Firefox's?)

Wouldn't it be neat if LISTSERV provided a synopsis option, either
as an auxiliary text entry box, or by markup in the message body?
But this effect might be achieved by top-posting a synopsis, then
reverting to interspersed bottom-posting for the remainder of
the ply.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Authorized Rexx Assembler Function

2012-07-31 Thread Paul Gilmartin
Storage protection in other OSes:

On Mon, 30 Jul 2012 22:09:07 -0600, Steve Comstock wrote:

 Sigh.  I keep forgetting (wishful thinking?) what a primitive OS z/OS is;
 that it provides no simple way a program can protect its storage from
 meddling by others.  z/OS still thinks it's running on a s/360.

I never saw an answer from you regarding my question for some examples
of how other non-primitive OS's provide a simple way a program can
protect its storage from meddling by others
 
We're both familiar with UNIX, which classically runs each process in
a separate address space.  How much simpler or more effective
could it be?  Likewise z/VM.

z/OS UNIX (USS) has compromised that classic UNIX model for reasons
of performance, running multiple processes in shared address spaces.
But I suspect (with no evidence whatever) that Linux for z can run
a number of processes in private address spaces with better performance
than USS can run the same processes in shared address spaces.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Authorized Rexx Assembler Function

2012-07-31 Thread Paul Gilmartin
What about TSO?

On Jul 31, 2012, at 10:17, Steve Comstock wrote:
 
 We're both familiar with UNIX, which classically runs each process in
 a separate address space.  How much simpler or more effective
 could it be?  Likewise z/VM.
 
 Yes, well, each batch job runs in a separate address space, too.
 Isn't that the same approach?
 ...
 But for basic applications (batch and TSO, most CICS and IMS), the
 application programmer has his/her storage protected from meddling by
 other applications automatically by address space isolation.
  
Not really.  You're ignoring the convolutions TSO performs to
execute an authorized program such as IEBCOPY (well, prior
to 1.13).  Why can't TSO just launch IEBCOPY in a separate
address space where it would be perfectly safe?  Why are
programmers compelled to invent magic SVCs and back doors?
Why can't TSO CLISTs and EXECs run commands in background
as I can with POSIX shell , and let me use my terminal
in the meantime?

Submitting to a batch queue is a stopgap.  There's no simple
and standard way to get completion status from a program
submitted to a batch queue, or even to tell when it completes.
With POSIX shell, it's as simple as:

( command1; command2 ) 
PID=$!
# ... Do other stuff with terminal session
wait $PID
echo $?   # display status from command2

command1 and command2 are completely isolated from the terminal
session and, if _BPX_SHAREAS=NO, from each other.  In z/OS,
I can't even run an authorized program from an EXEC except with
severe constraints:

o It must be under TSO, not USS or IRXJCL

o It must be invoked with CALL, not ATTCHMVS or LINKMVS.

UNIX provides isolation for interactive commands similar
to that z/OS provides for batch jobs.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Rexx Exec Help Desperately Sought!

2012-08-01 Thread Paul Gilmartin
On Aug 1, 2012, at 06:42, Roger Bolan wrote:

 The XMITIP doc says that it will handle dsnames the same as TSO, that is,
 partially qualified names get your prefix added, and fully qualified
 dsnames must be inside single quotes.
 
 I think you are just running into the way TSO parses the quotes.   You may
 need to make sure the quotes get passed into XMITIP by doubling them.  For
 example:
 EX 'SYS2.LOCAL.CLIST(XMITIP)' '''TM#T.M.XMITIP.PARMCARD.userid1'''
  
You might benefit by putting SYS2.LOCAL.CLIST in your SYSPROC
concatenation (or using ALTLIB) (SYSEXEC if XMITIP is Rexx).
Then write your script in Rexx instead of CLIST.  Rexx allows
both double and single quotes, so the command becomes:

'XMITIP' 'TM#T.M.XMITIP.PARMCARD.userid1'

... perhaps more legible.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Rexx Exec Help Desperately Sought!

2012-08-01 Thread Paul Gilmartin
On Aug 1, 2012, at 12:07, Lizette Koehler wrote:
 
 The User's Guide for XMITIP is fairly comprehensive on how to run this in 
 batch.  The JCL and samples are good.
 
 What if the exec is being run from a batch program, what do I need to
 change? Rexx Exec ID2EMAIL calls via an EX the XMITIP Rexx Exec.
 
 //STEP0030 EXEC PGM=IKJEFT1B,DYNAMNBR=50

Some rules are different if you use IRXJCL instead of IKJEFT%%

 //SYSEXEC  DD DISP=SHR,DSN=SYS2.LOCAL.CLIST
 // DD DISP=SHR,DSN=SYS2.LOCAL.REXX

If either of those data sets contains CLISTs as opposed to
Rexx, it must be in SYSPROC, not SYSEXEC.  If a Rexx EXEC
starts with /* Rexx ... */, it may be in either SYSPROC or
SYSEXEC.  HT ('05'x) characters are treated as whitespace
in SYSPROC, but invalid in SYSEXEC (empirical; not documented).

 //STEPLIB  DD DISP=SHR,DSN=SYS2.LOCAL.LINKLIB
 //SYSPRINT DD SYSOUT=*
 //SYSTSPRT DD SYSOUT=*
 //REPORT   DD DSN=TEMP1,
 //DISP=(OLD,DELETE,DELETE),

Hmmm...  You delete it even if the step ABENDS.  No do-overs.
I never code DELETE on a temporary DSN since I once had a
Bad Experience when I overrode to a member of a library PDS.
They go away by themselves when they're supposed to.

 //RECFM=VBA,
 //LRECL=137,
 //UNIT=SYSDA
 //SYSTSIN  DD *
 ID2EMAIL GRODRIG

If XMITP is Rexx, and ID2EMAIL is Rexx and you own it, you
can use a Rexx CALL instruction and bypass the ugly TSO/CLIST
EX syntax entirely.  I would.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Why ain't there no XILL?

2012-08-02 Thread Paul Gilmartin
Serialization, performance, auxiliary storage and
a related hardware realization:

On Aug 2, 2012, at 07:46, Wayne Driscoll wrote:

 I would assume the pother is because OIL and NIL are macros that provide 
 or and and processing with serialization.  Your notation fails to provide 
 serialization. It should be relatively easy to create an XIL macro based 
 on OIL or NIL however.
  
I was about to write that, then I RTFM.  The P[ro]Ops describes
NILL and OILL as quite different from NIL and OIL.  A cursory
reading does not show whether they are atomic for serialization
in a MP environment.

 From:   John Gilmore jwgli...@gmail.com
 Date:   08/02/2012 07:12 AM
 
 Any standard logic text establishes that
 
 o AND, inclusive OR, and NOT are together universal,
 
 o NOR alone is universal, and
 
 o NAND alone is universal.
 
 Thus, in an obvious notation,
 
 XOR(a,b) =df (a | b)  (¬(a  b))
 
 What is all the pother about?
  
That such a scheme requires auxiliary storage.

That it is slower than a likely hardware implementation.

That it may further require locking in a MP environment.

Back in the Day of TTL SSI/MSI logic components, I looked
at the spec sheets of two chips.  The specs included low
level circuit diagrams.

One vendor called its component MSI and used roughly the
formula you give.

The other called its component SSI (fewer transistors) and
accomplished the function by connecting a to the emitter
of one transistor and b to its base, giving (a  ¬b).
b was connected to the emitter and a to the base of
a second transistor, giving (b  ¬a).  The collectors were
connected in parallel for (a  ¬b) | (b  ¬a), give or take
a totem-pole output stage and a liberal seasoning with
De Morgan's laws.

A very clever and efficient disuse of what any standard
logic text establishes.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Using NOTE and POINT simulation macros on CMS?

2012-08-02 Thread Paul Gilmartin
OS simulation is dreadfully deficient.

On 2012-08-02 15:00, Thomas David Rivers wrote:
 
 Then, a POINT to return to the beginning of the file,
 using the TTR retrieved from just after the OPEN
 (with +1 added because the NOTE occurs after OPEN
 but before any READ.)
  
I believe that NOTE is specified to work only after a
READ has been issued (but I haven't RTFM lately), and
all outstanding READs have been CHECKed.

 And, as you might expect - this approach works just
 great on z/OS.
  
Eons ago it used not to work for me.

 Does anyone know of any vagaries with the OS simulation
 of NOTE/POINT?
  
OS simulation was implemented only to the extent necessary
to support (some of) the supported utilities.  For example,
PDS member statistics (the user info area) were deemed
unnecessary and not implemented.  ISPF/VM goes to outrageous
gyrations with side-files to simulate them.

Long ago, a co-worker said VM would do well to abandon CMS
and support MVT proper in a VM.  But he's an acknowledged
OS partisan.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Using NOTE and POINT simulation macros on CMS?

2012-08-02 Thread Paul Gilmartin
The Strategic Interactive Platform:

On Thu, 2 Aug 2012 19:44:25 -0400, Anne  Lynn Wheeler wrote:
...
later when company declared CMS strategic interactive platform (and
abondoned TSO for that purpose) ... there was quite a bit of efforts
getting CMS running on MVS. it was operational but because of all sorts
of structural issues in MVS ... it would never achieve human factors and
interactive characteristics.

Somehow this brings to mind Unix System Services (USS).

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Auditors Don't Know Squat!

2012-08-03 Thread Paul Gilmartin
What does the vendor recommend?

On Thu, 2 Aug 2012 14:11:03 -0500, zOSdude wrote:

Our auditors (Feds) say we need to apply all new PTF's within 30 days of 
availability. I'm speechless. Does anyone have the patience to form a cogent 
argument without laughing, crying, or tying one on?

I told my boss that if I did that, we'd be about as stable as a windows PC.  
 
Does IBM recommend that customers age PTFs before APPLYing?  For
how long?  What would be the effect if no customer applied any PTF
until (e.g.) 60 days after availability in order that bugs would be
discovered by other customers?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Using NOTE and POINT simulation macros on CMS?

2012-08-03 Thread Paul Gilmartin
On Fri, 3 Aug 2012 06:42:54 -0400, Shmuel Metz (Seymour J.) wrote:

Are you referring to the OS rules or to the OS simulation in CMS? NOTE
has always been valid in OS after a checked write.
 
I stand corrected.  READ or WRITE.  But IIRC, the OP said he did NOTE
before either I/O operation.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



Re: Auditors Don't Know Squat!

2012-08-06 Thread Paul Gilmartin
On Mon, 6 Aug 2012 18:09:05 -0400, Shmuel Metz (Seymour J.) wrote:

   at 01:41 PM, Paul Gilmartin said:

Sounds like a standard to me.

Not even close. A finding is a statement that they found something
they didn't like. A standard is a published policy, not something the
auditor makes up.

My conjecture is that in the Federal instance the auditor was
also guided by a standard, not inventing one; at worst taking it
out of context.

Were that the case then the findings would have identified the
relevant standards.

Granted that in prior plies the writers may have, in informal and indirect
quotations, neglected to say the auditors identified the relevant standards,
that is quite different from saying the auditors omitted identification of the
standards.  You have no evidence for what you're implying.

-- gil

“I didn't say that I didn't say it. I said that I didn't say that I said it.
I want to make that very clear.” 

-- George Romney

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Using NOTE and POINT simulation macros on CMS?

2012-08-07 Thread Paul Gilmartin
On 2012-08-07 11:11, Bill Fairchild wrote:
  
 So presumably when the control records were created, CA software did a NOTE 
 of the TTR of the beginning of each volser range and saved the results of the 
 NOTE in the control record.  This saved NOTE value was the base to which the 
 offset, calculated from the user's input, was added.
  
Ah!  Something that can't be converted to PDSE.  Well, maybe you
could if you kept it open all the time.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Using NOTE and POINT simulation macros on CMS?

2012-08-07 Thread Paul Gilmartin
On 2012-08-07 19:10, Robert A. Rosenberg wrote:
 At 22:24 -0500 on 08/06/2012, Dale R. Smith wrote about Re: Using NOTE and 
 POINT simulation macros on CMS?:
 
 So it sounds like the NOTE Macro will only work after a Read or a Write has 
 been done to the dastaset, not after an OPEN Macro.
 
 If the system knows where the first record in the file is so that the first 
 READ done after the OPEN will read it, it seems to me that a NOTE done prior 
 to that READ but just after the OPEN should return the location of that first 
 record.
 
Errr... no.  After the first READ, it returns the location of the
first record.  Before the first read, for consistency, it would need
to return the location of something before the first record.  There
is no such thing.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Using NOTE and POINT simulation macros on CMS?

2012-08-08 Thread Paul Gilmartin
On Aug 8, 2012, at 01:04, Alan Altmark wrote:
 
 First pointer:  We welcome your CMS questions over on IBMVM!  ;-)
 
 Sorry I haven't been watching IBM-MAIN as closely as I should, but the TTR 
 isn't.  It's the CMS file system record number of the record that was just 
 read (shifted left 8 bits) i.e. rr00.  At OPEN, no records have been 
 read, so the record number is zero.  You NOTEd the zero value and added 1.   
 Then you POINTed to 0x01, but that low-order byte isn't used, so you are 
 effectively pointing to record zero. ... 
  
IIRC, there's an OS convention that setting the lowest byte
(Z) of the TTRZ to '01'x causes reading of the block following
thenone POINTed to by the TTR.  Does CMS respect this?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Space Allocation In Bytes

2012-08-08 Thread Paul Gilmartin
On Aug 8, 2012, at 06:06, R.S. wrote:
 
  BTW: your allocation request was
 illogical - you wanted to have 80-byte records and requested 1 byte.
 Such request has to be re-interpreted or canceled. ;-)
  
I believe the block specification is an average.  As such, it's
not required to be a multiple of LRECL.  If half the blocks are
80 bytes and half are 160, an average of 120 is possible.
Granted, 1 can never occur, not even as an average.  I suppose
allocation simply calculates the tracks necessary to hold the
requested number of 1-byte blocks plus gaps.  It might be a
courtesy for allocation to issue a warning, but how much
validity checking should it be expected to perform?

What about RECFM=VB?  What's the smallest valid block?  9?
8?  4?  (That would be a BDW with no records.)  Does Using
Data Sets allow this?  I bet I could write one with BSAM;
I wonder how QSAM would handle reading it?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Space Allocation In Bytes

2012-08-08 Thread Paul Gilmartin
On Aug 8, 2012, at 09:11, Mike Schwab wrote:

 A zero byte VB record is expanded to 1 blank x'40' so the minimum is a
 block of 9 bytes including block size and record size field.
 
???  No.


http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/dgt2d490/3.1.3.1.2

Title: z/OS V1R12 DFSMS Using Data Sets
Document Number: SC26-7410-10

3.1.3.1.2 Record Descriptor Word (RDW)

A variable-length logical record consists of a record descriptor
word (RDW) followed by the data. The record descriptor word is a
4 byte field describing the record. The first 2 bytes contain
the length (LL) of the logical record (including the 4 byte
RDW). The length can be from 4 to 32 760. All bits of the third
and fourth bytes must be 0, because other values are used for
spanned records.

A length of 4 implies zero bytes of data; no blank.  It's
easy to create such records with EXECIO, FTP, or vi.

I do not find a stated minimum for the BDW.  Absent firm
information, I'll assume 4-byte blocks (nothing but BDW)
are permissible.

 I tried to allocate a FB 6 0 to hold a list of volsers for a table,
 LRL under 10 would not work.
  
I had no such problem:

  Data Set Information  
More: + 
 Data Set Name . . . . : user.SHORT.BLOCKS  

 General Data   Current Allocation  
  Management class . . : **None**Allocated blocks  . : 86   
  Storage class  . . . : **None**Allocated extents . : 1
   Volume serial . . . : TSO005 
   Device type . . . . : 3390   
  Data class . . . . . : **None**   
   Organization  . . . : PS Current Utilization 
   Record format . . . : F   Used blocks . . . . : 3
   Record length . . . : 6   Used extents  . . . : 1
   Block size  . . . . : 6  
 Command ===   
  F1=HelpF3=Exit   F12=Cancel   
 .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .
   File  Edit  Edit_Settings  Menu  Utilities  Compilers  Test  Help
 ———
 VIEW   user.SHORT.BLOCKS   Columns 1 6 
 ** * Top of Data **
 =PROF BLOCKS (FIXED - 6)RECOVERY OFF WARNNUMBER OFF...
 01 these   
 02 are 
 03 recrds  
 **  Bottom of Data 

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Using NOTE and POINT simulation macros on CMS?

2012-08-08 Thread Paul Gilmartin
On Wed, 8 Aug 2012 09:18:35 -0400, Shmuel Metz (Seymour J.) 
shmuel+...@patriot.net wrote:

To increment the record number by one, add 256 to the TTR.

ITYM add 256 to the TTRz.

Does this work when you cross a track boundary?  I might expect it to
work less well for TTRz than for relative block number.

And, in Using Data Sets:
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/dgt2d490/3.8.7.8

3.8.7.8 Using the POINT Macro to Position to a Block

... If the current record spans blocks, setting the z byte of the TTRz 
field to one lets
you access the next record (not the next segment). 

Does this mean that if the current record spans several blocks, setting the
z byte causes enough intervening blocks containing enough segments to be
skipped that the block read contains the first segment of the next record?
Wow!

Does this apply to RECFM=VBS only?  Does CMS support setting the z byte?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Using NOTE and POINT simulation macros on CMS?

2012-08-09 Thread Paul Gilmartin
On Aug 8, 2012, at 18:51, Shmuel Metz (Seymour J.) wrote:
 
 Does this mean that if the current record spans several blocks,
 setting the z byte causes enough intervening blocks containing
 enough segments to be skipped that the block read contains the first
 segment of the next record?
 
 No; TTR1 will access the next physical record. BSAM doesn't deal with
 the RDW.
  
In:

http://publibz.boulder.ibm.com/cgi-bin/bookmgr/BOOKS/DGT2D4A0/3.8.7.8

(which I trimmed too much and, now that I read the outline
hierarchy, refers to PDSEs), I read:

3.8.7 Processing a Member of a PDSE 
3.8.7.8 Using the POINT Macro to Position to a Block

   The POINT macro positions to the first segment of a spanned
   record even if the NOTE was done on another segment. If the
   current record spans blocks, setting the z byte of the TTRz
   field to one lets you access the next record (not the next
   segment).

So I conclude that if the current block (itself a slippery
concept with PDSEs) contains only an interior segment of a
spanned record, POINT to a TTRz will cause the following READ
to read the block containing the first segment of that [logical]
record, and POINT to a TTR1 will cause the following READ
to read the block containing the first segment of the next
[logical] record.  It's still pretty amazing.

THis could be a point of incompatibility between PDSE and PDS.

Who keeps spanned records in a PDSE or PDS, anyway?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: GUIfication of tn3270 screens

2012-08-10 Thread Paul Gilmartin
On Fri, 10 Aug 2012 13:36:42 -0400, Frank Chu wrote:

It's for an application that has already been written by us.  The app is
an assembler debugger and we want to add the ability/option of
displaying it's contents on the PC with something other than in a 3270
emulator. There's not a lot of real estate in a 3270 screen and
there are limitations on how we display things.  This is becoming more
of an issue as we move beyond just debugging HLASM programs.
 
It sounds as if you need something beyond the capabilities of 3270
data streams.

With regards to the multiple tabs/windows.  The general idea behind the
GUI on the PC would be that in a single debugging session, you can have
a window open for displaying the code as you are stepping through it.
Another window to display register contents, another one for variables,
another one for displaying storage that your program will modify,
another window for HELP, etc.   If you have used Eclipse or Visual
Studio, it's similar to something like that.
 
How about X11, then?  Servers available at attractive prices for almost
any platform you care to name.

HOD?  On what platforms are people running HOD?  If it's a Java
applet, it should be quite portable.  Is it a priced product?

Is anyone out there attaching multiple 327xs to a TSO session?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Listserv Web Archive Text Box

2012-08-10 Thread Paul Gilmartin
Well, the web archive is temporarily working, so not that.

Rather, is there any way to make the text entry box for
Post/Reply narrower.  I don't operate my browser fullsreen;
I need other things on the screen.  But when I operate the
browser in a restricted window, some of the controls such
as scroll, quote, and submit are hidden; out-of-window by
default.  It's as if the page formats the text box according
to the width of the screen, ignoring that the window may be
narrower.

Thanks,
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: modifying secondary space allocation

2012-08-13 Thread Paul Gilmartin
On Aug 13, 2012, at 06:26, Kerneels wrote:

 Only works , if there is are no active job with an ENQUE on the dataset ex. 
 Parmlib.
  
Silly question?  How about DISP=SHR?  If you can create a
data set without exclusive ENQ (it has happened to me),
why not extend one?

 On 8/13/2012 4:21 AM, Binyamin Dissen wrote:
 
 Use JCL (IEBGENER is fine) - anything that OPENs it for OUTPUT) with DISP=MOD
 and secondary space allocation with a new member name. The works with
 sequential, probably with PDS as well.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: X86 server

2012-08-13 Thread Paul Gilmartin
On Mon, 13 Aug 2012 14:16:14 +0200, Henri Kuiper wrote:

Or are you hinting at running z/OS from x86 hardware?

If the latter is the case : feel free to contact me. You can take a sneak
peak at http://zdevops.com
We do z/OS virtualizations on x86 hardware :).
 
Would this be more like Platform Solutions Inc., or like Hercules, or
like Neon ZPrime?

Or more like Wine or Citrix?  Perhaps it virtualizes only the APIs, but
that itself is a heroic task.

What compilers and other middleware such as data base servers
are available for license?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Valid DATACLAS names - where documented?

2012-08-13 Thread Paul Gilmartin
On Mon, 13 Aug 2012 15:30:01 -0400, Gross, Randall [GCG-PFS] wrote:

 Subparameter Definition
 ---
 data-class-name
 Specifies the name of a data class to be used for allocating the
 data set.

 The name, one to eight characters, is defined by the storage
 administrator at your installation. 
 
That's not very helpful; actually somewhat circular; if you _are_
the storage administrator.  So maybe it's in the ICAG/Tuna?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


DNS lookup failures (was: ESCON)

2012-08-13 Thread Paul Gilmartin
DNS squatting and recycling

On Mon, 13 Aug 2012 20:10:19 -0400, Tony Harminc wrote:

SSA was an industry standard for a few milliseconds in 1997. It's
sad/amusing to scan the Wayback Machine for the quondam SSA Industry
Association site www.ssaia.org . From 1997 to early 1998, it's there,
along with an impressive list of industry members, from Adaptec
through DEC (heh), Dell, IBM, and Zitel, with more in between. Then
it's stagnant through 2000, domain available in 2001, and then
Cindy and various others would like you to explore their charms
after that.
 
Doesn't Cindy obtain statistics on failed DNS lookups so she can
optimize the ROI on the resource she spends registering domain
names.  I know OpenDNS, e.g., squats on failed lookups (typos?)
and redirects to ads (this is a nightmare for auto-proxy).  Does
OpenDNS also sell its list to Cindy?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: How to update the last referenced date in the VTOC

2012-08-14 Thread Paul Gilmartin
On Tue, 14 Aug 2012 16:24:31 -0500, Tim Hare wrote:

Don't know how super-efficient it is, but use DCOLLECT input (or FDREPORT 
extract if you have FDREPORT), then in Rexx under IKJEFT01

Read a record
set dataset_name_variable to the DSN
If you're worried about uncataloged also set unit and volume variable

ALLOC FI(X) DA(dataset_name_variable) SHR REUSE  == add UNIT and VOLUME 
if necessary
EXECIO 0 DISKR X (OPEN
EXECIO 0 DISKW X (FINIS

in a loop until end of file on the input.  You can of course use program logic 
to just filter the volumes and/or datasets you want.

I'd be afraid to do this, lest it write an end-of-file at the beginning of
every data set.  In fact, I've done approximately that (two DISKWs
instead of DISKR; DISKW) intentionally to empty data sets.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Panel and LPAR name

2012-08-15 Thread Paul Gilmartin
On Wed, 15 Aug 2012 17:15:21 -0700, Skip Robinson wrote:

I didn't know you allocate ISPPROF to DUMMY in batch. I've always used a
temporary data set to achieve the same goals.

//ISPPROF  DD  SPACE=(TRK,(1,1,2)),UNIT=SYSALLDA,DCB=SYS1.PROCLIB
 
I stand corrected; I just reviewed my own code.  It's:

//ISPPROFDD  UNIT=VIO,SPACE=(TRK,(10,0,5)),DSN=amp;ISPPROF,

I suppose there are different flavors of nothing, and some nothings
are too nothing for ISPF.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Auditors Don't Know Squat!

2012-08-17 Thread Paul Gilmartin
On Fri, 17 Aug 2012 16:40:28 +, Ward, Mike S wrote:

Way back when, we used to call a memory leak something else on the mainframe. 
I have used memory leak for so long I forgot what that term was. Oh well.
 
Back in that day, IBM never said memory, but always storage.
Language evolves; we must evolve with it.  Try going into your
local auto parts store and asking to buy an oleo strut.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Panel and LPAR name

2012-08-20 Thread Paul Gilmartin
On Mon, 20 Aug 2012 02:01:57 +0100, CM Poncelet wrote:

Gosh.

The ISPPLIB DD must be allocated in the JCL.

No; a dynamic allocation before ISPSTART will work just as well.
 
There are contrary valid points of view here:

o Not to require the programmer to provide resources he doesn't
  intend to use.

o To require the programmer to supply in advance all resources
  he might potentially use, in order to preclude a failure later in
  the process.

ISPF apparently elects the latter; many programs elect the former
e.g. with respect to SYSLIB DD.  Fortunately, ISPF doesn't require
that a display be available when the programmer intends not to
use one.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Some fun with IBM acronyms and jargon (was Re: Auditors Don't Know Squat!)

2012-08-20 Thread Paul Gilmartin
On Aug 20, 2012, at 10:04, zMan wrote:

 On Mon, Aug 20, 2012 at 8:35 AM, Rupert Reynolds wrote:
 
 Does anyone have a copy of the old JARGON FILE that buzzed around the IBM
 VM network in the '90s when i was working in Portsmouth North Harbour? I'd
 love to see it again. I think it included discussion of Bubblegum vs.
 Boeblingen.
 
 
 If only there was a way to search the Web for things like this...
  
GIYF.

http://www.google.com/url?sa=trct=jq=esrc=ssource=webcd=7sqi=2ved=0CFkQFjAGurl=http%3A%2F%2Fwww.comlay.net%2Fibmjarg.pdfei=KmEyUJGPHoLe9AS7soCQDAusg=AFQjCNHc7BKJApfJHJnvV2jzCZ6joGl1Ogcad=rja

(Wrap likely. Might unwrap as):

http://www.comlay.net/ibmjarg.pdf

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: GOFF

2012-08-21 Thread Paul Gilmartin
A zero-PDS system?

On Tue, 21 Aug 2012 18:54:00 -0300, Clark Morris wrote:

Can PDSE be in the linklist or lpalist?  If not, this is like IBM not
having a way for SNA channel attached 3270s as console devices because
VTAM was set up as a started task.  If PDSE is a basic access method,
somehow having it as a started task seems weird to me.  Is PDSE a
reliable access method now with no greater error rate than PDS?
 
In contrast, in a Galaxy Far, Far Away, I was amazed to see OpenSolaris
boot from ZFS (very different from zFS; GIYF).  I mentioned this to a
Solaris developer who said, Oh, sure; it just takes about a quarter
megabyte support code in the boot record.  If IBM had a similar
level of commitment to PDSE it would be possible to IPL a system
with _no_ PDS; only PDSE (or even only zFS (that one)).

But it all depends on proper layering; it would require that very
early in Nucleus Initialization components begin using access
methods, not STARTIO nor RYO channel programs.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Panel and LPAR name

2012-08-21 Thread Paul Gilmartin
On Wed, 22 Aug 2012 04:57:25 +0100, CM Poncelet wrote:

IBM have recognized that 99% of users are computer illiterate, but have
99% of the money. So they are following Microsoft's 'lead' and,
step-by-step, implementing Windoze for mainframes.

And this, were it to happen, would be entirely a Bad Thing because ...?

I love Google's query completion.  As soon as I've typed 3 characters in
the text box, it presents me with a dropdown menu of a handful of
plausible completions (all wrong).  A few more keystrokes and it shows
me the one I want, among others, not only on Windows, but likewise on
OS X and Linux.  This is not a bad thing.  And it would be a good thing
(disputed only by laudator temporis acti ©) if ISPF were to do similarly
on every panel which allows a data set name to be typed.  I suspect
Dave S. can explain to us why this is unlikely to happen soon if ever.

And spelling correction.  I like the way Google presents me an option;
I detest the way Firefox makes the correction, willy-nilly.  It could be
done well.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Panel and LPAR name

2012-08-22 Thread Paul Gilmartin
ISPF _is_ Windows for z/OS.

On Wed, 22 Aug 2012 08:22:17 +0100, CM Poncelet wrote:

... because it is moving back towards suppressing intelligence (as Mao
Tse Tung did in China, in the 1960s). We should not all be obliged to
look at pictures just because the majority of people cannot read.
 
But isn't ISPF itself a large step moving TSO in the direction of what
Windows later became?  And is it not suppressing intelligence to
relieve users of the burden of learning the syntax of TSO line commands?
You may continue to use the OUTPUT command if that's your preference.
I'll use SDSF.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Panel and LPAR name

2012-08-22 Thread Paul Gilmartin
Can I throw away my keyboard and use only my mouse?

On Wed, 22 Aug 2012 11:02:36 -0400, Dave Salt wrote:

Paul Gilmartin wrote:
I love Google's query completion. And it would be a good thing
if ISPF were to do similarly on every panel which allows a data set name to 
be typed.  I suspect
Dave S. can explain to us why this is unlikely to happen soon if ever.

ISPF already supports auto-completion of data set names (kinda sorta), but 
it's extremely clunky.
Better and easier to use SimpList and not have to type anything at all.
Dave Salt
 
Sometimes it might be less tedious to type than to use point-and-shoot
(is that what you mean?) to drill down through a hierarchy of data set
names.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: X86 server

2012-08-22 Thread Paul Gilmartin
Which costs less?

On Wed, 22 Aug 2012 13:40:01 -0700, Edward Jaffe wrote:

On 8/13/2012 10:01 PM, Jake anderson wrote:
 Does IBM provides support running Z/OS on X86 ?

Yes, with its RDT offering:
http://www.ibm.com/software/rational/products/devtest/systemz/
 
What's IBM's economic rationale here?  If it's cheaper for them to
make z/OS available on X86, then much that I read in this forum
about the economic advantages of zSeries is untrue, and IBM's
motive for not licensing z/OS for X86 is simply to compel customers
to buy the more expensive hardware from IBM.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: JES/2 Spool

2012-08-23 Thread Paul Gilmartin
On Thu, 23 Aug 2012 08:23:57 -0700, Lizette Koehler wrote:

Several options
 ...
You could write a rexx and use SDSF REXX to get it
  
There's much sample code in:

Title: z/OS V1R12.0 SDSF Operation and Customization
Document Number: SA22-7670-14

http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/isf4csa0/13.14

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: static const arrays in C

2012-08-24 Thread Paul Gilmartin
What the ANSI standard says.

On Fri, 24 Aug 2012 12:37:05 +0200, Bernd Oppolzer wrote:

we have some modules written in C that have large arrays with constants.
For some reasons we are forced to compile those modules using the RENT
compiler option, which moves those arrays to the WSA (writable storage
area)
at runtime, which is not a desired behaviour, because this way, the
storage is
occupied twice - once �n the WSA and second in the initialization area
in the
STATIC CSECT - and there is coding needed at startup to move the constants
into the WSA.

We are not able to move to NORENT due to site conventions.

Now my question: is it sufficient to mark those arrays with the const
attribute,
that is

static const double tab [10] = { ... values follow ...  };

or are there special #pragmas needed to prevent this table from being
moved to the WSA, given the RENT compiler option?
 
Years ago, I investigated such behavior with an ISV compiler, not
IBM's.  In that case, yes, if an object was declared const it was not
moved to writable storage area.  I looked further at the ANSI
standard which says, IIRC, that if an object is declared const in
one translation unit and declared not const in another translation
unit (of course you would _never_ do that), and the latter modifies
the object, the result is undefined.  It stated no restriction if the
object is never modified.  I concluded that the ISV compiler might
be stretching the standard by allowing the two translation units to
refer to different instances of the object.  I didn't press the point.

But an object declared static shouldn't be accessible by name
from more than one translation unit.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: static const arrays in C

2012-08-24 Thread Paul Gilmartin
Make initializers page-aligned?

On Fri, 24 Aug 2012 14:41:16 +0200, Bernd Oppolzer wrote:

Using the compiler option ROCONST (which is NOT the default with C
programs),

... to avoid treading, however lightly, on the ANSI standard.

you can specify that variables with the const attribute not be moved to
the WSA - that
is, the const attribute is respected. Otherwise (NOROCONST) it is ignored.
This is the default with C (not with C++).
 
I suspect const is not entirely ignored.  Won't the compiler warn you
if you modify, or even threaten to modify, a const object?  But is it
moved to WSA even if it's declared static const?  There would seem
to be no reason for that.

Another way is using #pragma variable (variable_name, norent) for every
such large
read-only table, which has the same effect.

Any further suggestions?
 
No, but it occurs to me that a #pragma to page-align the initial
values so the storage could be reclaimed once initialization is
complete might be valuable.  This might even be reasonable
default behavior.  Even better if numerous small initializers
could be gather-loaded into a disposable page.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: static const arrays in C

2012-08-24 Thread Paul Gilmartin
On Fri, 24 Aug 2012 10:13:21 -0400, Thomas David Rivers wrote:

As Gil mentioned - this is only really true for static data... extern data 
can't be trusted
because the user might have put the 'const' keyword in one declaration, and 
left it off in
another... which would mean that the extern reference might be a RENT one, 
while, say,
the definition was non-RENT.
 
ANSI seems to allow this as long as no translation unit modifies
the data.  Otherwise the effect is undefined.  So a conforming
implementation is free to put the object in write-protected
storage.  S0C4 fits within the notion of undefined.

In your situation - where you are declaring a large array of doubles - putting 
the data
in non-RENT memory can be a big win.

non-RENT?  ITYM RENT so it doesn't get copied.

This is only supported by the assumption that if the programmer says const - 
he really
means it... that's the point of the ROCONST option in the IBM compiler.   So, 
you can say
oh - I guess the programmer didn't _really_ mean it.
 
I would hate to have to support such misbehavior.  But, I suppose,
The customer is always right.

This is reminiscent of the OS's not loading modules marked REFR
into write-protected storage because so many programmers
didn't _really_ mean it  I think that's been fixed.  Installation
option?  REFRPROT comes to mind.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: X86 server

2012-08-24 Thread Paul Gilmartin
On Thu, 23 Aug 2012 22:13:49 -0400, Anne  Lynn Wheeler wrote:

 ...
max configured z196 with 80 processors is rated for 50BIPS and goes for
$28M (about $560,000/BIPS) ...
 
ibm has base price of $1815 for e5-2600 blade ... which have ratings at
527BIPS (about $3.44/BIPS), ...

A factor of 160,000.  The mind boggles.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Space Allocation In Bytes

2012-08-25 Thread Paul Gilmartin
On Wed, 8 Aug 2012 14:06:04 +0200, R.S. wrote:
 
  BTW: your allocation request was
 illogical - you wanted to have 80-byte records and requested 1 byte.
 Such request has to be re-interpreted or canceled. ;-)
  
As in:

DD  LRECL=80,SPACE=(1,...),...

Seveal contributors argued that there was no way a 1-byte block
could be written if LRECL=80, and the construct should result in
an error.

The JCL RM says:

 
blklgth -- (only if AVGREC is not coded)
Specifies the average block length of the data, in bytes.
The blklgth is a decimal number from 0 through 65535. 

Really!?  In fact by experiment, in JCL:

DD SPACE=(0,1),...

and in TSO

ALLOCATE AVBLOCK(0) ...

are both accepted without complaint.  I suppose allocation adds a
count and an IBG; divides track size by that; takes the ceiling and
requests the resulting number of tracks (almost certainly 1).  I have
little problem with that.  I haven't investigated whether SPACE=(0,9)
allocates fewer tracks than SPACE=(1,9).  It's possible that integer
arithmetic or 32-byte chunking gives the same result for both.

Perhaps I'll start coding SPACE=(0,1) in JCL to allocate minimal
data sets, just to startle readers.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Space Allocation In Bytes

2012-08-25 Thread Paul Gilmartin
On Sat, 25 Aug 2012 08:49:49 -0700, Skip Robinson wrote:

Zero space allocation is perfectly valid. As is SPACE (0,1) also. The
result is just as requested. In either case, the data set exists in the
VTOC but takes up no space on disk. 

Ummm... no.  By experiment, it allocates one track.  There has to
be room for the count field.  And SPACE=(65535,1) allocates
two tracks.  This surprises me.  Does 3390 support blocks spanning
tracks?

Also surprisingly, SPACE=(0,9) allocates 8,334 tracks;
SPACE=(1,9) allocates 1,163 tracks.  Did I do something
wrong?  Did someone divide by zero?

The data set is treated as 'real',
including GRS enqueue. Hence it can be used like any other exclusively
held data set to serialize execution.

The data set's being 'real' has little to do with GRS enque.  I can code:

//GRS  EXEC  PGM=WOMBAT,COND=(0,LE)
//SERIALDD   DISP=OLD,DSN=NONE.SUCH

The data set needn't exist; the step isn't executed; yet I believe
an exclusive ENQ is issued for its name which could be used to
serialize execution.

From:   Paul Gilmartin
Date:   08/25/2012 08:27 AM

The JCL RM says:

blklgth -- (only if AVGREC is not coded)
Specifies the average block length of the data, in bytes.
The blklgth is a decimal number from 0 through 65535.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Was: X86 server - Competitive economic advantage of System z plus z/OS compared with x86 plus (Linux or windoze)

2012-08-26 Thread Paul Gilmartin
On Sun, 26 Aug 2012 13:06:13 +0200, Arthur Fichtl wrote:

OTOH, if you look at the global big new companies (e.g. Google, Amazon,
Facebook), nobody of them is running MF systems because these companies
are not captivated by legacy systems.

Instead, Google (as known to the public) is running a cluster version of
Linux based on commodity machines, Amazon is a pioneer in cloud
computing (see:
 http://www.datacenterknowledge.com/archives/2012/08/15/amazon-direct-connect-comes-to-new-york/
  )

Which mostly shows a photograph of an empty computer room.
They could put anything in there.

, and Facebook’s architecture is described here:
 http://www.datacenterknowledge.com/archives/2012/06/27/facebook-server-storage-designs/
 
What's impressive here is that they don't buy off-the-shelf hardware
systems; they design their own.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: X86 server

2012-08-27 Thread Paul Gilmartin
Batch on other systems:

(can Darren or someone please report to L-SOFT problems
replying via the web interface to plies such as Rex's
that have:
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset=utf-8
They can be read clearly.  When replying, quoted text
appears as unrendered base64.

I'd do it myself, but IIRC, L-Soft requires customer ID.
Thanks.)

On Aug 27, 2012, at 07:18, Pommier, Rex R. wrote:
 
  ...  Unless you specifically background a task, when you run a script it 
 ties up your terminal session, whether it be for a transaction or a task that 
 updates millions of rows in a database. ...
  
But the *NIXen let the programmer background a process
with a single keystroke and later to wait for its completion
and sense its exit status; something extraordinarily (PoV)
difficult in TSO.

command-name   #  indicates background
PID=$!  # Save process-ID; repeat if desired
... # do whatever you want in meantime
wait $PID   # Wait for completion
echo command-name completed with status $?

What would be necessary to do this with CLIST or Rexx
with e.g. IEFBR14 as command-name?  Please enumerate any
additional files (JCL) or nonstandard (ISV, CBBTAPE)
commands that would be needed.

And the command language for *NIX batch is identical to
the foreground scripting language; newcomers may devote
that part of their learning resouce to more productive
areas.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: execs or scripts

2012-08-27 Thread Paul Gilmartin
On Mon, 27 Aug 2012 11:33:01 +, Bob Shannon wrote:

CLIST stands for Command List i.e., a means to string a series of TSO 
commands together. It was rudimentary. Although some improvements have been 
added since its inception, it's no Rexx.
 
Both CLIST and CMS EXEC, but not EXEC 2 nor Rexx are so closely
coupled to the terminal input routine that they are the only true
script facilities, scarcely deserving of independent recognition as
languages.  This results in the sometimes useful behavior that
the programmer can invoke a utility (often EDIT, but not PDF
nor XEDIT) and continue with inline subcommands to that  utility.
This is qualitatively different from *NIX here-documents or JCL
SYSIN in that the status from each subcommand is available for
testing in the parent script.

(Can one execute a CLIST loop from the terminal rather than
from a CLIST file?)

Rexx is the furthest from a true scripting language, suffering the
design defect (Shmuel considers it an advantage) of allowing
reference to functions prior to their definition.  This would
engender the misbehavior were Rexx to be used as a terminal
scripting language (some programmers have tried to implement
this with wrapper scripts) that a typo in a function name could
cause an endless input loop as the interpreter looked ahead for
the function definition.

I had some conceptual difficulty when I was first learing UNIX
(Bourne) shell scripting because I failed to grasp that I was
communicating with the same command interpreter from
the terminal as from a script file; I often wanted to use too
many quotes in the latter.  Rexx habit.

I understand that Warnock initially envisioned PostScript as a
general purpose scripting language, not merely for document
rendering.  In fact, SunOS 4 had a PostScript-like shell language
available.  It interested me because I had some knowledge of
PostScript at the time.  But I was never able to find its
analog of the system() command, and lost interest.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Space Allocation In Bytes

2012-08-27 Thread Paul Gilmartin
On Mon, 27 Aug 2012 13:36:58 -0700, Skip Robinson wrote:

I'm curious about the experiment that shows something on disk. ZAP command
says 'DATA SET UNAVAILABLE OR NON-EXISTENT'. IEHLIST says 'THE ABOVE
DATASET HAS NO EXTENTS'. What view of the disk shows something on a data
track?

I'm trying for an example.  But what command can I use to list SPACE?
Neither LISTDS nor LISTCAT seems to do it for me.  (But do I just not
know the correct options?  Something under IDCAMS?)

Thanks,
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Space Allocation In Bytes

2012-08-27 Thread Paul Gilmartin
On Mon, 27 Aug 2012 16:26:40 -0700, Lizette Koehler wrote:

What kind of space are you looking for?

LISTC name ALL will provide space info on VSAM but not NON VSAM

It's NONVSAM.

If you want space on NON VSAM then I think the PDS utility on the CBTTAPE.ORG 
would work.

So I have to go out and get a nonstandard utility ...

Or create a REXX and use the LM functions to list the space or LISTDSI.  

... or go through IKJEFT01; ISPSTART; LM*; ...  Of course, I can do this
easily with foreground ISPF; DSLIST; Info.  But I had set myself the goal
of doing it all in a _simple_ (self-contained) batch job so I could post
here a refutation to the doubter.

Why does MVS make simple things so damned hard!?

OK.  Here's the hybrid solution; batch JCL:

//
//EMPTY JOB  505303JOB,'Paul Gilmartin',
// MSGLEVEL=(1,1),REGION=0M
//*
//USERCOUTPUT JESDS=ALL,DEFAULT=YES,
//  CLASS=R,PAGEDEF=V0648Z,CHARS=GT12
//*
//STEP EXEC  PGM=IEFBR14
//SYSUT0DD   DISP=(MOD,DELETE),UNIT=SYSALLDA,SPACE=(0,1),
//  DSN=SYSUID..TEMP.ALMOST.EMPTY
//SYSUT2DD   DISP=(,CATLG),UNIT=SYSALLDA,SPACE=(0,1),
//  DSN=SYSUID..TEMP.ALMOST.EMPTY
//

(de)allocation messages:

IEF142I EMPTY STEP - STEP WAS EXECUTED - COND CODE   
IEF285I   user.TEMP.ALMOST.EMPTY   UNCATALOGED   
IEF285I   VOL SER NOS= TSO022.   
IEF285I   user.TEMP.ALMOST.EMPTY   DELETED   
IEF285I   VOL SER NOS= TSO022.   
IEF285I   user.TEMP.ALMOST.EMPTY   CATALOGED 
IEF285I   VOL SER NOS= TSO005.   

and data set info:
  Data Set Information  
   
 Data Set Name . . . . : user.TEMP.ALMOST.EMPTY

 General Data   Current Allocation  
  Management class . . : **None**Allocated tracks  . : 1
  Storage class  . . . : **None**Allocated extents . : 1
   Volume serial . . . : TSO005 
   Device type . . . . : 3390   
  Data class . . . . . : **None**   
   Organization  . . . : NONE   Current Utilization 
   Record format . . . : ?   Used tracks . . . . : 0
   Record length . . . : 0   Used extents  . . . : 0
   Block size  . . . . : 0  
   1st extent tracks . : 1

... so SPACE=(0,1) does allocate space.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: The IBM zEnterprise EC12 announcment

2012-08-28 Thread Paul Gilmartin
On Tue, 28 Aug 2012 05:11:56 -0500, Shane Ginnane wrote:

So 
IBM obviously couldn't use the z11 name and so the marketing intelligentsia 
came up with that marvellous ploy to fill the gap.

Let's hope they have dibs on the next few iterations of znumber, so we can 
avoid this farce again in future.
 
Who cares!?

What's in a name?  ...  -- WS

Actually, some things.  IBM didn't understand that the output of
uname -s is customarily used as an API by UNIX scripts when
they changed it from OS/390 to z/OS.  But IBM relented, and
uname now says we're at OS/390 1.23.  And even OS/390
has problems; the solidus breaks GNU autoconfigure.  IBM does
not much care to play well with others.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Space Allocation In Bytes

2012-08-28 Thread Paul Gilmartin
On Tue, 28 Aug 2012 00:45:25 -0700, Lizette Koehler wrote:

Peter,
I works fine if working in ISPF.  But when the question of line command is 
requested, I am thinking along the lines of a simple interface that could be 
used batch or foreground.
 
Thanks for your understanding.  Simply, there are too many disjoint
ways of retrieving not enough information about a data set.  These
include HLIST, LISTDS, LISTCAT, BPXWDYN(INFO), Rexx LISTDSI,
ISPF DSLIST, ISPF DDLIST, ... probably many others.  There should
be a single simple interface to retrieve any of the information
supplied by any of the above.

It should be accessible with:

o JCL EXEC PGM=

o TSO CALL

o Assembler CALL

o Rexx  address LINKMVS

(the above interfaces are all very similar.)

o Other Rexx interfaces.

It should be able to direct its output to:

o TSO terminal.

o DDNAME if OUTDD() specified

o Rexx compound variable if STEM() specified.

o Reply buffer supplied by assembler CALL or Rexx LINKMVS.

It should accept as argument:

o Catalogued data set name
  - even with the extended syntax allowed by DISABLE(DSNCHECK)

o Uncatalogued data set name if UNIT and VOL are specified
  - again even with nonstandard name syntax

o DDNAME, which may refer to:
  - catalogued data set
  - uncatalogued data set
  - temporary DSN
  - VIO data set
  - UNIT and VOL with no DSN coded
  - UNIX path

(have I missed any?)  With DDNAME specified it should (be able to)
return attributes which will be used in the DCB merge at OPEN, not
necessarily those in the DSCB.

DDNAME should be allowed to be any 8-character string that could
have been allocated by SVC 99; not restricted to JCL syntax (the
latter could be retrieved if desired by issuing a second call with DSN,
UNIT, and VOL supplied by a previous call).

The values returned should be sufficient to allow reallocation of the
same entity to a different DDNAME with TSO ALLOCATE or BPXWDYN.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: The IBM zEnterprise EC12 announcment

2012-08-28 Thread Paul Gilmartin
On Tue, 28 Aug 2012 13:55:43 +, Meral Temel (Garanti Teknoloji) wrote:

 One cryptographic/compression co-processor per core

Presumably optionally disabled to comply with export restrictions?
I'm told we have the cryptographic PRNG disabled on most of our
processors because it's separately priced.  Is that true?  Will it
ever change?

 Cryptography support of UTF8UTF16 conversions
 
Shouldn't that be UTF-8?  I had never heard of UTF-16, but apparently
Microsoft uses it, so it must be OK.

Is UTF8UTF16 properly deemed cryptography?  What about ROT-13?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: The IBM zEnterprise EC12 announcment

2012-08-28 Thread Paul Gilmartin
On Tue, 28 Aug 2012 10:49:21 -0400, Tony Harminc wrote:

 Presumably optionally disabled to comply with export restrictions?

Is there really anywhere these days you can send a mainframe to that
you can't send a crypto processor to? Surely no one in Cuba or Iran
can order up a zEC12 in any case, even if a handful of cheap GPUs have
more computing power.
 
I had thought restrictions applied anywhere outside the U.S. and Canada.
But I may be operating on outdated misinformation.

You forgot North Korea.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: The IBM zEnterprise EC12 announcment

2012-08-28 Thread Paul Gilmartin
On Tue, 28 Aug 2012 10:44:32 -0500, Todd Last wrote:

According to today's virtual event, the EC12 is the 12th generation of modern 
mainframes.  Can anyone list out the 11 previous generations?

Something like:

Matthew 1
King James Version (KJV)

1 The book of the generation of Jesus Christ, the son of David, the son of 
Abraham.
2 Abraham begat Isaac; and Isaac begat Jacob; and Jacob begat Judas and his 
brethren;
3 And Judas begat Phares and Zara of Thamar; and Phares begat Esrom; and Esrom 
begat Aram;
4 And Aram begat Aminadab; and Aminadab begat Naasson; and Naasson begat Salmon;
  ...

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: The IBM zEnterprise EC12 announcment

2012-08-28 Thread Paul Gilmartin
On Tue, 28 Aug 2012 11:29:48 -0500, Kirk Wolf wrote:

From:
http://java.sun.com/javase/technologies/core/basic/intl/faq.jsp#core-textrep

 The primitive data type char in the Java programming language is an
unsigned 16-bit integer that can represent a Unicode code point in the
range U+ to U+, or the code units of
UTF-16http://java.sun.com/javase/technologies/core/basic/intl/faq.jsp#utf-16
.
Which does describe UTF-16 as a variable-length encoding of which
Java uses a subset.

Confusing eh?
I guess you would call what Java uses internally a UTF-16 subset.

So, technically not UTF-16, but practically UTF-16  (a two-byte UTF-16
subset)
 
That's more like UCS-2.  Big-endian or little-endian?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: execs or scripts

2012-08-28 Thread Paul Gilmartin
On Tue, 28 Aug 2012 13:21:14 -0400, John Gilmore wrote:

Other people's parsing machinery is, in my experience, usable only for
context-free 'languages'; and since I devise and use only
context-sensitive--yes, PL/I-like--languages, I have found that I must
build my own parsing machinery; and this is easy enough to do using
REXX.
 
No language that requires identifiers to be declared is context-free,
though some phrases in such languages may be parsed by
context-unaware machinery, usually subject to availability of a
symbol table.  In effect, the symbol table converts declared
identifiers to terminal symbols in the parser's view.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Space Allocation In Bytes

2012-08-28 Thread Paul Gilmartin
On Tue, 28 Aug 2012 15:33:15 -0500, Richard Peurifoy wrote:

 But for CKD doesn't there have to be some place to write the EOF?

I think BSAM/QSAM will simulate an EOF without doing any I/O
to the data set if you try to read it.
 
Yup.  As I said here lately, I've depended on that behavior in the past.
And I believe that if the primary extent is exactly filled, the OS will
not allocate a secondary merely to write that EOF.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Space Allocation In Bytes

2012-08-28 Thread Paul Gilmartin
On Tue, 28 Aug 2012 14:45:42 -0700, Skip Robinson wrote:

I know that ISPF Browse will show 'no data' if it judges from the VTOC
that utilization is zero, as in 3.2, regardless of what might be there
physically.  OTOH IEBGENER attempts read a file until EOF regardless of
VTOC info. I ran GENER to print a zero-space data set:. The result is the
same as if the only data on the first track were EOF.
 
I believe this is the behavior of QSAM.  BSAM at least in the past
behaved otherwise; cheerfully reading residual, likely invalid, data.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


TSO LOGON Reconnect confirmation.

2012-08-28 Thread Paul Gilmartin
In the TSO graphic LOGON panel, I can either S Reconnect, in which
it preempts any active session, or I can not select Reconnect, in
which case it rejects the LOGON if another session is active.

Either of these behaviors is extreme.  If there's another session,
I'd like it to prompt me:

Another session is active.  R(econnect) or C(ancel)?

Is there any way to achieve this?  Bonus points if it were to tell
me if the active session has a compatible terminal type, and if not
which, since if I reconnect to ISPF with an incompatible terminal
type chaos ensues.  Dumb ISPF.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: TSO LOGON Reconnect confirmation.

2012-08-28 Thread Paul Gilmartin
On Tue, 28 Aug 2012 21:04:24 -0400, Gerhard Postpischil wrote:

 I'd like it to prompt me:

  Another session is active.  R(econnect) or C(ancel)?

Yes, but you probably won't like it. The method is to implement
a pre-logon exit, which entails doing your own screen I/O, error
recovery, prompting for user id and password, etc.
 
You're right.  I don't like it.  How did you guess?  Actually, in HLASM
I could do anything, even write my own TMP.  If I wanted to.  If I
knew how.  Couldn't I?  And If I can prompt for passwords, I can
copy them.  Sounds like a security exposure to me.

As a bonus you can allow multiple TSO sessions on the same
system, something not recommended for the faint of heart.

Is this more frightening than multiple TSO sessions on separate
processors, which I do regularly?

Thanks,
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: DFDSS

2012-09-01 Thread Paul Gilmartin
On Sat, 1 Sep 2012 21:46:36 -0400, Doug wrote:

Gill Agreed!
HFS/zFS With DFDSS should be made to honor user allocation specifications
for data set restore.

No.  I'll go further than that.

It should allocate as the primary extent the largest available
eligible extent.

It should allocate as the first secondary extent, if needed,
the largest remaining eligible extent.

It should allocate as the next secondary extent ... and so on.

It's a computer; it should employ the program do the dirty work,
but do it correctly.

Typical work around is to reallocate and manually copy the zFS. 
Last PMR with IBM on this topic just gave me the run around.
So, that is why I am asking this brain trust the question.
 
Sheesh!  I assume run around is spelled WAD.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: iSeries

2012-09-03 Thread Paul Gilmartin
On Mon, 3 Sep 2012 10:19:57 -0700, Charles Mills  wrote:

Two identical tradenames do not necessarily infringe on each other. The test
is the likelihood of customer confusion. Would a mattress buyer be likely to
think IBM was behind a Serta iSeries? Would a computer buyer impute Serta's
reputation to an IBM iSeries?

The question has gotten tougher in recent years. Fifty years ago you
probably could have called a clothing line Coke or MacDonald's, but now
every company wants their brand known in every line of business.
 
A line in the sand was drawn here:

Amstar Corp. v. Domino's Pizza Inc., 615 F.2d 252 (5th Cir. 04/08/1980)
[1] UNITED STATES COURT OF APPEALS, FIFTH CIRCUIT
[2] No. 79-3650
[3] 1980.C05.41966 http://www.versuslaw.com; 615 F.2d 252
[4] April 8, 1980
[5] AMSTAR CORPORATION, PLAINTIFF-APPELLEE,
v.
DOMINO'S PIZZA, INC. AND ATLANTA PIZZA, INC., PIZZA ENTERPRISES, INC. AND PIZZA 
SERVICES, INC., HANNA CREATIVE ENTERPRISES, INC., DEFENDANTS-APPELLANTS.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: The IBM zEnterprise EC12 announcment

2012-09-04 Thread Paul Gilmartin
On Tue, 4 Sep 2012 15:01:37 -0400, Thomas David Rivers wrote:

   cxx: t.c line 3:Error #144: a value of type const char [7] cannot
be used to initialize an entity of type char [6]
 char s6[ 6 ] = wombat;
  
Is there any convenient way to perform this initialization?  (I don't
consider either overallocating the array or enumerating individual
chars in a multiple initializer convenient.)

Thanks,
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Strings (hijacked from: The IBM zEnterprise EC12 announcment)

2012-09-04 Thread Paul Gilmartin
On Tue, 4 Sep 2012 14:32:12 -0500, Kirk Wolf wrote:

(BTW - strncpy() also zeros bytes after the terminator, if necessary)

For more information, see: http://www.courtesan.com/todd/papers/strlcpy.html
under Common Misconceptions

There's no discernible date of publication of that paper save for some interior
references to events ca. 1996.  And strlcpy() and strlcat() appear not to have
made it into POSIX.

That paper mentions performance consequences of strncpy()'s zeroing bytes
after the terminator when the target buffer may be much larger than the
source.  It does not mention that str(l|n)cat() suffers a similar performance
impact when concatenating multiple strings into a single buffer because the
content previously concatenated must be re-scanned to find the null terminator.
Of course, the programmer could bypass this by using the length returned
by strlcat()/strlcpy() as an offset in the target.  But this reintroduces the
hazard of programmer arithmetic errors.  If strlcat() were inline rather than
a library function, an optimizing compiler could take care of much of this by
remembering the length of the previous call.

You, Lynn, and John G. are correct to distrust null-terminated strings.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Preventing the installation of unapproved software

2012-09-05 Thread Paul Gilmartin
What about IP liability concerns?

On Sep 5, 2012, at 06:47, R.S. wrote:

 W dniu 2012-09-05 14:21, Greg Dorner pisze:
 Man, the auditors came up with a new one!
 
 Gap noted. Automated controls to prevent the installation of
 unapproved software were not documented.
 
 1. The requirement is plain stupid. There is no reason to analyse case like 
 Smith did bring and uploaded some CBT program. [*]
 2. There is automated control: RACF or other security server. With proper 
 setup only authorized personnel is able to install the software in terms of 
 APF, SSI, proclib and parmlib members. I assume you have your security server 
 set up properly.
 
 
 [*] Note: theorethically I can write 10 lines script, call it software 
 product, copyright it and sell it for 1000$ per machine (MIPS, 
 whatever). On every platform - MVS, Windows, Unix, Linux, VMS, VSE, VM there 
 are folks who are able to create text file/dataset. So, they are able to 
 upload my very copyrighted and extremely expensive (and possibly dangerous) 
 software product. Of course on some platforms, like z/OS a product to be 
 working, especially if it's considered as dangeours - do need authorities 
 like APF, etc. So, the product in the regular file is NOT installed.
 BTW: it need not do be script. I can put myprg.exe to a dataset.
  
theorethically  Is that a portmanteau word?  (Your English is
good enough that it might be a deliberate construct.)

There's a genuine IP concern here.  An employee might bring in from
a former employer an SD RAM with a TSO TRANSMIT unloaded library
containing a licensed program product, not licensed at the new
site and expose the new employer to significant legal liability
with no need for particular authorization.

There might be an argument here for vendors' requiring APF
authorization of their products not because of any intrinsic
integrity concerns, but simply to force an audit of the
installation.  (But this might easily be bypassed with
AMASPZAP's changing one BC instruction.  Perhaps the auditor
should require that use of AMASPZAP be restricted.)

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


  1   2   3   4   5   6   7   8   9   10   >