On Tue, 18 Jun 2013 16:45:09 -0700, Charles Mills wrote:
... So it would not necessarily be in great a position to steal customer data
itself, but if we were malicious, and conspired with a rogue employee, we
could perhaps jointly steal valuable data.
..., nor how to defeat our keys. ...
Hi all,
Thank you for your answers. Note that I would like to bypass in my REXX the
use of address ISFEXEC or ISFACT. This is because I am not using standard
TSO REXX but OPS/MVS REXX which is not supporting (yet) a host environment
to SDSF.
Kind regards
On 18 June 2013 23:35, Kirk Wolf
Just curious
Has anyone heard about z990 machine 2084 D48 ?
Note, there are (were) models A08, B16, C24 and D32.
IBM just announced end of service for selected machines and mentined
five models of 2084, including the D48 one.
--
Radoslaw Skorupka
Lodz, Poland
--
Treść tej wiadomości
Hi
Any way to simulate the SMS storage class for NON MANAGED datasets?
(Explanation: I would need an SMS SC for PDSE data caching, but the
volumes, with the data, are non SMS managed currently)
--
Kind regards, / Mit freundlichen Grüßen
Miklos Szigetvari
Research Development
ISIS
Yes, sorry about that. Well, the problem probably got fixed ~10 years ago.
Which is better than, say, ~5 years ago.
It is my faded-memory impression that it was, as Timothy pointed
out, DEC's aggressive push of very low-cost and free stuff into
universities that both permitted and accelerated the
Donald,
I use a similar formula us = trunc(smf70wat/4096).
As long as one second = 1.000.000 of us the formula seems to be the very
same ! :D
Best regards.
Massimo Biancucci
2013/6/19 Donald Likens dlik...@infosecinc.com
We do not have SAS (Can you believe it). My real problem is not with
Graham,
The issue is not which version of RDz but rather which version of
Windows. Even with RDz 7.6 the COBOL compiler would not install on
Windows 7. IBM has not made, plus as I understand it, a COBOL compiler
which works on Windows 7. I am in the same position, but do have a
System z
Hi all
I rather try to use JES2 command $djq,q=xeq,busy=no to find out jobs
awaiting in INPUT queue
Thanks in any case
On 19 June 2013 10:20, k Zaf kzafi...@gmail.com wrote:
Hi all,
Thank you for your answers. Note that I would like to bypass in my REXX
the use of address ISFEXEC or
FTP with SITE filetype=JES? Console command is also an option.
ITschak
On Tue, Jun 18, 2013 at 11:35 PM, Kirk Wolf k...@dovetail.com wrote:
You can use the lsjes command:
See: https://www.dovetail.com/docs/coz/dsp-ref_lsjes.html
This could be called from REXX using bpxwunix() or the SH
You can use the XP Virtual Machine under Win 7 for archaic XP applications.
(I'm still running MXG Business on the DOS version of DataFlex,
in the XP Box on Win 7 Ultimate).
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Thomas
The classic business-school analysis of DEC's misfortunes makes them
an instance of the effects of disruptive technology: microprocessors
replacing mnicomputers.
John Gilmore, Ashland, MA 01721 - USA
--
For IBM-MAIN subscribe /
Knowing you are using OPS/MVS would have been very helpful in providing an
answer.
I have always gone to CA OPS/MVS support for questions like this. They have
always provided code when I needed it.
Also, try joining the OPS/MVS Newsgroup at PROTECH
ESMA Listserver
In 7405709421112672.wa.paulgboulderaim@listserv.ua.edu, on
06/17/2013
at 08:37 PM, Paul Gilmartin paulgboul...@aim.com said:
On Mon, 17 Jun 2013 20:30:19 -0400, Shmuel Metz (Seymour J.) wrote:
Will they only offer Perl 5.8.7, or will they offer a more current
Perl?
Did Il cimento
jwgli...@gmail.com (John Gilmore) writes:
The classic business-school analysis of DEC's misfortunes makes them
an instance of the effects of disruptive technology: microprocessors
replacing mnicomputers.
re:
http://www.garlic.com/~lynn/2013h.html#76 DataPower XML Appliance and RACF
Perhaps there is a place for a trusted third party who can audit the
source and issue some sort of assurance that the vendor could then attach.
Of course, this suffers from a number of problems. Such as cost. The need
to get a new certification after every change (or perhaps level set or
release).
I am not too familiar with how to do it, but there is a way to have
CA-OPS/MVS dispatch work into a TSO server address space (ADDRESS TSO,
ADDRESS OSF, ...). I don't know exactly how those work. We have CA-OPS/MVS
and I have some knowledge of it. I may try writing a CA-OPS/MVS rule which
does
In b2200.2d69ddd2.3ef15...@aol.com, on 06/18/2013
at 02:21 AM, Ed Finnell efinnel...@aol.com said:
_GE Hiring Thousands of Engineers to Build Industrial Web -
Businessweek_
(http://www.businessweek.com/news/2013-06-17/ge-hiring-thousands-of-engineers
-to-build-industrial-internet)
The
Do you have File-AID/MVS? It does come with a collection of SMF record layouts
coded in PL/I. Unfortunately, it has not been maintained for some time, but
the layouts are still valid. There is a separate manual for using the layouts.
It's called SMF Record Mapping Reference JES V4. You can
I think in terms of auditing the source code for nefarious operations, there is
a kind of “mutual assured destruction” principle at work here. If a vendor was
so careless with their source code as to allow some kind of scam to be done
with their code, the ensuing scandal would simply ruin that
On Tue, 18 Jun 2013 12:51:14 -0400, August Carideo august.cari...@avon.com
wrote:
Has anyone converted XCF / GRS ( CNC / CTC ) from ESCON to FICON ?
we are looking into this because EC12 has no ESCON thanks to those
Einsteins at IBM
[...]
But this question is really geared towards GRS etc. so
In my experience customers are often less concerned with looking at
source code themselves than they are with its availability after an
ISV, particularly a small one, has ceased to be.
I know of a number of arrangements in which current versions of some
product systematically replace deposited
On Wed, 19 Jun 2013 09:20:37 -0400, Shmuel Metz (Seymour J.) wrote:
Did Il cimento dell'EBCDIC e dell'UNICODE ever get resolved in
Perl?
There's some experimental work, but the Perldela for 5.18 warns that
they will drop the MVS support if nobody is willing to pick up the
ball. I believe that
On 13Jun19:0608-0700, Phil Smith wrote:
This is an interesting dilemma. FWIW, in almost 30
years as a vendor, I've never had anyone ask to see
source code for security reasons. That doesn't mean
it won't happen tomorrow, of course.
I suspect that the general attitude is a synthesis
of the
paulgboul...@aim.com (Paul Gilmartin) writes:
I hate EBCDIC!
old reference that EBCDIC was one of the biggest goofs for 360 ... was
supposed to have been ascii ... EBCDIC and the P-Bit (The Biggest
Computer Goof Ever)
http://www.bobbemer.com/P-BIT.HTM
--
virtualization experience starting
Hi,
We are running Z/os 1.11 in our environment and we use jobtrac for
scheduling the jobs . Some times , we get issues where the jobs fail
with instantly when jobtrac tries to submit it . When checked with CA
, they couldn't tell exactly if this is a problem with Jobtrac or JES2
.The SVC dumps
I would open a case with CA JOBTRAC and send them the dump
Lizette
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of baby eklavya
Sent: Wednesday, June 19, 2013 7:31 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: JES2/Jobtrac - Converter
On 6/19/2013 7:36 AM, John Gilmore wrote:
The classic business-school analysis of DEC's misfortunes makes them
an instance of the effects of disruptive technology: microprocessors
replacing mnicomputers.
That might answer the how, but not the why. I attribute it to bad
management that failed
The GJTRUJV2 in the dump title gives the impression that this is the IEFUJV
exit for CA-Jobtrac. They need to debug it. If this is like other CA
products, you first need to use AMATERSE to create an FB compressed version
of the SYSDUMP data set (SYS1.DUMPnn or dynamically allocated dump dataset,
Without, of course, agreeing with them, I am, again of course,
familiar with Paul Gilmartin's 'I hate EBCDIC' refrain. More
interesting in the question: Do he and that ilk despise UNICODE in
equal measure?
He quotes Shmuel's question
| Did Il cimento dell'EBCDIC e dell'UNICODE ever get
|
Why would anybody who likes ASCII despise UNICODE? I could easily be
confused, but US-ASCII is a proper subset of UNICODE. In particular, of
UTF-8. Unless I have misunderstood everything I've ever read about Unicode.
And both are close, but not identical(?), to ISO8859-1. I normally tag
z/OS UNIX
On Wed, 19 Jun 2013 08:26:39 -0500, John McKown wrote:
I am not too familiar with how to do it, but there is a way to have
CA-OPS/MVS dispatch work into a TSO server address space (ADDRESS TSO,
ADDRESS OSF, ...). I don't know exactly how those work. We have CA-OPS/MVS
and I have some knowledge of
Thanks Lizette and John for the response .
Actually , i had already sent the dumps to CA but they couldn't figure
out the exact reason . But they suspect that Jobtrac post converter
error message is caused as when many jobs are submitted at the same
time, then it can happen that message
I don't get my own postings. I see other people's postings, I see their
answers to my postings, so my postings do reach the listserv, and are
not rejected. My mailserver look not guilty as well, because I see
other postings.
Now I changed one setting: from NOACK REPRO to ACK NOREPRO.
--
In that same announcement, IBM also announced discontinuance of maintenance
for
9032 003
9032 005
9037 002
Good thing we are considering starting a migration to CECs that support STP!
Dana
--
For IBM-MAIN subscribe /
Right, but a very different issue.
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of John Gilmore
Sent: Wednesday, June 19, 2013 6:58 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Auditing vendor source code
In my experience
Thomas, Barry,
Sorry to bother you again. Any chance you think/know that RDz 7.6 would run
under XP virtual machine? If I downloaded/installed 7.6 (from SAC) do you
think IBM may have removed the COBOL compiler?
Cheers,
Graham
- Original Message -
From: Thomas Dunlap
On Wed, 19 Jun 2013 10:36:59 -0400, Gerhard Postpischil wrote:
... Ultimately I blame
Ken Olsen: There is no reason for any individual to have a computer in
his home. (2) As a glaring example of this. DEC marketed three
distinct lines of PCs, all failures.
He was only trying to prove his
You are correct.
There is security by obscurity at work here, no question:
- If a rogue employee had our listings and link maps he might well be able to
patch our code to not do its job in certain circumstances, thereby creating a
security exposure (assuming he had write access to the load
W dniu 2013-06-19 17:r37, Dana Mitchell pisze:
In that same announcement, IBM also announced discontinuance of maintenance for
9032 003
9032 005
9037 002
Good thing we are considering starting a migration to CECs that support STP!
Well, that would mean you are using pre-z/990 machines, are
Did anyone notice that z890's (2086) were left out of the list?
CIT | Ken Porowski | VP Mainframe Engineering | Information Technology | +1 973
740 5459 (tel) | ken.porow...@cit.com
This email message and any accompanying materials may contain proprietary,
privileged and confidential
On Wed, 19 Jun 2013 08:42:10 -0700, Charles Mills wrote:
- ... (assuming he had write access to the load library, or to protected
memory).
Il va sans dire.
- Our key (licensing, whatever you want to call it) is definitely
protection by obscurity. If you knew exactly how it worked, you could
Charles Mills wrote:
Our key (licensing, whatever you want to call it) is definitely protection
by obscurity. If you knew exactly how it worked, you could defeat it, and run
our product forever on every mainframe in the world.
So this is a slightly different topic, but it's been my experience
Perhaps the simplest way would be to somehow have an entire subroutine
encrypted. The subroutine would be self relocating in order to avoid
address constants. The encryption key would be somehow tied to the CPUID
and the date. When you get a new key, you also get a new encrypted
subroutine. The
In 5068302466122345.wa.kzafiropgmail@listserv.ua.edu, on
06/18/2013
at 09:17 AM, K kzafi...@gmail.com said:
Could I retrieve Jobs and their jobids of JES2 input queue though
REXX but WITHOUT use of SDSF.
In theory, yes, but you'd have to use job names of userid plus one
character, which
In 099ee5bc-1948-4595-96ce-5115309e9...@yahoo.com, on 06/18/2013
at 08:30 PM, Scott Ford scott_j_f...@yahoo.com said:
We don't worry about we have customers who sign NDAs ...but I am old
school I resist providing source code,
That's not old school; old school is we don't provide object code -
In 51c127d4.6020...@blackhillsoftware.com, on 06/19/2013
at 01:39 PM, Andrew Rowley and...@blackhillsoftware.com said:
How many vendors do allow you to audit their authorized code? I know
IBM is very reluctant to divulge any information that might allow
you to exploit a vulnerability.
Until
In
b870629719727b4ba82a6c06a31c291239e0e0c...@hqmailsvr01.voltage.com,
on 06/19/2013
at 06:08 AM, Phil Smith p...@voltage.com said:
I suspect that the general attitude is a synthesis of the comments
here:
A few more possibilities:
- Customers may lack the resources to audit every
In
985915eee6984740ae93f8495c624c6c231975f...@jscpcwexmaa1.bsg.ad.adp.com,
on 06/18/2013
at 10:24 AM, Farley, Peter x23353 peter.far...@broadridge.com
said:
It is my faded-memory impression that it was, as Timothy pointed out,
DEC's aggressive push of very low-cost and free stuff into
On 6/19/2013 7:53 AM, Shmuel Metz (Seymour J.) wrote:
In 5068302466122345.wa.kzafiropgmail@listserv.ua.edu, on
06/18/2013
at 09:17 AM, K kzafi...@gmail.com said:
Could I retrieve Jobs and their jobids of JES2 input queue though
REXX but WITHOUT use of SDSF.
In theory, yes, but you'd
Ed,
this is what i suggested - using ftp. The only problem is that if you use
ISFPARMS for securing jes resources, you are in trouble. RACF must be in
place for FTP (or any other non SDSF interface.
ITschak
On Wed, Jun 19, 2013 at 7:49 PM, Ed Jaffe edja...@phoenixsoftware.comwrote:
On
Graham,
I believe RDz 7.6 does include the COBOL compiler, even 8.0 does. You
just have to install and run on XP Pro. I have not tried what Barry
mentions, running XP compatible virtual process under Windows 7. I have
a co-worker that used it for awhile with mixed results, some things
On Wed, 19 Jun 2013 09:17:09 -0700, Phil Smith wrote:
So this is a slightly different topic, but it's been my experience that CPUIDs
(keys, whatever you want to call 'em) are more trouble than they're worth.
Any sysprog worth his salary can break them in minutes if desired; the hassles
at the
Paul Gilmartin wrote:
Apparently. I've held the same job for three different employers
through corporate acquisitions. The latest one required that we
scrub all our keys, forthwith,
I'm sorry, I must be dense-I don't understand what this means. The keys were
dirty? :) Seriously, what did they
On 6/19/2013 9:17 AM, Phil Smith wrote:
So this is a slightly different topic, but it's been my experience
that CPUIDs (keys, whatever you want to call 'em) are more trouble
than they're worth.
We once had a situation in which a foreign distributor had numerous
off-book customers using our
On Wed, 19 Jun 2013 17:49:36 +0200, R.S. r.skoru...@bremultibank.com.pl wrote:
Good thing we are considering starting a migration to CECs that support STP!
Well, that would mean you are using pre-z/990 machines, are you?
Currently on z9's without STP installed.
Dana
shmuel+...@patriot.net (Shmuel Metz , Seymour J.) writes:
It didn't help that the MVS address space was painfully small compared
to the VAX. It wasn't until MVS/ESA that IBM caught up.
re:
http://www.garlic.com/~lynn/2013h.html#76 DataPower XML Appliance and RACF
On Wed, Jun 19, 2013 at 8:22 AM, John McKown
john.archie.mck...@gmail.com wrote:
Perhaps there is a place for a trusted third party who can audit the
source and issue some sort of assurance that the vendor could then attach.
Of course, this suffers from a number of problems. Such as cost. The
Ed Jaffe wrote:
We once had a situation in which a foreign distributor had numerous off-book
customers using our software illegally. It's not clear whether the customers
actually realized they were pirating the software. In any case, the
implementation of so-called keys put a stop to all
This was true in DOS 6.X. The object modules would be loaded into
memory, and the first thing the program would do was decompress the
rest of the module into another memory area and run from there. This
was when software to compress DOS disks was becoming popular. But it
would run on any PC.
On Wed, 19 Jun 2013 11:01:20 -0700, Phil Smith wrote:
I'm sorry, I must be dense-I don't understand what this means. The keys were
dirty? :) Seriously, what did they have you do with them?
I took a verbal shortcut. I should have said we had to scrub all our
software to cleanse away the filthy
Exactly. We had one of those at my last company. Distributor stole *a
little* from us by selling off-book features that were not key controlled.
Same distributor stole over $1MM from a small software company where that
might have been a 20-30% increase in their sales. He was able to do it
because
On Wed, 19 Jun 2013 15:00:00 -0500, Mike Schwab wrote:
Marketing your product through IBM Partner World is essential a seal
of approval from IBM.
Is it really?
They have at least tested it and should be able to find any problems
with the product that a customer reports.
Who has? IBM?
--
Tom
I wondered about those assertions ...
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Tom Marchant
Sent: Wednesday, June 19, 2013 2:24 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Auditing vendor source code
On Wed, 19 Jun
Tom Marchant wrote:
Marketing your product through IBM Partner World is essential a seal
of approval from IBM.
Is it really?
Um, no. Well...maybe some customers see it as such, but they should know better.
They have at least tested it and should be able to find any problems
with the product
...which will of course lead to controversy! ;)
--
Regards, Gord Tomlin
Action Software International
(a division of Mazda Computer Corporation)
Tel: (905) 470-7113, Fax: (905) 470-6507
On 2013-06-19 17:34, Gord Tomlin wrote:
Did you try adding the userid and password to the job card?
--
On Wed, 19 Jun 2013 14:34:25 -0700, Phil Smith wrote:
They have at least tested it and should be able to find any problems
with the product that a customer reports.
Who has? IBM?
Again, no. IBM doesn't test products before letting vendors list them on PWD!
Even the App Store claims to do
On Wed, 19 Jun 2013 17:34:17 -0400, Gord Tomlin wrote:
Did you try adding the userid and password to the job card?
It might be that the OP's desire is that the TMP run under a user ID
different from the parent job's, not that the parent job be constrained
to run under the user ID intended for
Thanks. Solved the problem. I'm good.
Believe it or not I've never in 44 years of MVS used JOB USER= before that I
recall.
Addressing various issues:
- Mmm, yes, I can see why coding the password on the JOB card could be
controversial. :-(
- True, this is an answer to a different question but
On 6/19/2013 2:34 PM, Gord Tomlin wrote:
Did you try adding the userid and password to the job card?
Best to add USER= only and use SURROGAT authority (RACF term, substitute
appropriate OEM security product term as needed) rather than specifying
a password in the clear.
--
Edward E Jaffe
You don't need to put the password on the job card if you have SURROGAT access
to the required userid.
Darn, I see Ed beat me to this. :)
Dave Gibney
Information Technology Services
Washington State University
-Original Message-
From: IBM Mainframe Discussion List
On 6/19/2013 11:14 AM, John Gilmore wrote:
Retreat from the unfamiliar, back into the familiar, is common. I
suspect that we are all guilty of it from time to time; and terms like
'good management' and 'bad management' describe outcomes without being
diagnostic.
Unless one is in the
Thanks. Will look into that.
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Gibney, Dave
Sent: Wednesday, June 19, 2013 3:13 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Run TSO batch as different user?
You don't need to put
Most job scheduler programs can assign other user IDs and authenticate them.
On Wed, Jun 19, 2013 at 5:08 PM, Charles Mills charl...@mcn.org wrote:
Thanks. Solved the problem. I'm good.
Believe it or not I've never in 44 years of MVS used JOB USER= before that I
recall.
deleted
W dniu 2013-06-19 20:23, Dana Mitchell pisze:
On Wed, 19 Jun 2013 17:49:36 +0200, R.S. r.skoru...@bremultibank.com.pl wrote:
Good thing we are considering starting a migration to CECs that support STP!
Well, that would mean you are using pre-z/990 machines, are you?
Currently on z9's without
The opportunity to do any upgrade whatever on z9 or even z10 has long
expired. If you could afford to buy your way out of this problem, you
could afford fresh iron. ;-)
.
.
JO.Skip Robinson
Southern California Edison Company
Electric Dragon Team Paddler
SHARE MVS Program Co-Manager
I am trying to understand if it is possible to have 2 different UJV exits
active at the same time , one for Jobtrac scheduled jobs and the other one
for all other jobs submitted to JES2 . If that's the case , then Jobtrac
should be probably passing/setting a flag to use GJTRUJV2 before the job is
Another good suggestion. Will do some investigating, so thanks Thomas
and Barry.
Graham
Ruminating only: being smallfry, what use then is RDz/TXSeries if a
mainframe is a must.
On 19/06/2013 1:26 PM, Thomas Dunlap wrote:
Graham,
I believe RDz 7.6 does include the COBOL compiler, even 8.0
John:
I would be extremely reluctant to buy any such product.
In one place I worked the serial numbers changed continuously
(monthly) and we had one or two vendors that stuck it to us because
of a bad key they sent and we literally had to back out of CPU
upgrades because they didn't have
On 6/19/2013 10:31 AM, baby eklavya wrote:
Hi,
We are running Z/os 1.11 in our environment and we use jobtrac for
scheduling the jobs . Some times , we get issues where the jobs fail
with instantly when jobtrac tries to submit it . When checked with CA
, they couldn't tell exactly if this is a
In 51c1e12f.7000...@phoenixsoftware.com, on 06/19/2013
at 09:49 AM, Ed Jaffe edja...@phoenixsoftware.com said:
JES3 customers have long used the following:
++SRCUPD(IATUX30) .
./ CHANGE NAME=IATUX30
UX30SETB 1
to replace IKJEFF53 with IATUX30 for FIB security processing. JES2
has no
In
b870629719727b4ba82a6c06a31c291239e0e0c...@hqmailsvr01.voltage.com,
on 06/19/2013
at 09:17 AM, Phil Smith p...@voltage.com said:
So this is a slightly different topic, but it's been my experience
that CPUIDs (keys, whatever you want to call 'em) are more trouble
than they're worth.
καινός means 'new'; and kaino[lo]phobia, fear of the new, probably
figures in most such problems; but attachment to the successful old is
usually more important; and this attachment is often crucial when the
successful old was in its time innovative.
DEC technology, once itself disruptive,
Why would you expect that to work?
Because IKJEFT01 accepts TSO commands, and LOGON is the TSO command that I
would use if I were in a TSO session and wanted to run as a different user.
Why do you ask?
Charles
-Original Message-
From: IBM Mainframe Discussion List
LOGON/LOGOFF are one and the same TSO command.
Within the running TMP of a foreground TSO address space, LOGON will actually
terminate (ie. LOGOFF) that instance of the TMP (and address space) and queue
the LOGON command to create a new foreground TSO address space.
Batch address spaces
Mike:
That might work for small ISV's but companies like CA would not go
for it as they slice and dice prices to get a sale.
Ed
On Jun 19, 2013, at 3:00 PM, Mike Schwab wrote:
On Wed, Jun 19, 2013 at 8:22 AM, John McKown
john.archie.mck...@gmail.com wrote:
Perhaps there is a place for a
85 matches
Mail list logo