Hello Mike,
Is the field XVMDMVID or XVVOLCNT existing for multi-volume tape dataset?
I found some entries in rmm extended dataset has neither filed.
I guess only staring from a specific rmm version , above two filed began to
show up in RMM CDS.
I want to find a common method to calculate
Another source for assistance would be joining Syncsort's user
community. This community is a blog site where you can get product usage
assistance from a wider community. The site to register and log on is
http://community.syncsort.com/ This community consists of public and
private groups of
How much time does it take you to define which metrics in z/OS, CICS and DB2 to
monitor and set thresholds? Does anyone use different thresholds throughout the
day?
--
For IBM-MAIN subscribe / signoff / archive access
Sorry to hear you didn't get the special briefing, John.
-Ursprüngliche Nachricht-
Von: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] Im Auftrag
von John Gilmore
Gesendet: Montag, 9. Juli 2012 15:28
An: IBM-MAIN@LISTSERV.UA.EDU
Betreff: Re: Secure Encryption Keys vs
As a concept, I would copy the first record to a new dataset (using
sort) and expand the record by one character - a blank. In a second
OUTFIL statement I would expand all of the other records by the same
1 character - a blank.
Then I would JOIN the two expanded datasets using the added
Thanks Sam. I did just this over the weekend!
-Original Message-
From: IBM Mainframe Discussion List on behalf of Knutson, Sam
Sent: Mon 7/9/2012 5:13 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: SYNCSORT - Save a data item for use in OUTREC output
Another source for assistance would
Greg,
I can't tell.. was that a correction or clarification?
Rob Schramm
Senior Systems Consultant
Imperium Group
On Mon, Jul 9, 2012 at 10:29 AM, Rob Schramm rob.schr...@gmail.com wrote:
Nope.
It is correct. As is your statement.
The key (no pun intended) is that the protected key
Sorry for the late reply, but can you point to an online copy of the -9 edition
of that manual? Bitsavers has only the -0 and -5 editions, and I can't seem to
find it anywhere on the IBM sites either. Lots of references to it, but no
actual copies.
The replacement manual for the -10 edition,
Well, to quote from POP (for one PCKMO option)
(should be Perform Cryptographic Key Management Operation, btw)
The 8-byte cryptographic key, K, in byte offsets 0-7 of
he parameter block is encrypted using the DEA
wrapping key. (See the section Protection of Crypto-
graphic Key on page 7-339 for
Not that key. The key that will be stored under the wrapping key.
Rob Schramm
Senior Systems Consultant
Imperium Group
On Mon, Jul 9, 2012 at 12:38 PM, David Stokes sto...@interchip.de wrote:
Well, to quote from POP (for one PCKMO option)
(should be Perform Cryptographic Key Management
If I understand correctly what you are asking, that key comes from your
program, which is why it is not an ultimately secure way of doing things.
Although if you are holding the protected key in storage for a communication
session it does reduce the exposure, of course. There's a little
Yep.
By using ICSF plus CEX, and using protected key.. you get more of the
performance characteristics of CPACF but retain the more secure nature of
secure key.
Yes the exposure is less.. but it will always be suspect. Ultimately, the
protected key is dependent on the source key material being
Thank you for the input. The IBM site contains some information. The
site lists 672 titles. The set I am working with contains over 1800
titles.
And, the Windows solution. I am at the mercy of our desktop group for a
workstation configuration. This includes hardware and software.
I still find IBM's Softcopy Librarian, Shelf Organizer and Reader sufficient
and effective.
Dave Gibney
Information Technology Services
Washington State University
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
On Behalf Of Mark Yuhas
Sent:
Effectively, you need both ICSF and a CEX3 to take advantage of Protected Keys.
As was pointed out in another append, you can use the PCKMO instruction to wrap
a key. That is, you would take a clear key and wrap it, creating a protected
key. And as was also pointed out in that post, I'm not
We just brought up z/OS 01.12.00 on one LPAR, up from 01.11.00. I immediately
logged on to ISPF to see if there were any wonderful NEW goodies.
Intense disappointment. :-(
From the ISPF Status Panel
ZOS390RL = z/OS 01.12.00
The z/OS release running on your system.
ZISPFOS = ISPF FOR
The page I gave you is for 1 version of z/OS. Make not include
manuals for additional products. The third part consisting of the 9th
and 10th character change with each published edition, most manuals
have at least one change with every version of z/OS. So if the first
8 match the title
We did not ship any changes for z/OS 1.12. Now if you had jumped to z/OS
1.13 ;-)
Hank, ISPF
From: David Speake david.spe...@bcbssc.com
To: IBM-MAIN@listserv.ua.edu,
Date: 10/07/2012 08:37 AM
Subject:New Goodies in ISPF z/OS 01.12.00 - missing
Sent by:IBM Mainframe
Dear List,
Good Day.
I am trying to Enable RRS facility for a DB2 related stuff. I am using the
below JCL for defining the Logstream :
DATA TYPE(LOGR)
DEFINE LOGSTREAM NAME(ATR.PLEX1.MAIN.UR)
LOWOFFLOAD(60)
HIGHOFFLOAD(80)
DASDONLY(YES)
HLQ(IXGLOGR)
lizette,
Probably I missed saying that I referred the LOOKAT ibm. LOOKAT explanation
says :
*IXG010E* *NO* *SPACE* *IS* *AVAILABLE* *FOR* type *ENTRIES*
*Explanation:* The system logger couple data set defined by the LOGR policy
has no free space for the type of entry you are trying to
20 matches
Mail list logo