I do exploit the features of both the language and the shell that it is runnung 
under, but when comparing two languages you should recognize that the user has 
the same shell features for both.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


________________________________________
From: IBM Mainframe Discussion List <[email protected]> on behalf of 
scott Ford <[email protected]>
Sent: Tuesday, March 17, 2020 11:00 AM
To: [email protected]
Subject: Re: Scripting REXX thought -- inspiration or insanity?

Shmuel but why not leverage ( I know new word ) both.

Scott

On Mon, Mar 16, 2020 at 5:56 PM Seymour J Metz <[email protected]> wrote:

> Apples and oranges. As before, you're talking about the capabilities of
> the environment in which it is running, not the capabilities of the
> program.
>
> Further. how do you handle the case where you want to use the output of
> one command as the source for a script and the output of a different
> command as the input to the script. Adding Rube Goldberg features to Rexx
> instead of writing simple wrappers maximaly violates the Unix tradition you
> cited.
>
>
> --
> Shmuel (Seymour J.) Metz
> http://mason.gmu.edu/~smetz3
>
>
> ________________________________________
> From: IBM Mainframe Discussion List <[email protected]> on behalf
> of Paul Gilmartin <[email protected]>
> Sent: Monday, March 16, 2020 5:15 PM
> To: [email protected]
> Subject: Re: Scripting REXX thought -- inspiration or insanity?
>
> On Mon, 16 Mar 2020 19:59:06 +0000, Seymour J Metz wrote:
>
> >> It's the UNIX tradition.
>
> https colon//
> http://secure-web.cisco.com/1M_2EXcoLWPN-8aW9ElazoTowG-ebLU4SfxW1ZrKYM7sxHV3rpFiVkqwdejr3RMA-uhOdn7F9wIwFXcqinI-yb3d6Pe8GFIj24vIJe2o4E7gkn9bU3uV3RjUtIaFQcyCTg2A7MYZJd8h0O0eJGIBnVWe6QJ4IcUH4yXKoyWvrErfPM549douPzOLxMY54UHJudybB_ujaaivu1O1Lhl1510PwRFegFUT5TGRDZDr-J0vQCpHhYbPk-e-oAyp7kFqaxV-nCbKjPUJo60GgwV4ldey1bUCiD_JsuAFl0vwInk1UpwJ0e0mufJlbv6BoC8ahm07Acouycgc82ZhV46tsdBH4q0izpRWwbA-S4zirddZuLmIC7GNFJ3HMH8ZzdeH-65kxSGP1mbYKNecd6BE28KUhtK-Im9N6geHFOu-6nCMaLM93MI5Z3X34u8Vcdqgv/http%3A%2F%2Fwww.goodreads.com%2Fquotes%2F353571-a-foolish-consistency-is-the-hobgoblin-of-little-minds-adored
>
> The operant qualifier is "foolish".
>
> >Can you pipe the output of a Unix command to IRXJCL? shell syntax?
> >
> Not shell, but with Rexx: SYSCALL pipe; BPXWDYN( 'alloc dd(SYSTSIN) ...'
> ); ATTCHMVS;
> and, yes, that's SYSTSIN, not SYSEXEC.
>
> >Is there a compelling need to do that?
> >
> No.
>
> >So does foo | rexx bar, but neither one treats the output of foo as Rexx
> code
> >
> With a little shell redirection, it's easy with Regina.
>
> > It makes most sense if someone else writes that wrapper.
> >
> With a little shell redirection, it's easy with Regina.
>
> >You are someone.
> >
> But not someone *else*.
>
> -- gil
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN
>
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN
>


--



*IDMWORKS *

Scott Ford

z/OS Dev.




“By elevating a friend or Collegue you elevate yourself, by demeaning a
friend or collegue you demean yourself”



http://secure-web.cisco.com/1zNyMI_B01E1ysEYmUYQR2caZ0-wYyequFritbr3igmtMr0qL6IsgfFrPghg2NREJv7eUOSRVdWK8UR_9ENDwz-ovQ7FsyadoduskJA6MmZiPWyxqH7EilJtetU6MwQB75XhBNRP45gzvJsVcZ8JtgeI1Zo8Xqpz0s9wNh4FVoczKbJHB-s-VVFva2Ny5OmUtbSa0z0YPQYjgVCEePG8NAXirlXEGfH4-2Q1dyS693AHj2ngeqfOWpecC7r-jbmwMnM4H5Vj1FWjCrZiEzj3FrOnIaWhkiu83lR1xMcuyT3iRR2TFwlHp0f7zzQ4fPKdj54jQNbOj-TUduXwRw33mk-e7jEBKpeYEW5MhC65bCsYQFUih9JNHudTUuLWocJxIY2uUkHC-cgQPpIM0qUL8GpLaQDdSaxELnjYiHMFlTdJYYjfjjDL8jpuY2hhijU5I/http%3A%2F%2Fwww.idmworks.com

[email protected]

Blog: 
http://secure-web.cisco.com/1MiYkAAkefG-bTjxIfXlJJQfM2JVC_AMcYEoHV8MMsXWtnPIMs_lkIQX0IyPiZBdtR5aUAigdCRa8wcl7Kx6MkPKR67Je1uTP6OiKbPnERq_49p5txmx1K2X23D8075DtjFNOjpVnGn8y8hyylp5b2T1roixvgt5vTnzmiI_35fDQ-1l9MYimsmBNJocKqfEV9HuBqeknlAq1lsZo17tsU0UyPL0rbfgI5O5pcDwvInFoHzvvIeaiNfyyRxY-0caOnEbWZOatyPKc8Ug4-B3_LDrIPZveaCYroSFeHmDhDxN8z6wInOohhaKSoCIYDGAIxpyFQLTiZr1YSvZiqlJTenAP874VWmTO5T8xntF7rtB4XPrTIq3dQGI62yw_fjyjdFNh9WqJRX99XMSIFbAFJKKFgPR8C41GLXaGM3sJwkhDyuygCEPbEzh9nCZg7WcC/http%3A%2F%2Fwww.idmworks.com%2Fblog





*The information contained in this email message and any attachment may be
privileged, confidential, proprietary or otherwise protected from
disclosure. If the reader of this message is not the intended recipient,
you are hereby notified that any dissemination, distribution, copying or
use of this message and any attachment is strictly prohibited. If you have
received this message in error, please notify us immediately by replying to
the message and permanently delete it from your computer and destroy any
printout thereof.*

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to