Yes, you can. And it doesn't break anything. In CICS there is a utility
transaction, ADYN, that can be used to allocate/deallocate datasets. It calls
SVC 99 "under the covers". I've used it on many occasions to free allocations
in a CICS region that had been made via DD statements in the regio
It's because the official name isn't chosen until just before it goes GA. Up
until then, even the developers don't know what the real name is going to be.
It works the same way with CICS.
On Feb 19, 2019, at 2:21 AM, "Sankaranarayanan, Vignesh"
mailto:vignesh.v.sankaranaraya...@marks-and-spencer
Somehow, I managed to send this suggestion to the wrong mailing list a few days
ago – my bad…
Hi Dave,
I've seen that kind of problem before myself invoking various IBM utilities
repeatedly. A lot of them assume that they will always run at the jobstep
level and don't ever freemain their SP0
Your problem is caused by using lower case characters in your CART parameter
value, the value of variable MyCart. If you used all upper case, or all
numerics, it would work fine.
That's not documented anywhere that I've thus far been able to find.
Cheers,
Robert
-Original Message-
Fr
"Was the syntax upward-compatible?"
Yes, it was - mostly. My ATTCHJRG command processor was 100% compatible with
how you called ATTCHMVS, except it supported one additional parameter:
TASKDD(ddname). If you supplied that, then it would pass whatever you had
previously allocated to ddname
I love symbols.
I've been trying to figure out if a level of indirection is possible.
Here's an example that both doesn't work and isn't' even syntactically correct,
but hopefully will serve to illustrate what I'm trying to do:
//SYM1 SET SYM1=VALUE1
//SYM2 SET SYM2=VALUE2
//TARGET SE
Is AT-TLS (or some other encryption mechanism) supported in the case of z/OS
running as an NFS >client<, connecting to (for example) a Linux NFS server?
I've been looking through the doc and haven't yet found a definitive answer.
Looking for a solution to enable z/OS to act as an NFS client and
Something that's been puzzling me:
Imagine an interactive application that requires valid user credentials (ID and
password) to access, but does NOT require specific authorization to the
application.
In other words, the app does a RACROUTE REQUEST=VERIFY to validate credentials
and create the a
There are no native REXX functions or easily callable services you can use to
get your hands on them. However, if you're handy with Assembler you could
write your own callable service to get them. The service you need in order to
get access to JCL symbols is invoked via the IEFSJSYM macro.
I tend to agree about the tech writers "having lost their way".
I wish they'd quit messing with "the tool formerly known as Knowledge Center",
because every time they revamp it, they make it WORSE, not better.
It did used to be simple. A reference manual ought to show every possible
option/pa
REXX isn't the problem. Your coding technique is.
There's no limit to the size of file you can read and process using REXX,
--provided-- that you read and process only one record (or at most only a few
records) at a time, like 'normal' program would.
For example:
EXECIO 1 DISKR MYFILE
I did write a fairly detailed 'experience' document about everything, but I
was doing so as part of a project for a client at the time so I'm not free to
publish or share it without their permission.
Cheers,
Robert Garrett
Garrett Family Enterprises
rob...@garrettfamily.us
IBM Gold
Hi Paul,
I just looked back over some of my own subsystem code that also makes that
call, and I never fee that area so therefore it will get freed at tcb or step
termination. I don't think one has any control over where the storage gets
allocated from, but considering what it's used for my gue
zOSMF. A reasonably good idea that has been extremely poorly and sloppily
implemented.
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of
Carmen Vitullo
Sent: Monday, August 29, 2022 1:13 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: z/OSMF - again, next issue
I'm working
"Touch" equivalent for very large datasets? Pretty simple and "size doesn't
matter" (that's what she said, grin):
IDCAMS in batch: PRINT INFILE(ddname) COUNT(1) [or PRINT INDATASET(dsn)
COUNT(1) - but be aware DSN allocations in IDCAMS may default to DISP=OLD which
could cause contention iss
What is referred to as "Artificial Intelligence" is actually better described
by the term "automated plagiarism". All it's capable of is
collecting/rehashing/reformulating/regurgitating information that has been
collected from "all over".
If it provides you an answer to something, it's bec
"Plain old" FTP on z/OS does not support encryption --- directly -- however
it's possible to enforce encryption at the TCPIP stack level via AT/TLS.
Short for Application Transparent Transport Level Security - the key phrase
bei8ng "Application Transparent". When configured properly TCPIP its
I may be late to the party on this one, if so, my apologies.
Yes you can you LISTDSI to do this. The secret is to test the return and
reason codes.
Here's an example of checking to ensure //REPORT DD has been allocated:
if LISTDSI('REPORT FILE') > 4 then, /* 4 means successful, but some info
Mainframe Discussion List On Behalf Of
Robert Garrett
Sent: Monday, September 16, 2024 3:14 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Is z/OS FTP encrypted?
EXTERNAL EMAIL
"Plain old" FTP on z/OS does not support encryption --- directly -- however
it's possible to enforce encr
How is the log stream defined? Are the offload datasets (and staging datasets,
if specified) SMS managed? (LS_STORCLASS() and STG_STORCLASS() specified with
values and not with NO_LS_STORCLASS and NO_STG_STORCLASS respectively)
If so, then check the associated storage group to see if it's out
Yes, it's HORRIBLY slow and there's no doc on how to use it that I've found so
far.
It is possible to scope searches, but you have to first perform a search and
get some results to be able to set the scope because the only place the scope
option is available is at the top of the search results
ak down online
processes into step-by-step instructions.) consent.trustarc.com (consent
manager)
On Thu, 8 Apr 2021 at 17:47, Robert Garrett wrote:
> Yes, it's HORRIBLY slow and there's no doc on how to use it that I've
> found so far.
>
> It is possible to scope searches, but you
Will your exec be running with CONSOLE authority? If so, you can trap the
output of the console command: D GRS,RES=(SYSDSN,.dsn)
-Original Message-
From: IBM Mainframe Discussion List On Behalf Of
Peter Vander Woude
Sent: Tuesday, May 6, 2025 11:30 AM
To: IBM-MAIN@LISTSERV.UA.E
23 matches
Mail list logo