.
If you are in an environment that may have XTIOTs, your best bet is to
run the DSAB ANY chain and use DSABTIOT as a pointer to the TIOT entry
for that DSAB.
Steve Jones
z/OS MVS Allocation
s...@us.ibm.com
--
For IBM-MAIN subscribe
or some utility, such as IDCAMS,) you are considered
to have exclusive control.
I will add that when this exclusive control is obtained for a dynamic
allocation request, it will not be downgraded again in a later
step. It will be released when the last step that uses the data
set completes.
Steve J
.
CYBERARCH and Centrify do well on some things but they don’t talk.
Any information would be greatly appreciated.
Steve
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu
Just as an "Oh by the way". What are you running that needs so much time?
Steve
-Original Message-
From: "Jesse 1 Robinson" <jesse1.robin...@sce.com>
Sent: Tuesday, September 13, 2016 12:35pm
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Bypassing s322
The us
Dave - You can't fix mishaps except thru knowledge
-Original Message-
From: "Jousma, David" <david.jou...@53.com>
Sent: Tuesday, September 13, 2016 1:08pm
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: IDCAMs DEF AIX authorization
Steve, the user tried to do the build i
ist [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Jousma, David
Sent: Tuesday, September 13, 2016 9:49 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: IDCAMs DEF AIX authorization
Steve,
That’s what I am seeing, and IBM just confirmed it. I guess all we can do is
give the contractor a slap on
Is anyone in the real not government world using this product?
[ https://software.dell.com/products/defender-mainframe-edition/ ](
https://software.dell.com/products/defender-mainframe-edition/ )
Steve
--
For IBM-MAIN
I have never been a real fan of EMC. I much prefer HDS G1000 class DASD using
HUR, that is much, much easier to handle from ISPF for PPRC/XRC that CLI from a
Windows open window
Steve
-Original Message-
From: "Scott Chapman" <scott.chap...@epstrategies.com>
NC-Pass was purchased some time ago by Dell, and I don't remember who wrote itt
Steve
-Original Message-
From: "Vince Coen" <vbc...@gmail.com>
Sent: Tuesday, September 13, 2016 1:23pm
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: 2FA in the Real World
Fo
TCBJSTCB field of the TCB data area (jobstep TCB)
-Original Message-
From: "Rupert Reynolds"
Sent: Wednesday, September 14, 2016 11:42am
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: What is the STCB?
Related to this, does anyone have a scan of a big control block
Issue a D M=(CPU) and the will give you what the system knows about your box
-Original Message-
From: "Adams, Anne (DTI)"
Sent: Wednesday, September 14, 2016 12:04pm
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: serial numbers ... real and imagine
Hello friends,
Must of us have too many ethics to violate anything associated with M/F
Licensing
Steve
-Original Message-
From: "Dana Mitchell" <mitchd...@gmail.com>
Sent: Wednesday, September 14, 2016 2:55pm
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: serial numbers ... real and
DR drills and testing are always free. It part of the license agreement. Its
for a finite time
like 2 to 3 weeks
For CA products you will have to provide license support with the type-model
and serial number
and they will send you the keys before hand
Steve
-Original Message
About the only way is to pull out the exit or add a FASTAUTH for some widget
Steve
-Original Message-
From: "John McKown" <john.archie.mck...@gmail.com>
Sent: Tuesday, September 13, 2016 9:19am
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Bypassing s322
Have you
AS I remember, DEF AIX and PATH only operate in the CAT. The BLX would to the
extract to the AIX
-Original Message-
From: "Jousma, David"
Sent: Tuesday, September 13, 2016 9:19am
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: IDCAMs DEF AIX authorization
All,
I've got a
Why not put it MLPA if its being called thousands of times a day?
Steve Beaver
st...@stevebeaver.com
Office : 806-368-3859
Cell : 806-300-9481
This electronic mail (including any attachments) may contain
to bring up zVM and then instantiate 16 zOS guests. One
that is done, place the box in a co-lo facility and that could be a subscriber
service at about $800 per year or so
Steve Beaver
This electronic mail
[ http://www.redbooks.ibm.com/redbooks/pdfs/sg247436.pdf ](
http://www.redbooks.ibm.com/redbooks/pdfs/sg247436.pdf )
Steve Beaver
st...@stevebeaver.com
This electronic mail (including any attachments) may
z/VSE has no catalogues as you know them, the JCL is not near as complex or
flexible, cobol is cobol HLASM is not there but BAL is. There are not a great
number f program products for z/VSE
Steve Beaver
st...@stevebeaver.com
.
If you are a PP Developer that is pennies. If you want to have a leaning LPAR
for 5 People, that would be about $350 for ILC and $85 for the yearly licenses
Steve Beaver
st...@stevebeaver.com
This electronic mail
Why not TERSE the file before you send it?
Steve Beaver
st...@stevebeaver.com
This electronic mail (including any attachments) may contain information that
is privileged, confidential, and/or otherwise
Threw out this whole thread I have not seen a "snippet" of the offending code.
But there had been a lot of theoretical discussion.
Steve
-Original Message-
From: "Gibney, Dave" <gib...@wsu.edu>
Sent: Thursday, September 15, 2016 3:43pm
To: IBM-MAIN@L
You might look at z/OSMF but don't be fooled, it will take you a while to get up
Steve Beaver
st...@stevebeaver.com
This electronic mail (including any attachments) may contain information that
is privileged
Lionel Dyck did it on our 2.2. system here at the VA.
His assessment was that it was not worth it except as a excercise
Steve Beaver
st...@stevebeaver.com
This electronic mail (including any attachments) may
Good Afternoon all,
Is anyone in the group using CyberArk to control access to the Mainframe
including the HMC?
Steve
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists
Once we have CyberArk being a useful tool, all daily work will be done with
TN3270 under CyberArk. That will not happen for a while but it is coming.
Welcome to how the FED is going to work and you MUST have a CAC/PIV to even get
through the firewalls
Steve Beaver
0
pushing them on Linux is useless.
We also user SmartCards with 6 digit pins. Unless you have that, your are
looking at MAJOR Dollars to get that in-place and implement for 2FA
Steve Beaver
This electronic mail
Part 2 of the Story is that once all the bugs are fix/ironed out, ANYONE with a
privileged USERID ID will have to LOGON Using CyberArk just to do their daily
work. This includes SECURITY, and SYSPROGS
Steve Beaver
to placate the auditors
Thanks all
Steve
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Thanks Walt
Steve Beaver
st...@stevebeaver.com
This electronic mail (including any attachments) may contain information that
is privileged, confidential, and/or otherwise protected from disclosure to
anyone
If you look at equipment resellers, you can get a 35 MIP z10 for next to
nothing. You still need storage and communications and software like CICS and
power
Steve Beaver
-Original Message-
From: "Bigendian Smalls" <mainfr...@bigendiansmalls.com>
Sent: Friday, Dec
customers Capacity on Demand.
Add an engine and you added another 5.4Ghz processor and off you go
Steve Beaver
st...@stevebeaver.com
This electronic mail (including any attachments) may contain i
One way would be to use ADRDSSU to dump the files, The TERSE the output then
FTP in BINARY to your PC then put it into DROPBOX
Steve Beaver
st...@stevebeaver.com
This electronic mail (including any
Look a the SMF 32 records
Steve Beaver
st...@stevebeaver.com
This electronic mail (including any attachments) may contain information that
is privileged, confidential, and/or otherwise protected from
One point of order. If are getting **OTHER, you are going to have to update
IEEMB846 to
add the COMMAND you are looking to trap/monitor
Steve Beaver
st...@stevebeaver.com
This electronic mail (including any
Sometime back Mantissa.com was attempting to write what I would term a thin
translation layer such that Microsoft based products could be run Under Linux,
under zVM.
Does anyone know if that product went anywhere?
Steve Beaver
ACF2 does have a MUSASS attribute that is tied to the LID. Some APPS like CICS
will Require it
Steve Beaver
st...@stevebeaver.com
This electronic mail (including any attachments) may contain information
Are they going to do Silver Taps for him?
Steve Beaver
This electronic mail (including any attachments) may contain information that
is privileged, confidential, and/or otherwise protected from disclosure
Do you have the IEF043I joblog message and the SMFLIMxx rules that you
could post? Along with whatever messages you get for the refusal to run...
- Steve
On 8/17/2017 1:03 PM, Adams, Anne , DTI wrote:
Hello Friends,
Has anyone had any success using (or diagnosing failures) when using
Hello,
Kees, sorry for the delay in answering:
>You say: "Note that SMFLIMxx REGIONBELOW/REGIONABOVE are *not* related
to the IEFUSI's "region size" parameter"
>Am I correct to state that SMFLIMxx REGIONBELOW/REGIONABOVE are equal
to IEFUSI setting a Regionsize=Regionlimit both below and
you're talking
about. The only caveat is your later release COBOL
program can't use any services introduced after your
earlier release of LE, which seems reasonable.
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* To get a good Return
with the message: INFO IBM-MAIN
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* To get a good Return on your Investment, first make an investment!
+ Training your people is an excellent investment
* Try our tool for calculating your
to Unicode line
drawing characters in the clipboard so they paste properly. Screen printing may
do the same thing. I do not know if you can get PCOMM to covert those prior to
pasting.
Steve Bireley
Rocket Software
BlueZone and Passsport Terminal Emulation
BlueZone Secure FTP is Free
Sent from
and I
was fortunate to meet and know him.
Mohammad
I'm really sorry to hear that. He was a good person to have on the list.
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* To get a good Return on your Investment, first make
On 7/5/2012 8:19 AM, Alan Altmark wrote:
On Tue, 3 Jul 2012 08:25:09 -0400, Shmuel Metz (Seymour J.)
shmuel+...@patriot.net wrote:
Steve Bireley sbire...@rocketsoftware.com said:
True that they are not unique to APL and is a code page issue.
However, some of the lines drawn on 3270 screens
snippits about this. Is there any believable
source for the story?
In a message dated 7/7/2012 5:05:19 P.M. Central Daylight Time,
scott_j_f...@yahoo.com writes:
Has anyone has messages disappear when the sent them to the listserv ?
--
Kind regards,
-Steve Comstock
The Trainer's Friend
and the LE books does
not help.
Charles
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Steve Comstock
Sent: Friday, July 13, 2012 10:26 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Relationship of C signals to z/OS terminology?
On 7/13/2012 9
-PACKED
What is the purpose of the ZAP?
Thanks,
Frank
-
- For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO
IBM-MAIN
--
Kind regards,
-Steve
regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* Special promotion: 15% off on all DB2 training classes
scheduled by September 1, taught by year end 2011
* Check out our entire DB2 curriculum at:
http://www.trainersfriend.com
On 7/17/2012 10:33 AM, Paul Gilmartin wrote:
On Tue, 17 Jul 2012 09:26:39 -0600, Steve Comstock wrote:
You're not the only one. I have found that _one_ underscore before
and after a word displays as underline on many (most? all?)
mail clients. So I use that underline as an emphasis while still
On 7/17/2012 3:08 PM, Paul Gilmartin wrote:
Just curious.
Once a JCL symbol has been set, is there any way subsequently
to restore it to exactly the state and behavior it had before it
was set?
-- gil
Use nested procs.
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355
much credit.
Steve Bireley
Managing Director
Research and Development
Rocket Software
70 Main St., Suite 51 • Warrenton, VA 20186 • USA
Tel: +1.404.364.1731 • Mobile: +1.571.216.3530
Email: sbire...@rocketsoftware.com
Web: www.rocketsoftware.com
-Original Message-
From: IBM Mainframe
as a
command line switch. The online help has the information about how to use
those features.
It works well with the Z/OS files system and has support for the CO:Z SSH Server
You can email me off the list if you have any questions.
Best regards,
Steve Bireley
Managing Director
Research
.
-- gil
Paul,
I never saw an answer from you regarding my question for some examples
of how other non-primitive OS's provide a simple way a program can
protect its storage from meddling by others
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http
On 7/31/2012 9:27 AM, Paul Gilmartin wrote:
Storage protection in other OSes:
On Mon, 30 Jul 2012 22:09:07 -0600, Steve Comstock wrote:
Sigh. I keep forgetting (wishful thinking?) what a primitive OS z/OS is;
that it provides no simple way a program can protect its storage from
meddling
On 7/31/2012 10:56 AM, Paul Gilmartin wrote:
What about TSO?
On Jul 31, 2012, at 10:17, Steve Comstock wrote:
We're both familiar with UNIX, which classically runs each process in
a separate address space. How much simpler or more effective
could it be? Likewise z/VM.
Yes, well, each
the of the records it already processed .
Thanks,
Ron T
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* To get a good Return on your Investment, first make an investment!
+ Training your people is an excellent investment
* Try
: 540.456.6658
Email : fr...@colesoft.com
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* To get a good Return on your Investment, first make an investment!
+ Training your people is an excellent investment
* Try our tool
Mike Ward posted:
Way back when, we used to call a memory leak something else on the
mainframe. I have used memory leak for so long I forgot what that term
was.
I think I remember hearing storage creep.
Cheers,,,Steve
Steven F. Conway, CISSP
LA Systems
z/OS Systems Support
Phone
Don't Know Squat!
Sent by:IBM Mainframe Discussion List IBM-MAIN@LISTSERV.UA.EDU
Yep, zMan and Steve I remember storage creep, was it CICS ?
Scott ford
www.identityforge.com
On Aug 17, 2012, at 2:38 PM, zMan zedgarhoo...@gmail.com wrote:
On Fri, Aug 17, 2012 at 11:35 AM, Steve Conway
licensing
(instead of per device), and tolerance of flakey cell-based connectivity
because the protocol is HTTP instead of telnet.
Steve Bireley
Managing Director
Research and Development
Rocket Software
70 Main St., Suite 51 • Warrenton, VA 20186 • USA
Tel: +1.404.364.1731 • Mobile
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* To get a good Return on your Investment, first make an investment!
+ Training your people is an excellent investment
* Try our
On 8/31/2012 6:35 PM, Steve Comstock wrote:
On 8/31/2012 3:26 PM, Frank Swarbrick wrote:
If you use CEEMSG to write an LE condition code message you'll get a
nicelyformatted and indented message such as this (ignoring the fact
that the message itself is just random characters):
UFB0001I
be causing this?
Thanks
Steve
This e-mail message has been scanned and cleared by Postini / Google Message
Security and the UNICOM Global security systems. This message is for the named
person's use only. If you receive this message in error, please delete it and
notify the sender
An email to you got bounced back again.
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* To get a good Return on your Investment, first make an investment!
+ Training your people is an excellent investment
* Try our tool
the SYSLOG, or OPERLOG from z/OS 1.13 on,
and use SDSB to read the lines. This works for SYSLOG.
Thanks again
Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Lizette Koehler
Sent: 03 September 2012 15:05
To: IBM-MAIN
://www.trainersfriend.com/SpecialSale
or drop me a line or give me a call!
But act fast. Start the requisition process as soon as you can
to take advantage of this one time offer!
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
you a file of nothing but the directory blocks.
I do things like this with RECFM=U and specify DUMP so that I can get a
dump of directory blocks when I am trying to figure out some problem with
a directory after I have hosed it with a bad STOW or some such.
Regards,
Steve Thompson
Staff Software
driven by the enormous cluster
supercomputer operations ... the other platforms are providing further
pathlength reduction and elimination of buffer copies ... being able to
do direct application transfers.
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http
Chag Sameach.
[In English, Feast of Trumpets]
I'm not Jewish, but I do observe.
Obviously I will not be in the office tomorrow.
Regards,
Steve Thompson
Staff Software Engineer
Connect:Direct for z/OS
IBM - Software Group
(469) 647-7135
Tie Line: 968-7135
sthomp...@us.ibm.com
/WriteExcel.pm
--Steve
Dovetailed Technologies
www.dovetail.com
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
that you want.
--Steve
Dovetailed Technologies
www.dovetail.com
On Mon, Sep 17, 2012 at 12:00 PM, Scott Ford scott_j_f...@yahoo.com wrote:
Excellent, what version of Perl is supported on Unix System Services, v5 ?
Scott ford
www.identityforge.com
On Sep 17, 2012, at 11:52 AM, Steve Goetze goe
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* Check out our sale of training materials at
http://www.trainersfriend.com/SpecialSale/
(sale absolutely ends 19 October
is really worth.
Could be lots, could be nothing.
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* Check out our sale of training materials at
http://www.trainersfriend.com/SpecialSale/
(sale absolutely ends 19 October, 2012)
* Let us
doesn't meet your needs use IARCP64?
The IARST64 service is not referenced at all in the
Assembler Services Guide doc.
Can anyone enlighten me about the function / purpose of IARST64?
Thanks.
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
so too.
APPC, like LOGON, MOUNT and START, used JCL.
So, like there is no JCL for START, there is none for MOUNT
either.
Huh? Both MOUNT and START use JCL.
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* Check out our sale
,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* Check out our sale of training materials at
http://www.trainersfriend.com/SpecialSale/
(sale absolutely ends 19 October, 2012)
* Let us know if you are interested in our
training materials reseller
supported HSM before? :-) (Always been in places
with FDR, or had a separate team doing storage stuff for the past 20
years or so.)
Cheers,,,Steve
Steven F. Conway, CISSP
LA Systems
z/OS Systems Support
Phone: 703.295.1926
steve_con...@ao.uscourts.gov
From: Staller, Allan allan.stal
/C500O.htm
This is one of the 35 courses included in our sale
of training kits (see my signature lines for a link),
and indicative of how hard we work to keep our
courses as current and complete as possible.
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http
Thanks to all respondents. A big thanks to Richard for the suggestions.
At this point, my management is concerned about changing anything because
there must be a reason it's set this way.
Cheers,,,Steve
Steven F. Conway, CISSP
LA Systems
z/OS Systems Support
Phone: 703.295.1926
steve_con
Interesting thought, Elardus, but I'm just going to leave it alone for
now.
It's not like I don't have anything to keep me busy. :-)
Cheers,,,Steve
Steven F. Conway, CISSP
LA Systems
z/OS Systems Support
Phone: 703.295.1926
steve_con...@ao.uscourts.gov
From: Elardus Engelbrecht
Hi, Michael.
Not that I know of. Where would that commonly be specified?
Cheers,,,Steve
Steven F. Conway, CISSP
LA Systems
z/OS Systems Support
Phone: 703.295.1926
steve_con...@ao.uscourts.gov
From: Michael Wickman mwick...@waddell.com
To: IBM-MAIN@LISTSERV.UA.EDU
Date: 09/25/2012
I too have a desire for this same information! I started chasing down
(published) IKJ* data areas for when I sub a job in ISPF, but know and
understand this will fall short when a job is submitted outside of TSO. I'm
hoping a positive answer is provided!
On Sep 27, 2012 2:51 PM, Smith, Sean M
review the conversion rules involved
here. They are admirably consistent, but they violate most people's
notions of minimal surprise.
John Gilmore, Ashland, MA 01721 - USA
Excellent point, John.
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http
to crypto hardware , like RSA/DSA (Using
crypto express cards) and AES/DES using CPACF
And some people consider it a waste of good cpu time to encrypt both the data
and the connection
Steve Finch
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU
is encrypted
with PGP
RSA encryption does use CEX2 crypto hardware in Accelerator mode (CEX2A) . The
PGP encryption keys are encrypted with RSA
Steve Finch
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf
Of Jim Mooney
Sent: Wednesday
, Ctrl-L gets you back
in. I never see a scroll bar. I don't expect to see a scroll bar.
All this is explained on page 3 of the A brief look at our approach
to teaching (HowToTeachOurCourses.pdf).
Does that answer your question?
- Original Message - From: Steve Comstock st
On 10/14/2012 10:46 PM, Ravi Kumar.C.Gowda wrote:
Hi Steve.. Dont you have course materials for zOS systems stuff such as
Rexx programming.. Sysplex.. IPCS and things like that.. Appreciate ur
response if u have any of these. Thanks
Sorry. We focus on applications programmers. Some of our
regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* To get a good Return on your Investment, first make an investment!
+ Training your people is an excellent investment
* Try our tool for calculating your Return On Investment
for training dollars
as to have the
best new chapter of the book.
Just a thought...
Ummm. There are copyright laws, ya' know.
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* To get a good Return on your Investment, first make an investment!
+ Training
On 10/29/2012 10:26 AM, Steve Comstock wrote:
On 10/29/2012 8:23 AM, scott wrote:
On 10/25/2012 07:35 PM, Lindy Mayfield wrote:
SNIPPAGE
Ummm. There are copyright laws, ya' know.
Do they not expire after 25 years?
SNIPPAGE
Because of the Mickey Mouse [Disney] laws (yes, this is what
the message and any
attachments from your system.
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
--
Kind regards,
-Steve Comstock
yourself.
/ad
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
* To get a good Return on your Investment, first make an investment!
+ Training your people is an excellent investment
* Try our tool for calculating your Return
On 11/6/2012 8:04 AM, Sérgio Lima Costa wrote:
Steve,
First, thanks very much for your help.
I Will speak with the development here, and next let you know.
If you come to Brazil, Will be Wellcome.
Great. Spent my 50th birthday with friends (one
of whom is Brazilian) at Igaszu Falls, Rio de
is wrong -- where
enclosed in apostrophes.
This is also how you can access OLD data set names on VSE on DASD that is
shared with MVS. E.g., DSN='PAYROLL 080925
DETAILS',VOL=SER=VSE000,UNIT=3380
Dunno if z/VSE still allows a DLBL to specify such non-standard data set
names.
Regards,
Steve
Communication in z/OS we include
some discussion on how to pass and receive a varying number of
parameters / arguments in Assembler, COBOL, PL/I, and C. See:
http://www.trainersfriend.com/Language_Environment_courses/m520descr.htm
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc
On 10/2/2013 10:47 AM, Roberts, John J wrote:
This is of course for a COBOL BATCH MAIN program.
Whar do you mean by 'This'? Are you refering to your original
question or to the answer below?
-Steve
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN
+1
Steven F. Conway, CISSP
LA Systems
z/OS Systems Support
Phone: 703.295.1926
steve_con...@ao.uscourts.gov
From: Shane Ginnane ibm-m...@tpg.com.au
To: IBM-MAIN@LISTSERV.UA.EDU
Date: 10/03/2013 08:59 AM
Subject:Re: FRR Recovery Routine Environment
Sent by:IBM Mainframe
a career ending event for the people
involved, and possibly their managers. Then take into account the
business impact.
It's not that we don't want to play with the shiny new toys. Living in
cardboard boxes is just so unappealing.
Cheers,,,Steve
Steven F. Conway, CISSP
LA Systems
z/OS Systems
module.
How to do this is covered in our three day course Developing
Applications for z/OS UNIX. See
http://www.trainersfriend.com/UNIX_and_Web_courses/u520descr.htm
for details on the course.
--
Kind regards,
-Steve Comstock
The Trainer's Friend, Inc.
303-355-2752
http://www.trainersfriend.com
1 - 100 of 2721 matches
Mail list logo