VM/ESA Network Computing with Java and Netrexx

Total Page:16

File Type:pdf, Size:1020Kb

VM/ESA Network Computing with Java and Netrexx IBML VM/ESA Network Computing with Java and NetRexx Kris Buelens ** Bengt Heijnesson ** Dave Jones ** Salvador Torres International Technical Support Organization http://www.redbooks.ibm.com This book was printed at 240 dpi (dots per inch). The final production redbook with the RED cover will be printed at 1200 dpi and will provide superior graphics resolution. Please see “How to Get ITSO Redbooks” at the back of this book for ordering instructions. SG24-5148-00 IBML International Technical Support Organization SG24-5148-00 VM/ESA Network Computing with Java and NetRexx November 1998 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix C, “Special Notices” on page 161. First Edition (November 1998) This edition applies to Virtual Machine/Enterprise Systems Architecture (VM/ESA), Version 2 Release 3.0, Program Number 5654-030, and subsequent releases. Note This book is based on a pre-GA version of a product and may not apply when the product becomes generally available. We recommend that you consult the product documentation or follow-on versions of this redbook for more current information. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. HYJ Mail Station P099 522 South Road Poughkeepsie, New York 12601-5400 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1998. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Figures . ix Tables . xi Preface . xiii The Team That Wrote This Redbook ........................ xiii Comments Welcome . xiv Chapter 1. Introduction . 1 Chapter 2. Overview of NetRexx and Java on VM/ESA .............. 3 2.1 Java, NetRexx, OpenEdition, and the BFS ................... 3 2.2 Overview of the SFS ................................ 3 2.2.1 SFS Servers and File Pools ......................... 3 2.3 Overview of the BFS ................................ 8 2.3.1 POSIX Terminology . 8 2.3.2 Directory Entries for POSIX BFS Usage .................. 10 2.4 Some Common SFS and BFS Commands ................... 11 2.5 The Java Environment Under VM ........................ 12 2.6 SFS and BFS Directory Structures ........................ 13 2.6.1 An SFS File Space .............................. 13 2.6.2 A BFS File Space ............................... 14 2.6.3 Combining File Spaces : SFS Aliases - BFS Links ............ 14 2.7 Installing Java and NetRexx without the Shell and Utilities ......... 16 2.7.1 Major Steps to Install “Shell-less” Java and NetRexx ......... 17 2.8 Adding a NetRexx Developer User ID ...................... 20 Chapter 3. Tools Used During the Project ..................... 21 3.1 XEDIT . 21 3.1.1 PROFILE XEDIT . 21 3.2 BFSLIST - Listing the Contents of a BFS Directory .............. 22 3.2.1 OPENVM LISTFILE . 22 3.2.2 POSIX Shell and Utilities ........................... 23 3.2.3 BFSLIST . 24 3.3 BFSTREE - Listing a BFS Directory Tree .................... 27 3.4 NetRexx Compile . 29 3.4.1 NRC EXEC - NetRexx Compile ....................... 29 3.4.2 NRC XEDIT - NetRexx Compile ....................... 30 3.5 JC EXEC - Java Compile ............................. 31 3.6 NetRexx Run . 31 3.6.1 NRR EXEC - NetRexx Run .......................... 31 3.6.2 NRR XEDIT - NetRexx Run .......................... 32 3.7 Tools for the POSIX Shell Users ......................... 32 3.8 SETCENV - Setting C Environment Variables ................. 33 3.8.1 Important Environment Variables ...................... 33 3.8.2 Setting Environment Variables from CMS ................. 34 3.8.3 More About Classpath ............................ 34 Chapter 4. Comparing REXX to NetRexx ...................... 37 4.1 REXX′s Position . 37 4.1.1 The REXX Language ............................. 37 Copyright IBM Corp. 1998 iii 4.1.2 REXX Compilers . 38 4.1.3 Hello World in REXX ............................. 38 4.2 NetRexx′s Position . 38 4.2.1 Hello World in NetRexx ............................ 38 4.2.2 Hello World in Java .............................. 38 4.2.3 The NetRexx Language ........................... 39 4.2.4 NetRexx and Compilers ........................... 39 4.3 NetRexx Syntax Introduction ........................... 39 4.3.1 Basic Syntax Differences ........................... 40 4.3.2 Data Types . 40 4.3.3 Case . 42 4.3.4 REXX Instructions . 42 4.3.5 Function Calls . 45 4.3.6 Subroutines and User Defined Functions ................. 47 4.3.7 Exit or Return ................................. 49 4.3.8 Stems - Array Variables - Indexed Strings ................ 50 4.3.9 The main() Method - Input Parameters .................. 52 4.3.10 Comparing NetRexx to Object Oriented REXX ............. 53 Chapter 5. AboutFrame, a Reusable Class ..................... 55 5.1 The AboutFrame Picture ............................. 55 5.2 What is AboutFrame? ............................... 55 5.3 AboutFrame: User Interface ........................... 56 5.4 AboutFrame: Program Interface ......................... 56 5.4.1 Approach with Classic Languages ..................... 56 5.4.2 An OO Solution ................................ 56 5.5 Classes and Methods ............................... 57 5.5.1 Class - What is it? ............................... 57 5.5.2 Methods - What are they? .......................... 58 5.5.3 Variables in the Class ............................ 60 5.6 AboutFrame: the Class Definition ........................ 60 5.6.1 AboutFrame: Overview of the Program .................. 61 5.6.2 AboutFrame Section One: The Class Itself ................ 63 5.6.3 AboutFrame Section Two: The Constructor Method ........... 64 5.6.4 AboutFrame Section Three: Other Methods ............... 66 5.6.5 AboutFrame Section Four: Event Classes ................. 67 5.6.6 Avoiding Empty Frames ........................... 73 Chapter 6. Reading and Writing Files from NetRexx ............... 75 6.1 Reading BFS Character Data Files ....................... 75 6.1.1 Reading CMS Character Data Files .................... 75 6.2 Reading from the console ............................. 77 6.2.1 Useful Control Sequences .......................... 77 6.3 Writing BFS Character Data Files ........................ 78 6.3.1 Writing CMS Character Data Files ..................... 78 6.4 Working With Binary Files ............................. 79 Chapter 7. Code Pages - ASCII <> EBCDIC Issues ............... 81 7.1 History, Experience . 81 7.2 Background Information - Codepages ..................... 82 7.3 Internationalization . 83 7.3.1 Streams? . 83 7.3.2 Java IO Support ................................ 83 7.4 VM Java Codepage ................................ 84 7.4.1 Solution for Client Server Programs .................... 84 iv VM/ESA Network Computing with Java and NetRexx 7.5 IBM Network Station and Codepages ...................... 85 Chapter 8. TCP/IP Networking . 87 8.1 Translating between EBCDIC and ASCII .................... 87 8.1.1 readLine() and printLn() ........................... 87 8.2 Simple TCP/IP Client ................................ 88 8.3 Simple TCP/IP Server ............................... 88 8.3.1 Extending the Server ............................. 91 8.3.2 Starting the Server .............................. 91 Chapter 9. Java and CMS ............................... 93 9.1 Executing non-Java Programs .......................... 93 9.1.1 Using Runtime.exec() . 93 9.1.2 Using JNI . 94 9.2 The cms.util Package ............................... 94 9.3 Running CMS Execs ................................ 95 9.3.1 The CMSRexx Class ............................. 95 9.4 Running CMS Pipelines with NetRexx ..................... 96 9.4.1 fitting *>java .................................. 96 9.4.2 fitting *<java .................................. 97 9.4.3 The CMSPipe Class .............................. 97 9.5 Installation Instructions . 100 Chapter 10. The GUIMON Sample Program ................... 101 10.1 GUIMON - Pictures ............................... 101 10.2 GUIMON - Installation Instructions ...................... 103 10.2.1 Installing the GUIMON Monitor ..................... 103 10.2.2 Installing the GUIMON Client ...................... 105 10.2.3 Installing the GUIMON Server ...................... 106 10.2.4 Installing Client and Server Files .................... 107 10.3 GUIMON - Functional Overview ........................ 110 10.3.1 GUIMON - the Monitor .......................... 110 10.3.2 GUIMON - the Server ........................... 111 10.3.3 GUIMON - the Client ............................ 112 10.4 GUIMON - the Client-Server Communication ................ 113 10.4.1 Request Formats . 113 10.5 GUIMON Record Format Requirements ................... 117 Chapter 11. Running NetRexx and Java Applications on a Network Station 121 11.1 Network Computing - Extending VM/ESA Resources into the Network 121 11.2 VM/ESA as a Network Station Server .................... 122 11.3 Support Delivery Mechanism ......................... 122 11.4 Hardware Requirements for VM/ESA .................... 122 11.5 Software Requirements for VM/ESA ..................... 122 11.6 Major Steps to Install VM/ESA Network Station Code .......... 123 11.6.1 Download the Network Station Code .................. 123 11.6.2 Prepare
Recommended publications
  • Decimal Layouts for IEEE 754 Strawman3
    IEEE 754-2008 ECMA TC39/TG1 – 25 September 2008 Mike Cowlishaw IBM Fellow Overview • Summary of the new standard • Binary and decimal specifics • Support in hardware, standards, etc. • Questions? 2 Copyright © IBM Corporation 2008. All rights reserved. IEEE 754 revision • Started in December 2000 – 7.7 years – 5.8 years in committee (92 participants + e-mail) – 1.9 years in ballot (101 voters, 8 ballots, 1200+ comments) • Removes many ambiguities from 754-1985 • Incorporates IEEE 854 (radix-independent) • Recommends or requires more operations (functions) and more language support 3 Formats • Separates sets of floating-point numbers (and the arithmetic on them) from their encodings (‘interchange formats’) • Includes the 754-1985 basic formats: – binary32, 24 bits (‘single’) – binary64, 53 bits (‘double’) • Adds three new basic formats: – binary128, 113 bits (‘quad’) – decimal64, 16-digit (‘double’) – decimal128, 34-digit (‘quad’) 4 Why decimal? A web page… • Parking at Manchester airport… • £4.20 per day … … for 10 days … … calculated on-page using ECMAScript Answer shown: 5 Why decimal? A web page… • Parking at Manchester airport… • £4.20 per day … … for 10 days … … calculated on-page using ECMAScript Answer shown: £41.99 (Programmer must have truncated to two places.) 6 Where it costs real money… • Add 5% sales tax to a $ 0.70 telephone call, rounded to the nearest cent • 1.05 x 0.70 using binary double is exactly 0.734999999999999986677323704 49812151491641998291015625 (should have been 0.735) • rounds to $ 0.73, instead of $ 0.74
    [Show full text]
  • Creating Java Applications Using Netrexx
    SG24-2216-00 Creating Java Applications Using NetRexx September 1997 IBML International Technical Support Organization SG24-2216-00 Creating Java Applications Using NetRexx September 1997 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix B, “Special Notices” on page 273. First Edition (September 1997) This edition applies to Version 1.0 and Version 1.1 of NetRexx with Java Development Kit 1.1.1 for use with the OS/2 Warp, Windows 95, and Windows NT operating systems. Because NetRexx runs on any platform where Java is implemented, it applies to other platforms and operating systems as well. SAMPLE CODE ON THE INTERNET The sample code for this redbook is available as nrxredbk.zip on the ITSO home page on the Internet: ftp://www.redbooks.ibm.com/redbooks/SG242216 Download the sample code and read “Installing the Sample Programs” on page 4. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. QXXE Building 80-E2 650 Harry Road San Jose, California 95120-6099 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1997. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Figures . xi Tables . xv Preface . xvii How This Document is Organized ................................ xviii The Team That Wrote This Redbook ...............................
    [Show full text]
  • HILLGANG Executive IT Specialist, IBM the University of Warwick
    . An introduction to the z10 – Harv Emery, Professor in the Department of Computer Science at HILLGANG Executive IT Specialist, IBM the University of Warwick. Update on OpenSolaris on System z ABSTRACTS System Cloning – The DC VM & Linux Users’ Group Principles and Practice Changing the way computers compute There is plenty of information available for cloning Linux guests and even z/OS guests but what about Most numeric data in commercial and human-centric cloning entire VM systems? For instance - you have a applications are decimal, and floating-point decimal need for two VM environments (one for virtual increasingly important as these applications become servers and another for z/OS D/R including XRC ever more complex. Benchmarking has indicated that DASD mirroring) in two different data centers, for a some applications spend a considerable amount of total of 4 VM systems. How can you save time and time in decimal processing, and IBM has now effort? Build one and clone it! Come and hear how a implemented decimal floating-point in z9 microcode, customer adopted the philosophy that he has been z10 hardware, Power6 hardware, and in many employing for z/OS for a long time and now has software products. developed for his VM systems. The talk will include how to maintain one VM system and 'roll' the updates In this talk, Mike will cover: out to other VM systems with including large systems • Why decimal arithmetic is increasingly important into their curriculum. • Why IBM has added hardware support • The decimal floating-point formats and IBM System z10 arithmetic, derived from Rexx, which is in the Enterprise Class Announcing the 12th Meeting of the new Hillgang IEEE 754 draft, z/VM, z/OS, DB2, C and other products Overview • How to exploit the new hardware and software in In this session the speaker, will present an .
    [Show full text]
  • The Design of the REXX Language
    The design of the REXX language by M. F. Cowlishaw One way of classifying computer languagesis by two (consciously or otherwise) to be easy to compile or classes: languages needing skilled programmers, and easy to interpret, it is designed (with the help of personal languages usedby an expanding population of general users. REstructured extended executor feedback from hundreds of users) to be easy to use. (REXX) isa flexible personal language designed with particular attention to feedback from its users. It has Three major factors affect the usability of a language. proved to be effective and easyto use, yet it is suffi- First, the basic concepts of a language affect its ciently general and powerfulto fulfil theneeds of many demanding professional applications.REXX is system syntax, grammar, and consistency. Second, the his- and hardware independent,so that it has been possi- tory and development of a language determine its ble to integrate it experimentally into several operating function, usability, and completeness. Third, but systems. Here REXX isused for such purposes as com- quite independently, the implementation of a lan- mand and macro programming, prototyping, educa- guage affects its acceptability, portability, and distri- tion, and personal programming. This paper introduces REXX and describes the basic design principles that bution. This paper introduces REXX and then dis- were followed in developingit. cusses basic concepts and developmental history as applied to the design of the REXX language. There are several experimental implementations of the REXX language within IBM for both large and small machines. One of these, by the author, has omputer languages may be classified in many become a part of the Virtual Machine/System Prod- ways.
    [Show full text]
  • Proceedings of the Rexx Symposium for Developers and Users
    SLAC-R-95-464 CONF-9505198-- PROCEEDINGS OF THE REXX SYMPOSIUM FOR DEVELOPERS AND USERS May 1-3,1995 Stanford, California Convened by STANFORD LINEAR ACCELERATOR CENTER STANFORD UNIVERSITY, STANFORD, CALIFORNIA 94309 Program Committee Cathie Dager of SLAC, Convener Forrest Garnett of IBM Pam Taylor of The Workstation Group James Weissman Prepared for the Department of Energy under Contract number DE-AC03-76SF00515 Printed in the United States of America. Available from the National Technical Information Service, U.S. Department of Commerce, 5285 Port Royal Road, Springfield, Virginia 22161. DISTRIBUTION OF THIS DOCUMENT IS UNLIMITED ;--. i*-„r> ->&• DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, make any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof. DISCLAIMER Portions
    [Show full text]
  • 25 Years of Rexx ― a Personal View
    25 years of Rexx ― a personal view Böblingen 4 May 2004 Mike Cowlishaw IBM Fellow (Google: cowlishaw) Rexx25 Overview Questions, questions … Copyright © IBM Corporation 2004. All rights reserved. 2 All the … President’s questions … 3 Who was I? My IBM job? • Pre-University student with IBM (1970) – PL/I compiler, etc. • BSc Electronic Engineering – Birmingham • Day job: Test Tools Team – designing and building hardware for testing terminals such as the 3279 … 4 Microlink • Used existing coax terminal link (ANR) to attach bipolar microcomputers (based on the Signetics 8X300) to mainframe 5 Own-time projects? • Mostly PL/I and S/360 Assembler – Archaeological mapping (1974) – Cave surveying programs (1976) • STET, a STructured Editing Tool (1977) – and lots of other VM/CMS tools •Rex (1979) – a biggie: 4,000 hours to 1982 6 How old was I? well, 25 years is 25 years … 7 Why Rex? • CMS had EXEC … a bit like DOS BAT &CONTROL OFF &IF &INDEX EQ 0 &GOTO -GO EXEC DCOPT DROP &IF &RETCODE GE 12 &EXIT -GO &STACK RT … • EXEC 2: clean design, but just as ugly – language committee (Stephenson et al.) – hooks for vanilla CMS by Michel Hack 8 What were the first Rex programs? • ADDR EXEC … searches nickname file for nickname, displays name and address • SEND EXEC … send file to a local user • CONC XEDIT … concatenate and flow • … and lots of testcases 9 Who used it? • First distributable code was in May 1979; until then, only the one user • The first real users (pioneers, guinea pigs, trend-setters, …) were – Ray Mansell (Hursley, UK) – Les Koehler (Raleigh, NC) lots of useful feedback 10 How did it catch on? • Internal IBM network, VNET, rapidly growing • VM Newsletter (Peter Capek) • Word of mouth, Xmas card … • Add-ons (Steve Davies’ functions and others) 11 Was there a Rex motto? • Sort of.
    [Show full text]
  • ALGORITHMIC INFORMATION THEORY Third Printing
    ALGORITHMIC INFORMATION THEORY Third Printing GJChaitin IBM, P O Box 218 Yorktown Heights, NY 10598 [email protected] April 2, 2003 This book was published in 1987 by Cambridge Uni- versity Press as the first volume in the series Cam- bridge Tracts in Theoretical Computer Science. In 1988 and 1990 it was reprinted with revisions. This is the text of the third printing. However the APL character set is no longer used, since it is not gen- erally available. Acknowledgments The author is pleased to acknowledge permission to make free use of previous publications: Chapter 6 is based on his 1975 paper “A theory of program size formally identical to information theory” published in volume 22 of the Journal of the ACM, copyright c 1975, Association for Computing Machinery, Inc., reprinted by permission. Chapters 7, 8, and 9 are based on his 1987 paper “Incompleteness theorems for random reals” published in volume 8 of Advances in Ap- plied Mathematics, copyright c 1987 by Academic Press, Inc. The author wishes to thank Ralph Gomory, Gordon Lasher, and the Physics Department of the Watson Research Center. 1 2 Foreword Turing’s deep 1937 paper made it clear that G¨odel’s astonishing earlier results on arithmetic undecidability related in a very natural way to a class of computing automata, nonexistent at the time of Turing’s paper, but destined to appear only a few years later, subsequently to proliferate as the ubiquitous stored-program computer of today. The appearance of computers, and the involvement of a large scientific community in elucidation of their properties and limitations, greatly enriched the line of thought opened by Turing.
    [Show full text]
  • Pipelines Guide and Reference
    Pipelines Guide and Reference Ed Tomlinson Jeff Hennick René Jansen Version 4.01-GA of March 20, 2021 THE REXX LANGUAGE ASSOCIATION NetRexx Programming Series ISBN 978-90-819090-3-7 Publication Data ©Copyright The Rexx Language Association, 2011- 2021 All original material in this publication is published under the Creative Commons - Share Alike 3.0 License as stated at http://creativecommons.org/licenses/by-nc-sa/3.0/us/legalcode. The responsible publisher of this edition is identified as IBizz IT Services and Consultancy, Amsteldijk 14, 1074 HR Amsterdam, a registered company governed by the laws of the Kingdom of The Netherlands. This edition is registered under ISBN 978-90-819090-3-7 ISBN 978-90-819090-3-7 9 789081 909037 I Contents The NetR Programming Series i 1 Introduction 1 2 The Pipeline Concept 2 2.1 What is a Pipeline? 2 2.2 Stage 2 2.3 Device Driver 3 3 Running pipelines 4 3.1 Configuration 4 3.2 From the NetREXX Workspace (nrws) with direct execution 5 3.3 From the command line with direct execution 6 3.4 Precompiled Pipelines 6 3.5 Compiled from an .njp file 7 3.6 Compiled from an .njp file with additional stage definitions in NetREXX 7 4 Example Session 8 5 Write your own Filters 12 6 More advanced Pipelines 14 7 Device Drivers 15 8 Record Selection 17 9 Filters 18 10 Other Stages 19 11 Multi-Stream Pipelines 20 12 Pipeline Stalls 22 13 How to use a pipe in a NetR program 24 II 14 Giving commands to the operating system 27 14.1 Built-ins 27 15 TCP/IP Networking 28 16 Selecting from relational databases 30 17 The Pipes Runner 31 18 The Pipes Compiler 32 19 Built-in Stages 33 20 Differences with CMS Pipelines 34 Index 83 III The NetR Programming Series This book is part of a library, the NetR Programming Series, documenting the NetREXX programming language and its use and applications.
    [Show full text]
  • Building Netrexx Systems.Pdf
    Building NetRexx Systems 21st International Rexx Language Symposium René Vincent Jansen 2010-12-13 maandag, 13 december 2010 Agenda Commandline builds nrc ant make maandag, 13 december 2010 Agenda IDE builds Emacs JEdit Eclipse maandag, 13 december 2010 NetRexx The other Object Oriented successor to Classic Rexx 1995, Mike Cowlishaw Runs on the Java VM Compiles NetRexx to Java classes Added an interpreter in 2000 Will be open sourced, probably this next year maandag, 13 december 2010 Command line Aka Shell aka Prompt Unix vs Windows differences java Com.ibm.netrexx.process.NetRexxC resolves dependencies when classes are compiled together maandag, 13 december 2010 Make 1977, Stuart Feldman, Bell’s Labs. ACM Software award 2003 make is a utility that automatically builds executable programs and libraries from source code by reading files called makefiles which specify how to derive the target program The standard version nowadays is GNU Make maandag, 13 december 2010 Make 1977, Stuart Feldman, Bell’s Labs. ACM Software award 2003 make is a utility that automatically builds executable programs and libraries from source code by reading files called makefiles which specify how to derive the target program The standard version nowadays is GNU Make maandag, 13 december 2010 A makefile (called makefile) will be explained in the next few slides maandag, 13 december 2010 Variables and Rules maandag, 13 december 2010 Suffixes and Targets maandag, 13 december 2010 Take care not to remove sources that only have a *.java version Enables the class-in-source model maandag, 13 december 2010 Ant - Another Neat Tool Java based - Cross Platform - Building utility James Duncan Davidson, July 19, 2000 The most immediately noticeable difference between Ant and Make is that Ant uses XML to describe the build process and its dependencies, whereas Make uses Makefile format.
    [Show full text]
  • REXX Portability and Tips Share Session 1570, Boston August, 2010
    IBM Software REXX Portability and Tips Share Session 1570, Boston August, 2010 W. David Ashley [email protected] © 2010 IBM Corporation IBM Software Important REXX Compiler Disclaimer The information contained in this presentation is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this presentation, it is provided “as is”, without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this presentation or any other documentation. Nothing contained in this presentation is intended to, or shall have the effect of: • creating any warranty or representation from IBM (or its affiliates or its or their suppliers and/or licensors); or • Altering the terms and conditions of the applicable license agreement governing the use of IBM software. 2 REXX Portability and tips, Share Boston, August 2010 © 2003 IBM Corporation IBM Software Agenda o REXX Compiler o ooRexx o REXX Hints and Tips • Variable Names • Style Tips • Execution Optimization 3 REXX Portability and tips, Share Boston, August 2010 © 2003 IBM Corporation IBM Software REXX History . Rexx (Restructured eXtended eXecutor) . 1979mar29 Mike Cowlishaw (IBM Fellow) publishes initial specification . Late 1979 first implementation internal to IBM on VM/CMS. Available to the general public in 1983 VM (3rd release) – 25 years ago, Winter 1983 Share (San Francisco), Mike Cowlishaw and Rich McGuire demonstrated Rexx to the public.
    [Show full text]
  • Formalization of Neural Network Applications to Secure 3D Mobile Applications Paul Irolla
    Formalization of Neural Network Applications to Secure 3D Mobile Applications Paul Irolla To cite this version: Paul Irolla. Formalization of Neural Network Applications to Secure 3D Mobile Applications. Quanti- tative Methods [q-bio.QM]. Université Paris Saclay (COmUE), 2018. English. NNT : 2018SACLS585. tel-02047792 HAL Id: tel-02047792 https://tel.archives-ouvertes.fr/tel-02047792 Submitted on 25 Feb 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Formalization of neural 2018SACLS585 network to secure 3D NNT: mobile applications Thèse de doctorat de l’Université Paris-Saclay préparée à l’Université Paris-Sud École doctorale n± 568 Biosigne Spécialité de doctorat: innovation technologique Thèse présentée et soutenue a l’ESIEA Laval, le 19 décembre 2018, par Paul Irolla Composition du jury: Éric Filiol Directeur de recherche — Laboratoire CNS Directeur de thèse Jean-Philippe Deslys Directeur de recherche — Laboratoire CEA/DRF/iMETI/SEPIA Co-directeur de thèse Ludovic Apvrille Professeur — Laboratoire LabSoC (Telecom ParisTech) Rapporteur Antonella Santone Professeur — Università degli Studi del Molise Rapporteur Maroun Chamoun Professeur — Université Saint-Joseph (Beyrouth) Président Akka Zemmari Maître de conférences — Laboratoire LaBRI (CNRS) Examinateur Thèse de doctorat Thèse Titre: Formalisation et applications des réseaux de neurones à la sécurisation d’applications mobiles 3D.
    [Show full text]
  • Comparative Programming Languages CM20253
    We have briefly covered many aspects of language design And there are many more factors we could talk about in making choices of language The End There are many languages out there, both general purpose and specialist And there are many more factors we could talk about in making choices of language The End There are many languages out there, both general purpose and specialist We have briefly covered many aspects of language design The End There are many languages out there, both general purpose and specialist We have briefly covered many aspects of language design And there are many more factors we could talk about in making choices of language Often a single project can use several languages, each suited to its part of the project And then the interopability of languages becomes important For example, can you easily join together code written in Java and C? The End Or languages And then the interopability of languages becomes important For example, can you easily join together code written in Java and C? The End Or languages Often a single project can use several languages, each suited to its part of the project For example, can you easily join together code written in Java and C? The End Or languages Often a single project can use several languages, each suited to its part of the project And then the interopability of languages becomes important The End Or languages Often a single project can use several languages, each suited to its part of the project And then the interopability of languages becomes important For example, can you easily
    [Show full text]