I take your point. It is not clear if it is internal use only or if it will
be eventually made public in some form.
On Mon, Aug 3, 2009 at 10:20 PM, Edward Jaffe
edja...@phoenixsoftware.comwrote:
Ibm-Main Sam wrote:
I just ran across this item about the zIIP api for vendors. Reading it
Agreed on both points. The purpose of the web site it is establish a
stake-in-the-ground about what you know and when you know it ...
specifically for IP rights.
On Mon, Aug 3, 2009 at 10:49 PM, Ken Porowski ken.porow...@cit.com wrote:
Maybe a preemptive strike to keep someone else from
Great find. Reading between the lines one could imagine that this
technology could be used to consolidate workloads from, potentially, any
existing instruction set. This could increase the rate of non-host server
consolidation significantly.
Sam
On Tue, Aug 4, 2009 at 3:37 PM, Mark Post
On Mon, Aug 17, 2009 at 8:04 AM, Hunkeler Peter (KIUP 4)
peter.hunke...@credit-suisse.com wrote:
The JIT compiler can do things that a static compiler can't. The more
frequently a method is used, the more optimisations can be applied,
such as inlining other methods and branch table
TYPRUN=SCAN has had this type of behaviour since at least the mid '80's. I
suspect it has been like this for a lot longer.
Regards,
Sam
On Mon, Aug 24, 2009 at 8:43 PM, Brendan Friel bjpafr...@hotmail.comwrote:
I have never come across this (or anything like this) in hundreds
(thousands with
Darn ... I was laying 2:1 odds.
On Mon, Sep 28, 2009 at 8:18 PM, Scott Rowe scott.r...@joann.com wrote:
I don't think he's quite that old.
Bill Fairchild bi...@mainstar.com 9/28/2009 3:13 PM
Did Lionel Dyck predate William of Ockham (1288-1327)?
Bill Fairchild
Software Developer
Thank you for speaking everyone's words.
On Tue, Sep 29, 2009 at 2:21 AM, Clark Morris cfmpub...@ns.sympatico.cawrote:
On 28 Sep 2009 13:47:39 -0700, in bit.listserv.ibm-main you wrote:
28 September 2009
This is to inform you that IBMLink will have a planned outage starting
on Friday,
What about a decline that is reaching its asymptotical limit?
On Tue, Sep 29, 2009 at 9:55 PM, P S zosw...@gmail.com wrote:
Oy. Google growing decline: 24K hits; increasing decline: 33K
hits. I guess this illustrates the increasing decline in folks'
ability to write.
Looks like it might be ascii.
On Tue, Oct 6, 2009 at 6:21 AM, Scott Ford scott_j_f...@yahoo.com wrote:
What does the Java source look like ?
Scott J Ford
John,
What does the Java source look like ?
Scott J Ford
From: Chase, John jch...@ussco.com
IBM needs to keep optimizing the c/c++ compiler to support *nix/windows
server consolidation onto zLinux.
On Mon, Oct 12, 2009 at 7:47 PM, Clark Morris cfmpub...@ns.sympatico.cawrote:
On 12 Oct 2009 10:37:56 -0700, in bit.listserv.ibm-main Kirk Talman
wrote:
Why can't Cobol use the C code
[mailto:ibm-m...@bama.ua.edu] On
Behalf Of Sam Siegel
Sent: Monday, October 12, 2009 3:00 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: COBOL is an obvious cash cow to be milked to death was
Re:
Does Ent. COBOL 4.1 generate 64-bit binary arithmetic instructions?
IBM needs to keep optimizing the c
: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Sam Siegel
Sent: Monday, October 12, 2009 3:00 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: COBOL is an obvious cash cow to be milked to death was
Re:
Does Ent. COBOL 4.1 generate 64-bit binary arithmetic instructions
It can be done from C by building your own text units and issuing the
svc99() function call. I'm pretty sure that the svc99() function allows
access to pretty much all svc99() features.
-sam
On Tue, Oct 13, 2009 at 3:38 PM, Eric Spencer eric.spen...@neon.com wrote:
You can force DYNALLOC to
Congrats and best of luck! I was on the bench a year before moving to the
UK.
On Sun, Oct 18, 2009 at 6:07 PM, Rich Smrcina rsmrc...@wi.rr.com wrote:
Eric Bielefeld wrote:
I finally am going back to work on Monday. I'll be working at the new IBM
call center in Dubuque, Iowa. I'm not sure
What about setting up RACF to log who opened what for output?
On Wed, Nov 4, 2009 at 8:49 AM, Miklos Szigetvari
miklos.szigetv...@isis-papyrus.com wrote:
Hi
Would like to record in DB2 database if someone opens, for output, a
group of precious datasets.(Product delivery etc.)
Which exit
xdc
On Thu, Nov 5, 2009 at 6:56 PM, Edward Jaffe edja...@phoenixsoftware.comwrote:
What do you use to debug your METAL C programs?
--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
edja...@phoenixsoftware.com
z/XDC. I still like to see exactly what is going on.
On Thu, Nov 5, 2009 at 9:29 PM, Edward Jaffe edja...@phoenixsoftware.comwrote:
Sam Siegel wrote:
xdc
c/XDC or z/XDC?
--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310
Hi,
We use,
MVS1.xxx.net
MVS5.xxx.net
MVS7.xxx.net.
Where xxx is company name.
Keep the DNS name closely related or identical to the system name. It will
make your life easier.
These defined to the internal network (that is 10.x.x.x ip address) only.
They are not accessible from the outside
This is exactly what I've recently done and it works perfect on 1.09
On Fri, Nov 20, 2009 at 6:29 PM, Donald Russell russell@gmail.comwrote:
On Fri, Nov 20, 2009 at 10:34, Tim Hare tim.h...@ssrc.myflorida.com
wrote:
In a 2008 thread on people using IEFBR14 to do deletes there as this:
What is your c/c++ question.
On Thu, Dec 3, 2009 at 2:53 PM, Charles Mills charl...@mcn.org wrote:
I found http://ibmmainframeforum.com/ but the last C question was in June
and it hasn’t been answered yet. :-(
I found http://www.ibmmainframes.com/ but they group C questions into
“Other
The question of the moment is is there no 'safe' string copy library
routine such as strcpy_s? I don't see it in the doc.
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf
Of Sam Siegel
Sent: Thursday, December 03, 2009 7:03 AM
To: IBM
On Thu, Dec 3, 2009 at 10:56 PM, Paul Gilmartin paulgboul...@aim.comwrote:
On Thu, 3 Dec 2009 11:07:38 -0600, McKown, John wrote:
OPINION TIME!
The safe versions are not safer than using some of the others which
include the length of the destination buffer. Such as strncpy, strncmp, and
Connect:Direct (previously known as NDM) can only be loosely related to
check processing as it just transmits files back and forth. An IBM Check
shop uses CPCS (check processing control system) Vector sort (by Sterling),
etc.
These are low level programs still shipped in source (at least
Sorry about that ... CPCS is indeed (and always has been) an IBM product.
VECTOR:sort is by Sterling.
On Fri, Dec 18, 2009 at 7:40 AM, Ted MacNEIL eamacn...@yahoo.ca wrote:
An IBM Check shop uses CPCS (check processing control system) Vector sort
(by Sterling)
Since when is it by Sterling?
The IBM z/OS Standard C++ Library Reference. documents the STL and other
industry standard C++ functions. It does not document (to my examination)
any IBM specific facilities.
Sam
On Fri, Dec 18, 2009 at 8:37 PM, Tony Harminc t...@harminc.net wrote:
2009/12/18 Charles Mills charl...@mcn.org:
Congrats ... the picture looks nice. Hope you enjoy them.
On Tue, Dec 22, 2009 at 8:21 PM, Edward Jaffe
edja...@phoenixsoftware.comwrote:
We're moving our offices this week. Not the kind of upgrade I'm used to
doing. But, still fun...
http://www.phoenixsoftware.com/newlocation.htm
--
Don't forget SOA enabled keyboards and monitors. :)
On Wed, Dec 23, 2009 at 9:23 AM, R.S. r.skoru...@bremultibank.com.plwrote:
Shane Ginnane pisze:
On Wed, Dec 23rd, 2009 Radoslaw wrote:
SOA is a platform neutral protocol.
SOA is *not* a protocol. It is a marketing plonk. Nothing behind
Hi Charles,
I'm assuming that if you are going to call via link or attach that you will
have an assembler main program that does not have a valid
LE environment established. That is to say a traditional assembler program.
If this is the case, you should refer to the CEEPIPI documentation
Charles,
The other option you have is to look at METAL C or system C. Or a third
party compiler.
Regards,
Sam
On Sat, Dec 26, 2009 at 9:14 PM, Charles Mills charl...@mcn.org wrote:
Trying to figure out this subject.
The C/C++ Language Reference on p. 207 says Under z/OS batch . argv[0]
way? Seems like a pretty obvious need: write a
C++ program that starts up with standard z/OS
multiple-parameter-pointers-pointed-to-by-R1 linkage.
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf
Of Sam Siegel
Sent: Saturday
For caps on/caps off, I was referring to ISPF edit.
On Sun, Dec 27, 2009 at 12:18 AM, Paul Gilmartin paulgboul...@aim.comwrote:
On Sat, 26 Dec 2009 21:45:46 +, Sam Siegel wrote:
The comment argv[1 to n] is trying to say that the characters in parms 1
... N are not modified by converter
that JCL. Neither the TSO or JCL rules apply to
program to program calls.
Regards,
Sam
On Sun, Dec 27, 2009 at 5:38 AM, Paul Gilmartin paulgboul...@aim.comwrote:
On Sun, 27 Dec 2009 04:57:25 +, Sam Siegel wrote:
For caps on/caps off, I was referring to ISPF edit.
That has very little
There are other business related inaccuracies in the article as well. The
article indicates that they process hundreds of millions of Credit Card
transactions a day. Having previously worked at a large credit card
processor in the US, it can be said with certainty that the S. Korean credit
card
On Thu, Jan 7, 2010 at 6:36 PM, Ted MacNEIL eamacn...@yahoo.ca wrote:
That's the point of (EMV) chip cards. They are inherently more secure.
Why are they more secure?
INTERAC Canada has been telling us that they are.
So far, on their web-site, the proof presented has been: They are more
On Fri, Jan 8, 2010 at 6:08 AM, Timothy Sipples e99...@jp.ibm.com wrote:
I should say right up front that I am not an expert on Korean banking.
Also, I have no idea whether the following remarks apply to BC Card
specifically.
One commenter in this thread suggested that the number of
On Mon, Jan 11, 2010 at 9:32 AM, Tom Quarendon
tom.quaren...@teamwpc.co.ukwrote:
If that's the cast you need CEEPIPI. Call it once to initialize the
persistent LE environment and then to call your routine with the
environment token. You will have to stash away the environment token
somewhere,
On Mon, Jan 11, 2010 at 9:16 PM, Ron Hawkins
ron.hawkins1...@sbcglobal.netwrote:
I disagree. The basic operation of a credit card at the get go was for the
customer to be authenticated by comparing the signature on the voucher with
the one on the card. If they don't match the vendor refuses
On Mon, Jan 11, 2010 at 10:59 PM, Anne Lynn Wheeler l...@garlic.comwrote:
t...@harminc.net (Tony Harminc) writes:
I'm not sure why this offends you so much. How would it help anything
if the cashier checked your signature? Such checking is highly
unreliable, and contributes much less to
On Tue, Jan 19, 2010 at 2:28 PM, esmie moo esmie_...@yahoo.ca wrote:
Good Morning Gentle Readers,
I am trying to trouble shoot a problem which invokes NOTE/POINT LOGIC. I
GOOGLED it but I didn't find what I was looking for. Would anyone know who
the vendor is or if there is a site that I
On Fri, Feb 5, 2010 at 3:07 PM, McKown, John
john.mck...@healthmarkets.comwrote:
-Original Message-
From: IBM Mainframe Discussion List
[mailto:ibm-m...@bama.ua.edu] On Behalf Of Bruno Sugliani
Sent: Friday, February 05, 2010 8:58 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: IBM
On Tue, Feb 16, 2010 at 6:09 PM, McKown, John john.mck...@healthmarkets.com
wrote:
I know it's the one not taken!. But of the B, J, or BR, can they be
ordered? I am 99.9% certain that having the branch address in a register is
the fastest. But is it significant enough that I should dedicate a
On Tue, Feb 16, 2010 at 7:48 PM, McKown, John john.mck...@healthmarkets.com
wrote:
-Original Message-
From: IBM Mainframe Discussion List
[mailto:ibm-m...@bama.ua.edu] On Behalf Of Sam Siegel
Sent: Tuesday, February 16, 2010 1:44 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re
On Mon, Feb 22, 2010 at 2:00 AM, Charles Mills charl...@mcn.org wrote:
I'm writing a fairly large MVS batch application in C++. At several points
it is necessary to call library type routines that I am writing in
assembler. Several of the routines (unfortunately) need to use QSAM macros
and
On Mon, Feb 22, 2010 at 5:07 AM, Charles Mills charl...@mcn.org wrote:
Thanks. Sounds a little risky to assume I am the first/only program in the
region -- the jobstep program -- but it's an idea.
It is at the TCB level. It is not required to be the jobstep program or
TCB. I can understand
is going to be faster than getmain/freemain or storage obtain/release
functions.
Cheers,
Sam
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf
Of Sam Siegel
Sent: Sunday, February 21, 2010 11:13 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re
On Tue, Feb 23, 2010 at 12:07 PM, Don Poitras poit...@pobox.com wrote:
In article 4b8389b7.9030...@gmail.com you wrote:
Charles Mills wrote:
The fundamental problem I guess is that any solution that keeps a
pointer
around somewhere in the code is fundamentally not reentrant, unless I
On Fri, Mar 19, 2010 at 10:40 AM, Joe Reichman joereich...@optonline.netwrote:
Hi,
The following code works (ECB is posted by TCP/IP) except when I catalouge
the program RENT=(REUS)
Would anybody have any ideas
*-*
On Wed, Mar 24, 2010 at 2:22 PM, Diane Goodwin dgood...@amica.com wrote:
Hello, Please bear with me. I'm normally a CICS System programmer.
We all know the default setting for ALLOWUSERKEYCSA was changed
to NO from yes. This causes a problem for our CICS regions (address
spaces).
We have
this with the dataspace. I have to be
able to just pass the address to the application programs. We have way
to many to try to change.
Diane
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Sam Siegel
Sent: Wednesday, March 24, 2010 10:40 AM
To: IBM
and switch to AR mode.
Probably more changes than you want to make in all of the application code
that uses the data.
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Sam Siegel
Sent: Wednesday, March 24, 2010 11:27 AM
To: IBM-MAIN
On Fri, Mar 26, 2010 at 3:15 PM, John P. Baker john.ba...@hfdtechs.comwrote:
Could you enlighten us on the cost of the Dallas RDP offering?
I've heard Dallas RDP is about 300 to 500 USD per month. Includes all IBM
software (CICS, DB2, IMS, etc.) current z/OS under z/VM. Maybe 15 to 30
hours
On Fri, Mar 26, 2010 at 8:46 PM, Paul Gilmartin paulgboul...@aim.comwrote:
On Fri, 26 Mar 2010 14:51:12 -0500, Elliot, David wrote:
By the way, surely UNIX must be approaching legacy status by now. Or is
that expression reserved for the despised IBM mainframe?
UNIX ages more gracefully
On Fri, Mar 26, 2010 at 9:05 PM, McKown, John john.mck...@healthmarkets.com
wrote:
-Original Message-
From: IBM Mainframe Discussion List
[mailto:ibm-m...@bama.ua.edu] On Behalf Of Sam Siegel
Sent: Friday, March 26, 2010 4:01 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re
On Fri, Mar 26, 2010 at 10:00 PM, Kirk Wolf k...@dovetail.com wrote:
Sam,
I like z/OS as much as the next guy, but I have to disagree with most
of your comparisons.
On Fri, Mar 26, 2010 at 4:20 PM, Sam Siegel s...@pscsi.net wrote:
Then there are things like checkpoint restart. On unix
On Sun, Mar 28, 2010 at 3:49 PM, Shmuel Metz (Seymour J.)
shmuel+ibm-m...@patriot.net shmuel%2bibm-m...@patriot.net wrote:
I agree with much of what you write, but must challenge on item.
In 4e2421a41003261420t52bf2254pf53955d4b0ed0...@mail.gmail.com, on
03/26/2010
at 09:20 PM, Sam
On Tue, Mar 30, 2010 at 6:24 PM, Steve Comstock st...@trainersfriend.comwrote:
Had a strange thing happen today. Basically Qwest, our
broadband supplier, shut off access to the internet
because we've supposedly exceeded our monthly download
limit of 200GB.
Their phone menu system is awful
On Tue, Mar 30, 2010 at 7:12 PM, Steve Comstock st...@trainersfriend.comwrote:
Sam Siegel wrote:
On Tue, Mar 30, 2010 at 6:24 PM, Steve Comstock st...@trainersfriend.com
wrote:
Had a strange thing happen today. Basically Qwest, our
broadband supplier, shut off access to the internet
On Tue, Mar 30, 2010 at 8:40 PM, Rabbe, Luke
luke.ra...@countryfinancial.com wrote:
I ordered z/OS 1.11 electronically. I downloaded the following 3 times
using HTTPS.
IBM Online Library: z/OS V1R11 and Software Products DVD Collection,
September 2009
Download to your workstation in
With all of the discussion about APF and loading programs from various types
of libraries, I'm hoping someone can provide some clarification for
me regarding the ADRNAPF of the load macro.
The doc indicates that a module can be loaded from a non-apf library
when ADRNAPF is used from an authorized
On Wed, Apr 21, 2010 at 12:46 AM, Tony Harminc t...@harminc.net wrote:
On 20 April 2010 19:09, Sam Siegel s...@pscsi.net wrote:
With all of the discussion about APF and loading programs from various
types
of libraries, I'm hoping someone can provide some clarification for
me regarding
On Wed, Apr 21, 2010 at 9:54 AM, Binyamin Dissen bdis...@dissensoftware.com
wrote:
On Wed, 21 Apr 2010 08:24:19 +0100 Sam Siegel s...@pscsi.net wrote:
:On Wed, Apr 21, 2010 at 12:46 AM, Tony Harminc t...@harminc.net wrote:
: On 20 April 2010 19:09, Sam Siegel s...@pscsi.net wrote
On Wed, Apr 21, 2010 at 9:54 AM, Binyamin Dissen bdis...@dissensoftware.com
wrote:
On Wed, 21 Apr 2010 08:24:19 +0100 Sam Siegel s...@pscsi.net wrote:
:On Wed, Apr 21, 2010 at 12:46 AM, Tony Harminc t...@harminc.net wrote:
: On 20 April 2010 19:09, Sam Siegel s...@pscsi.net wrote
On Thu, Apr 22, 2010 at 2:28 PM, Rob Schramm rob.schr...@siriuscom.comwrote:
Did you retain any authorization when doing the SYNCH (such as, having
your
program running in supervisor state or a system key)? If so, you are
likely
to still have some major system integrity holes. Mixing
Hi All,
Switching subject lines to something more appropriate.
I'm trying to write some authorized code that has a requirement to invoke
unauthorized user exits.
I'd like to be able to do the following.
1) Provide an anchor word so that the user exit can allocate and retain
memory from call to
On Thu, Apr 22, 2010 at 2:57 PM, Tom Marchant m42tom-ibmm...@yahoo.comwrote:
On Thu, 22 Apr 2010 16:29:51 +0300, Binyamin Dissen wrote:
As long as all work areas used by the authorized program are in system key
there should not be any exposure by using SYNCH.
The code also needs to be in
On Thu, Apr 22, 2010 at 3:32 PM, Thompson, Steve
steve_thomp...@stercomm.com wrote:
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Sam Siegel
Sent: Thursday, April 22, 2010 9:08 AM
To: IBM-MAIN@bama.ua.edu
Subject: Calling
On Thu, Apr 22, 2010 at 3:34 PM, Binyamin Dissen bdis...@dissensoftware.com
wrote:
On Thu, 22 Apr 2010 15:07:52 +0100 Sam Siegel s...@pscsi.net wrote:
:I'm trying to write some authorized code that has a requirement to invoke
:unauthorized user exits.
Why? What is the business case?
:I'd
On Thu, Apr 22, 2010 at 3:39 PM, Bob Shannon bshan...@rocketsoftware.comwrote:
I'm trying to write some authorized code that has a requirement to invoke
unauthorized user exits.
Use SYNCH. Assume all data received from the exit is untrusted and insure
the caller verifies it. Caller can save
On Thu, Apr 22, 2010 at 4:04 PM, Binyamin Dissen bdis...@dissensoftware.com
wrote:
On Thu, 22 Apr 2010 15:46:27 +0100 Sam Siegel s...@pscsi.net wrote:
:On Thu, Apr 22, 2010 at 3:39 PM, Bob Shannon
bshan...@rocketsoftware.comwrote:
: I'm trying to write some authorized code that has
On Thu, Apr 22, 2010 at 6:18 PM, Walt Farrell wfarr...@us.ibm.com wrote:
On Thu, 22 Apr 2010 15:36:50 +0100, Sam Siegel s...@pscsi.net wrote:
On Thu, Apr 22, 2010 at 2:57 PM, Tom Marchant m42tom-ibmm...@yahoo.com
wrote:
On Thu, 22 Apr 2010 16:29:51 +0300, Binyamin Dissen wrote
On Thu, Apr 22, 2010 at 6:36 PM, Walt Farrell wfarr...@us.ibm.com wrote:
On Thu, 22 Apr 2010 09:28:32 -0400, Rob Schramm rob.schr...@siriuscom.com
wrote:
Did you retain any authorization when doing the SYNCH (such as, having
your
program running in supervisor state or a system key)? If
On Thu, Apr 22, 2010 at 6:42 PM, Walt Farrell wfarr...@us.ibm.com wrote:
On Thu, 22 Apr 2010 15:07:52 +0100, Sam Siegel s...@pscsi.net wrote:
I'm trying to write some authorized code that has a requirement to invoke
unauthorized user exits.
First, why do they have to be unauthorized? Your
On Thu, Apr 22, 2010 at 11:22 PM, Chris Craddock crashlu...@gmail.comwrote:
On Thu, Apr 22, 2010 at 1:19 PM, Sam Siegel s...@pscsi.net wrote:
On Thu, Apr 22, 2010 at 6:42 PM, Walt Farrell wfarr...@us.ibm.com
wrote:
On Thu, 22 Apr 2010 15:07:52 +0100, Sam Siegel s...@pscsi.net wrote
On Fri, Apr 23, 2010 at 1:05 PM, Peter Relson rel...@us.ibm.com wrote:
By definition, the subject seems to me to be an oxymoron.
Yes ... I agree that the subject lines is not properly worded and is
technically incorrect ... I'm pretty sure that the intent was understood. :)
An authorized
On Fri, Apr 23, 2010 at 1:16 AM, Tony Harminc t...@harminc.net wrote:
On 22 April 2010 14:19, Sam Siegel s...@pscsi.net wrote:
The requirements exists because I'm trying to write something that will
be
Ziip enabled and leased as a product.
Prior to passing the buffer to a work queue
Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of Sam Siegel
Sent: 23 April 2010 14:42
To: IBM-MAIN@bama.ua.edu
Subject: Re: Calling unauthorized code from an authorized address space
On Fri, Apr 23, 2010 at 1:05 PM, Peter Relson rel...@us.ibm.com
snip
If you keep the privileged part completely separate from the non-privileged
part then you will still have quite a lot of work to do, but you are at
least in with a shot of making it work out. Every other scheme that you (or
anyone else) can come up with will fail. I promise.
I see
On Mon, May 3, 2010 at 11:48 AM, Matan Cohen matancohen...@gmail.com wrote:
forget about the xmit problem.
we are trying to use an ftp client on z/os
using a job to get datasets larger than 4 GB from a windows server after we
succesfully send the Datasets to the windows FTP server .
when
On Thu, May 6, 2010 at 9:25 PM, R.S. r.skoru...@bremultibank.com.pl wrote:
W dniu 2010-05-06 19:10, McKown, John pisze:
http://www.daniweb.com/news/story281427.html
Friend of the author declared with all seriousness that every business,
large and small, is now almost totally Windows based,
On Fri, May 7, 2010 at 2:48 AM, Shmuel Metz (Seymour J.)
shmuel+ibm-m...@patriot.net wrote:
In t2s4e2421a41005061330ic150eda4wca4225caff5d...@mail.gmail.com, on
05/06/2010
at 09:30 PM, Sam Siegel s...@pscsi.net said:
And when talking to Unix/Windows folks, explaining (over and over
I did a little in a problem state program.
What are you looking for?
On Fri, May 7, 2010 at 7:05 PM, Blaicher, Chris chris_blaic...@bmc.com wrote:
Has anyone done much with PAUSE ELEMENTS and Pause Element Tokens?
If so, please contact me directly.
chris_blaic...@bmc.com
Thanks in
[mailto:ibm-m...@bama.ua.edu] On Behalf
Of Sam Siegel
Sent: Friday, May 07, 2010 1:28 PM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Pause Elements
I did a little in a problem state program.
What are you looking for?
On Fri, May 7, 2010 at 7:05 PM, Blaicher, Chris chris_blaic...@bmc.com
wrote
On Sun, May 9, 2010 at 5:20 PM, Ted MacNEIL eamacn...@yahoo.ca wrote:
Apparently abhorrence of liberty is the modal attitude of z/OS programmers.
Why do you work on a platform you hate so much?
Every one has some restriction that users of same don't like!
Find another field and stop
On Mon, May 10, 2010 at 5:10 PM, Howard Brazee howard.bra...@cusys.edu wrote:
On 6 May 2010 13:25:37 -0700, r.skoru...@bremultibank.com.pl (R.S.)
wrote:
Version for IT interlocutors:
Mainframe? z/OS? Is it a clone of AIX? Linux? C'mon! Since it's not
Windows, it must be any non-Windows
On Mon, May 10, 2010 at 5:57 PM, R.S. r.skoru...@bremultibank.com.pl wrote:
Howard Brazee pisze:
On 6 May 2010 13:25:37 -0700, r.skoru...@snip.it.pl (R.S.)
wrote:
Version for IT interlocutors:
Mainframe? z/OS? Is it a clone of AIX? Linux? C'mon! Since it's not
Windows, it must be any
On Tue, May 11, 2010 at 11:15 AM, Elardus Engelbrecht
elardus.engelbre...@sita.co.za wrote:
Timothy Sipples wrote:
Of course, I read those on-screen TCs very carefully and reviewed them
with a lawyer
I can't remember what software did this, but it requires you to SCROLL down
the whole
On Thu, May 20, 2010 at 7:57 PM, J R jayare...@hotmail.com wrote:
Pedantic. ... GMT would be better ...
Since you're being pedantic, wouldn't UTC be better? ;-)
Date: Thu, 20 May 2010 13:16:27 -0500
From: paulgboul...@aim.com
Subject: Re: Getting BIND/LINK date out of load module
snip
Furthermore, management is quick to point out that the IT folks
are not responsive to the rapid change of business needs, yet
management will not fund training in new or updated technologies
for their staff (nor even for conceptual updates for themselves).
While I'm at it, another
On Wed, May 26, 2010 at 12:46 AM, Rick Fochtman rfocht...@ync.net wrote:
-snip--
In serious line of business applications with, competing requirements from
many internal departments, it is often that IT is the central and only
On Tue, Jun 15, 2010 at 8:34 AM, George Henke gahe...@gmail.com wrote:
Thank you.
The operative word here is best practices. Something that will survive an
audit.
To pass an audit (internal and/or external) without qualification, it
is best to have a completely separate environment (HLQ,
On Tue, Jun 15, 2010 at 10:28 AM, George Henke gahe...@gmail.com wrote:
There are over 5000 indexes to Tables in my clients production DB2
system which is a relatively small by industry standards.
But I must admit, I can't imagine how, in a mainframe environment, sensitive
data could be
snip
They taught all the obscure utilities like IEBCOMPR and IEBDG.
Outside of that set of courses, I've never used either in the Real World,
ever.
Quoted below is the funniest part of the article.
*This document is the result of Infostructure Associates-sponsored research.
Infostructure
On Mon, Aug 2, 2010 at 5:41 PM, Andrew Rowley
and...@blackhillsoftware.comwrote:
Hunkeler Peter (KIUP 4) wrote:
I suspect he is referring to MVS Extended Architecture Overview
I concur. Nothing named Indroduction or Overview thereafter was
at the same level. I always wished this book
On Wed, Aug 4, 2010 at 6:33 PM, Wang Jianyun wjywcy2...@yahoo.com.cnwrote:
Hi
We use DATAPROPAGATOR tool to download data from mainframe but often
get error. The error message is in the attached file. Please could somebody
who are familiar with DATAPROPAGATOR help on this. Thanks.
snip
On Thu, Sep 16, 2010 at 11:27 AM, Scott Ford scott_j_f...@yahoo.com wrote:
START OF TS04A
CEE3207S The system detected a data exception (
zMan:
START OF TS04A
CEE3207S The system detected a data exception (System Completion Code=0C7).
From compile unit THRALLC at entry point
From: Sam Siegel s...@pscsi.net
To: IBM-MAIN@bama.ua.edu
Sent: Thu, September 16, 2010 2:38:31 PM
Subject: Re: Cobol calling C function
On Thu, Sep 16, 2010 at 11:27 AM, Scott Ford scott_j_f...@yahoo.com
wrote:
START OF TS04A
CEE3207S The system detected a data exception (
zMan
From: Sam Siegel s...@pscsi.net
To: IBM-MAIN@bama.ua.edu
Sent: Thu, September 16, 2010 3:33:49 PM
Subject: Re: Cobol calling C function
On Thu, Sep 16, 2010 at 12:26 PM, Scott Ford scott_j_f...@yahoo.com
wrote:
Good point, but that compiled C module
for the
help.
You're welcome.
Cheers,
Sam
Regards,
Scott J Ford
From: Sam Siegel s...@pscsi.net
To: IBM-MAIN@bama.ua.edu
Sent: Thu, September 16, 2010 4:13:19 PM
Subject: Re: Cobol calling C function
On Thu, Sep 16, 2010 at 12:43 PM, Scott Ford
On Mon, Sep 20, 2010 at 7:36 AM, Lindy Mayfield
lindy.mayfi...@ssf.sas.comwrote:
It seems that STARTIO isn't documented anywhere. Is it available from IBM
at all, like with an NDA or something like that?
Is it perhaps documented somewhere in earlier releases?
Lindy
-Original
On Mon, Sep 20, 2010 at 12:49 PM, Ward, Mike S mw...@ssfcu.org wrote:
I'm very sorry to hear about your father. My prayers are with you.
My prayers are with you also.
-Original Message-
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
Behalf Of shai hess
1 - 100 of 259 matches
Mail list logo