IBM Operating System/360 Concepts and Facilities

Total Page:16

File Type:pdf, Size:1020Kb

IBM Operating System/360 Concepts and Facilities File Numbel: 8360-36 Form C28-6535-0 Systems Reference Library IBM Operating System/360 Concepts and Facilities This publication describes the basic concepts of Operating System/360 and guides the programmer in the use of its various facilities. Operating System/360 is a comprehensive set of language translators and service programs, operating under the supervisory control and coordination of an integrated control program. It is designed for use with Groups 30, 40, 50, 60, 62, 70, and 92 of Computing System/360. It assists the programmer by extending the performance and application of the computing system. PREFACE This publication introduces and interre­ The publication is divided into two lates all Operating System/360 control pro­ parts, an introduction and survey, and a gram facilities. It shows how these facil­ detailed description. The first part con­ ities work with the language translators tains a general description of subjects of and service programs, so the programmer can interest to all users. The second part, better learn to use the system. It also meant for programmers, is a more thorough directs the programmer to related Operating discussion of the same topics. System/360 publications for specific details. Even though many details are expressed in assembler language terminology, this Many combinations of programming facili­ publication is addressed to every program­ ties are possible with Operating mer who will use System/360, and familiari­ System/360. The programmer will work with ty ~ith the assembler language is not a a particular set of these facilities, requirement. depending on the language he uses (FORTRAN, COBOL, Report Program Generator, Assembler, or New Programming Language), and the modu­ PREREQUISITE PUBLICATION: IBM Operating lar programs chosen when his operating System/360: Introduction. This publication system is generated. Although all the describes the general organization, func­ control program facilities are described tion, and application of the operating herein, all of them may not be included in system. It also describes the other relat­ every installation. ed Operating System/360 publications. This publication was prepared for production using an IBM computer to update the text and to control the page and line format. Page impressions for photo-offset printing were obtained from an IBM 1403 Printer using a special print chain. Copies of this and other IBM publications can be cbtained through IBM Branch Offices. A form for readers' comments appears at the back of this publication. It may be mailed directly to IEM. Address any additional comments concerning this publication to the IBM Corporation, programming Systems publications, Department D58, PO Box 390, Poughkeepsie, N. Y. 12602 ©1965 by International Business Machines Corporation CONTENTS PART I: INTRODUCTION AND SURVEY •• 7 Blocking and Buffering Facilities 29 Block Formats • • • • • 29 SECTION 1: INTRODUCTION. 8 Buffering Facilities •••••• 30 Buffer Pools •••••••••• 30 Elements of the Ope:r:ating System 8 Buffer Assignment Techniques and Transmittal Modes 30 Benefits to the Programmer 8 ! The Data Control Block 33 SECTION 2: SURVEY 10 OPEN and CLOSE Macro-Instructions 33 Data Access Routines • • • • •• 34 Data Management • 10 Identifying and Locating Data 10 SECTION 4: PROGRAM DESIGN AND Organizing Data •••• 11 PREPARATION ••• • 39 Storing and Retrieving Data • • • • 11 Device Independence • • • • • 12 Program Segmentation 39 Program Design and Preparation 13 Program Structures 39 programs and Subprograms • 13 Simple Structures •••• 40 Combining Subprograms 13 Deferred Exits 41 Planned OVerlay Structures 42 Job Management ••••• 15 Dynamic Serial Structures 43 Job Control ••••• 15 Link Macro-Instruction 43 The Input Job Stream • 15 Transfer Control (XCTL) Job Scheduler •••••••• 16 Macro-Instruction 44 Sequential Scheduling System 16 LOAD Macro-Instruction 45 Priority Scheduling Systems 17 Planned Overlay versus Dynamic Structures • • • • • • • • 46 Task Management • 18 Dynamic Parallel Structures • • • • 46 PART II: DETAILED DESCRIPTION 21 Program Design Facilities • • • • 47 Reusability ••••• • • • • 47 SECTION 3: DATA MANAGEMENT 22 Design of Reenterable Programs 48 Checkpoint and Restart • • 49 Data Set Identification and Extent Timer •• • • • • 49 Control ••••••• • • • • 22 Direct-Access Volume Identification Debugging Facilities 50 and the Volume Table of Contents 22 Assembler Language Program Magnetic Tape Volumes ••••••• 22 Debugging: Test Translator 50 Cataloging and Library Management 23 Test Output ••••• 51 Control Volumes • • • • • • • 24 Generation Data Groups ••••• 24 SECTION 5: JOB MANAGEMENT 52 Password Protection of Data Sets • • 25 Editing of Space, Indexes, and Control Statement Capabilities 52 Catalogs •••• 25 Scheduling Controls 53 Job Priority 53 Data Access Methods • 25 Dependencies 53 The Access Methods • • 26 Maximum Execution Time 53 Queued Sequential Access Method Non-Setup Jobs •••• 53 (QSAM) • • • • • • • • • • 26 Job Log • • • • • 54 Basic Sequential Access Method Program Source Selection • 54 (BSAM) • • • • • • • • • • • • • 26 Data Set Identification And Basic Partitioned Access Method Disposition • • • • • • • • • 54 (BPAM) • • • • • • • • • • • • • 26 SYSIN and the DD * Statement 55 Indexed Sequential Access Methods Concatenated Data Sets 55 - Basic and Queued (BISAM and Generation Data Groups 55 QISAM) • • • • • • • • • • • • • 26 Dummy Data Sets • • • • 55 Basic Direct~Access Method (BDAM) 27 Data Set Disposition • • • • 56 Queued Telecommunications Access Input/Output Device Allocation 56 Method (QTAM) ••••••••• 27 Deferred Mounting of Tapes 58 Basic Telecommunica.tions Access Direct-Access Storage Space Method (BTAM) ••••••••• 29 Allocation ••••• • • • • • 58 Cataloged pr9cedures • • • • • • •• 58 Passing And Sharing Of Main Storage Job Scheduler and Master Scheduler Areas • • • • • • • • • • • • 75 Functions • • • • • • • • • • • 58 Task Priorities And Roll-Out • 76 Job Scheduler •••• 59 Reader/Interpreter ••••••• 59 APPENDIX: SYSTEM CONVENTIONS 77 Initiator/Terminator • • • • 59 Output Writers 60 Names •• 77 Master Scheduler • • • • • 61 Subprogram Linkage 78 SECTION 6: TASK MANAGEMENT 63 Program sharing • • 78 Single-Task Operations 63 Actual Flow of Control 64 Intertask communication • 78 Multitask Operation ••• 64 Use of WAIT • • • • 78 Task Creation -- ATTACH 65 Resource Allocation 66 Operator messages • '78 Tasks As Users of Resources • 67 passing Resources to Subtasks 68 Control Section size 78 Event Synchronization ••••• 68 WAIT and POST Macro-Instructions 68 Character set considerations 78 Enqueue (ENQ) and Dequeue (DEQ) Source Language Debugging and Macro-Instructions 70 Maintenance 79 Task Priorities 71 Task Termination • • • 72 Volume Labels 79 Main Storage Allocation • 74 Track Address Independence 79 Main Storage Allocation in a Multitask Environment 75 GLOSSARY 80 Storage Protection And Protection Boundaries •••••••••••• 75 INDEX •• 87 11 S $ ILLUSTRATIONS FIGURES Figure 1. Operating System/360 . • • 8 Figure 30. Delays Expected in Sub- Figure 2. Subprograms Existing at program • •• .•••. 47 Different Levels of Control Figure 31. No Delays Expected. 47 13 Figure 32. A Reenterable Program that Figure 3. Subprograms Existing at the Requests Its Own Temporary Same and Different Levels Storage •• .... 49 of Control • • • • • • 14 Figure 33. Chain of Symbolic Figure 4. Program Preparation. • 14 References ...•.. 54 Figure 5. The Input Job Stream • • • 15 Figure 34. Typical Input/Output Figure 6. Sequential Scheduling Devices • • • • • • • • • 56 System • • • • • • • • 16 Figure 35. Multijob Initiation • 60 Figure 7. Priority Scheduling System 17 Figure 36. Actual Flow of Control. • 64 Figure 8. Task Representation. • • • 18 Figure 37. Job Step-Task Relation- Figure 9. Switching Control Among ship. 65 Tasks ••••••••••• 19 Figure 38. Situation Immediately After Figure 10. Volume Initialization and Initial Program Loading • 66 the Volume Table of Contents Figure 39. Situation With Reader, 23 Writer, Initiator, and ~"igure 11. Catalog Search Procedure • 24 One Job Step. • • • • • • 66 Figure 12. The Queued Figure 40. Situation After Initiating Telecommunications Access Three Concurrent Jobs • • 66 Method • • • • • • • • • • 28 Figure 41. Resource Queues • • • • • 68 Figure 13. Components of a Message •• 29 Figure 42. Intertask Synchronization 69 Figure 14. Dynamic Buffering ••••• 31 Figure 43. Situation After READ ••• 69 Figure 15. Simple Buffering - Move Figure 44. Situation After Execution Mode • • • • • • • • • • • 32 of WAIT • • • . • • • • • 70 Figure 16. Simple Buffering - Locate Figure 45. Situation at Completion Mode • • • • • • • • 32 of Input/Output Operation Figure 17. Exchange Buffering - 70 Substitute Mode •••••• 33 Figure 46. Abnormal Termination of a Figure 18. Data Control Block Being Task. • • • . • • • • • • 73 Filled in. • • • • . • • 34 Figure 47. Abnormal Termination of a Figure 19. Actual Program Flow That Subtask • • • • • • • • • 73 Starts on Input/Output • . 35 Figure 48. Deferred Exit at Abnormal Figure 20. Execution of a Load Module End of Task • • • • • • • 74 Within a Task •••.• ~ • 40 Figure 21. Subprogram Within a Program 40 Figure 22. Deferred Exit to Subroutine 42 Figure 23. Overlay Tree Structure 42 Figure 24. The LINK Operation . 44 Figure 25. Nested Subprograms • • 45 Figure 26. Use of XCTL Macro­ TABLES Instructions • . • • 45 Figure 2 7. Uses of LOAD Macro­ Table 1. Access Method Summary 37 Instructions • • .. 46 Table 2. Names of Installation
Recommended publications
  • Job Scheduling for SAP® Contents at a Glance
    Kees Verruijt, Arnoud Roebers, Anjo de Heus Job Scheduling for SAP® Contents at a Glance Foreword ............................................................................ 13 Preface ............................................................................... 15 1 General Job Scheduling ...................................................... 19 2 Decentralized SAP Job Scheduling .................................... 61 3 SAP Job Scheduling Interfaces .......................................... 111 4 Centralized SAP Job Scheduling ........................................ 125 5 Introduction to SAP Central Job Scheduling by Redwood ... 163 6Installation......................................................................... 183 7 Principles and Processes .................................................... 199 8Operation........................................................................... 237 9Customer Cases................................................................. 281 The Authors ........................................................................ 295 Index .................................................................................. 297 Contents Foreword ............................................................................................... 13 Preface ................................................................................................... 15 1 General Job Scheduling ...................................................... 19 1.1 Organizational Uses of Job Scheduling ..................................
    [Show full text]
  • IBM System/360 Operating System Sequential Access Methods Program Logic Manual
    Y28-6604-1 Program Logic IBM System/360 Operating System Sequential Access Methods Program Number 3S0S-DM-50B This publication describes the internal logic of the routines of the queued sequen­ tial access method, the basic sequential access method, and the basic partitioned access method of IBM System/360 Operating System. Program Logic Manuals are intended for use by IBM customer engineers involved in program maintenance, and by system pro­ grammers involved in altering the program design. Program logic information is not necessary for program operation and use; therefore, distribution of this manual is limited to persons with program maintenance or modification responsibilities. Restricted Distribution PREFACE This publication describes the sequen­ • Buffer pool management routines that tial access method facilities in IBM Oper­ furnish buffer space in main storage. ating System/360. It describes routines in five categories: PREREQUISITE PUBLICATIONS • Queued sequential access method rou­ tines that cause storage and retrieval Knowledge of the information in the of data records arranged in sequential following publications is required for an order .• understanding of this publication: • Basic sequential access method routines IBM system/360 Operating System: Data that cause storage and retrieval of Management, Form C28-6537 data blocks arranged in sequential order. IB,M Systerol360 Operating System: Intro­ duction to Control Program Logic. Pro­ • Basic partitioned access method rou­ gram Logic Manual, Form Y28-6605 tines that cause storage and retrieval of data blocks in a member of a parti­ tioned data set, and construct entries and search for entries in the directory RECOMMENDED READING of a partitioned data set. The publication IBM System/360 Operating • Executors that operate with System: Control Program SerVices, Form input/output supp~rt routines.
    [Show full text]
  • CA MII Data Sharing for Z/OS CA MII Programming Guide
    CA MII Data Sharing for z/OS CA MII Programming Guide Release 12.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation is proprietary information of CA and may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. If you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE.
    [Show full text]
  • JES3 Commands
    z/OS Version 2 Release 3 JES3 Commands IBM SA32-1008-30 Note Before using this information and the product it supports, read the information in “Notices” on page 431. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1997, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... ix List of Tables........................................................................................................ xi About this document...........................................................................................xiii Who should use this document.................................................................................................................xiii Where to find more information................................................................................................................ xiii How to send your comments to IBM......................................................................xv If you have a technical problem.................................................................................................................xv Summary of changes...........................................................................................xvi
    [Show full text]
  • Introduction to the New Mainframe: Z/OS Basics
    Front cover Introduction to the New Mainframe: z/OS Basics An introduction to mainframe computing on the IBM zSeries platform z/OS concepts and facilities for students and beginners zSeries hardware and peripheral devices Mike Ebbers Wayne O’Brien Bill Ogden ibm.com/ International Technical Support Organization z/OS Basics March 2005 SG24-6366-00 Note: Before using this information and the product it supports, read the information in “Notices” on page -1. First Edition (March 2005) © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Preface . xvii How this text is organized . xvii How each chapter is organized . xviii Acknowledgements . xix Comments welcome. xxi Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 1-1 1.1 The new mainframe. 1-2 1.2 Evolving architecture . 1-2 1.3 Mainframes in our midst . 1-4 1.4 What is a mainframe? . 1-5 1.5 Who uses mainframe computers?. 1-7 1.6 Factors contributing to mainframe use . 1-8 1.6.1 Reliability, availability, and serviceability. 1-9 1.6.2 Security . 1-10 1.6.3 Scalability . 1-10 1.6.4 Continuing compatibility . 1-11 1.7 Typical mainframe workloads . 1-11 1.7.1 Batch processing. 1-12 1.7.2 Online transactional processing . 1-15 1.8 Roles in the mainframe world . 1-17 1.8.1 Who is the system programmer? . 1-19 1.8.2 Who is the system administrator? .
    [Show full text]
  • Systems Introduction to OS/VS2 Release 2 First Edition (March, 1973)
    GC28-0661-1 File No. S370-34 Systems Introduction to OS/VS2 Release 2 First Edition (March, 1973) This edition is a reprint of GC28-0661{) incorporating some editorial changes. It does not obsolete GC28-0661-O. This edition applies to Release 2 of OS/VS2 and to all subsequent releases until otherwise indicated in new editions or Technical Newsletters. Changes are continually made to the information herein; before using this publication in connection with the operation of IBM systems, consult the latest IBM System/360 and System/370 Bibliography, Order No. GA22-6822, and the current SRL Newsletter. Order No. GN20-0360, for the editions that are applicable and current. Requests for copies of IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. A form for readers' comments is provided at the back of this pUblication. If the form has been removed, comments may be addressed to IBM Corporation, Publications Development, iJepartment 058, Building 706-2, PO Box 390, Poughkeepsie, N.Y. 12602. Comments and suggestions become the property of IBM. © Copyright International Business Machines Corporation 1973 Preface This publication contains introductory information Design Concepts -- shows sequence of operation and about OS/VS2 Release 2, a system control other highlights of system design. program (SCP) that features virtual storage, System Requirements -- lists the basic hardware multiprogramming, multiprocessing, time sharing, requirements. and job entry subsystems. It is assumed that readers have a basic knowledge of programming Compatibility -- points out the major differences systems such as OS/MVT or OS/VS2 Release 1.
    [Show full text]
  • High Level Assembler for Z/OS & Z/VM & Z/VSE: Programmer's Guide
    High Level Assembler for z/OS & z/VM & z/VSE Programmer's Guide Version 1 Release 6 SC26-4941-06 Note Before using this information and the product it supports, be sure to read the general information under “Notices” on page 397. This edition applies to IBM High Level Assembler for z/OS & z/VM & z/VSE, Release 6, Program Number 5696-234 and to any subsequent releases until otherwise indicated in new editions. Make sure that you are using the correct edition for the level of the product. Order publications through your IBM representative or the IBM branch office serving your locality. IBM welcomes your comments. For information on how to send comments, see “How to send your comments to IBM” on page xix. © Copyright IBM Corporation 1992, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ...............ix *PROCESS statement options .......37 Default options ............37 Tables ...............xi Invoking the assembler dynamically .....37 Coding rules .............37 Assembler options ............38 About this document ........xiii ADATA...............39 Who should use this document .......xiii ALIGN ...............39 Programming interface information ......xiii ASA (z/OS and CMS) ..........40 Organization of this document........xiii BATCH...............40 High Level Assembler documents .......xv CODEPAGE .............41 Documents .............xv COMPAT ..............42 Collection kits ............xvi DBCS ...............43 Related publications ...........xvi DECK ...............43 Syntax notation .............xvi DISK (CMS) .............44 DXREF ...............44 How to send your comments to IBM xix ERASE (CMS) ............45 If you have a technical problem .......xix ESD................45 EXIT................46 Summary of changes ........xxi FLAG ...............48 FOLD ...............51 Chapter 1.
    [Show full text]
  • Z/OS Basics Preface
    Contents Preface . iii How this course is organized . iii How each topic is organized . iv Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 3 1.1 The new mainframe. 4 1.2 The S/360: A turning point in mainframe history . 4 1.3 An evolving architecture . 5 1.4 Mainframes in our midst . 6 1.5 What is a mainframe? . 7 1.6 Who uses mainframe computers?. 10 1.7 Factors contributing to mainframe use . 11 1.8 Typical mainframe workloads . 14 1.9 Roles in the mainframe world . 21 1.10 z/OS and other mainframe operating systems . 27 1.11 Summary . 29 Chapter 2. z/OS overview. 31 2.1 What is an operating system? . 32 2.2 Overview of z/OS facilities. 32 2.3 What is z/OS? . 34 2.4 Virtual storage and other mainframe concepts . 39 2.5 What is workload management? . 57 2.6 I/O and data management. 60 2.7 Supervising the execution of work in the system . 60 2.8 Defining characteristics of z/OS . 68 2.9 Licensed programs for z/OS . 69 2.10 Middleware for z/OS . 70 2.11 A brief comparison of z/OS and UNIX. 71 2.12 Summary . 73 Chapter 3. TSO/E, ISPF, and UNIX: Interactive facilities of z/OS . 75 3.1 How do we interact with z/OS? . 76 3.2 TSO overview . 76 3.3 ISPF overview . 80 3.4 z/OS UNIX interactive interfaces. 99 3.5 Summary .
    [Show full text]
  • IBM Workload Automation: Glossary Scheduler
    IBM Workload Automation IBM Glossary Version 9 Release 5 IBM Workload Automation IBM Glossary Version 9 Release 5 Note Before using this information and the product it supports, read the information in “Notices” on page 31. This edition applies to version 9, release 5, modification level 0 of IBM Workload Scheduler (program number 5698-WSH) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1999, 2016. © Copyright HCL Technologies Limited 2016, 2019 Glossary Use the glossary to find terms and definitions for the IBM Workload Automation products. The following cross-references are used: v See refers you from a term to a preferred synonym, or from an acronym or abbreviation to the defined full form. v See also refers you to a related or contrasting term. To view glossaries for other IBM products, go to www.ibm.com/software/ globalization/terminology. “A” “B” on page 3 “C” on page 4 “D” on page 6 “E” on page 9 “F” on page 11 “G” on page 12 “H” on page 13 “I” on page 13 “J” on page 14 “L” on page 16 “M” on page 17 “N” on page 18 “O” on page 19 “P” on page 20 “Q” on page 22 “R” on page 22 “S” on page 24 “T” on page 26“U” on page 27 “V” on page 28 “W” on page 28 “X” on page 29“Z” on page 30 A access method An executable file used by extended agents to connect to and control jobs on other operating systems (for example, z/OS®) and applications (for example, Oracle Applications, PeopleSoft, and SAP R/3).
    [Show full text]
  • Job Control Profile
    1 Job Control Profile 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Document Number: DCIM1034 24 Document Type: Specification Document Status: Published 25 Document Language: E 26 Date: 2012-03-08 27 Version: 1.2.0 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 THIS PROFILE IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL 52 ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT 53 EXPRESS OR IMPLIED WARRANTIES OF ANY KIND. ABSENT A SEPARATE AGREEMENT 54 BETWEEN YOU AND DELL™ WITH REGARD TO FEEDBACK TO DELL ON THIS PROFILE 55 SPECIFICATION, YOU AGREE ANY FEEDBACK YOU PROVIDE TO DELL REGARDING THIS 56 PROFILE SPECIFICATION WILL BE OWNED AND CAN BE FREELY USED BY DELL. 57 58 © 2010 - 2012 Dell Inc. All rights reserved. Reproduction in any manner whatsoever without the express 59 written permission of Dell, Inc. is strictly forbidden. For more information, contact Dell. 60 61 Dell and the DELL logo are trademarks of Dell Inc. Microsoft and WinRM are either trademarks or 62 registered trademarks of Microsoft Corporation in the United States and/or other countries. Other 63 trademarks and trade names may be used in this document to refer to either the entities claiming the 64 marks and names or their products. Dell disclaims proprietary interest in the marks and names of others. 65 2 Version 1.2.0 66 CONTENTS 67 1 Scope ...................................................................................................................................................
    [Show full text]
  • Unisys IBM Mainframe Security - Part 2
    ProTech Professional Technical Services, Inc. Unisys IBM Mainframe Security - Part 2 Course Summary Description This course is intended for individuals who need an initial, introductory understanding of IBM's mainframe operating system z/OS and the mainframe security software product Resource Access Control Facility (RACF). It is specifically designed to give attendees a solid foundation in z/OS and RACF without overloading them with advanced technical topics, yet it also serves as the ideal springboard for acquiring Course Outline Course further skills and knowledge. Attendees will gain a fundamental understanding of the components and functions of z/OS and RACF. Objectives After taking this course, students will be able to understand: What z/OS is and what functions it performs The software components of z/OS How to use TSO and ISPF Coding and submitting batch jobs What RACF is and what functions it performs The contents of each type of RACF profile What groups are and how they are used Protecting datasets and general resources How RACF decides whether to grant access Topics Introduction to z/OS Groups Time Sharing Option (TSO) Resource Protection Batch Job Control Language (JCL) Datasets Introduction to RACF General Resources Users RACF Administration Audience This course is designed for anyone requiring general, introductory knowledge of z/OS and RACF. Including; Entry-level security administrators Compliance staff Non-mainframe IT security administrators IT Auditors IT Security Supervisors Prerequisites There are no prerequisites for this course. Duration Two days Due to the nature of this material, this document refers to numerous hardware and software products by their trade names.
    [Show full text]
  • General Disclaimer One Or More of the Following Statements May Affect
    General Disclaimer One or more of the Following Statements may affect this Document This document has been reproduced from the best copy furnished by the organizational source. It is being released in the interest of making available as much information as possible. This document may contain data, which exceeds the sheet parameters. It was furnished in this condition by the organizational source and is the best copy available. This document may contain tone-on-tone or color graphs, charts and/or pictures, which have been reproduced in black and white. This document is paginated as submitted by the original source. Portions of this document are not fully legible due to the historical nature of some of the material. However, it is the best reproduction available from the original submission. Produced by the NASA Center for Aerospace Information (CASI) X-613-70-67 NASA TM X= 638` / A METHOD OF HANDLING MULTIPLE FILE TAPES WITH-OS/360 JACQUES PACQUET MARCH 1970 t - GODDARD SPACE FLIGHT C GREENBELT, MARYLAN ^^ A' vCY13 Pei vEo s = IACE. - ^TMRUI GY K ^^ ^ I ^p^ UR INA A CR OR TN% G4 AD 1VMdE RI ^ 23 ICATROORY) i X-613-70-87 A METHOD OF HANDLING MULTIPLE FILE TAPES WITH OS/360 Jacques Pacquet* Laboratory for Optical Astronomy March 1970 GODDARD SPACE FLIGHT CENTER Greenbelt, Maryland *Service d'Aeronomie, Centre National de la Recherche Scientifique. Fort de Verrieres (Seine et Oise)FRANCE ECEpI 1 47G PA Ge, 8 ABSTRACT A set of general routines to handle tapes on computers using OS/360 is described. More specifically, a method to read a multi- reel multifile "data set" on unlabeled tape and to generate on un- labeled or labeled tapes one or more multi-reel multifile "data sets" is described using the queued sequential access method of the operating system.
    [Show full text]