Licensed Program Specifications

Total Page:16

File Type:pdf, Size:1020Kb

Licensed Program Specifications IBM Licensed Program Specifications NetView Access Services Version 2 (MVS/ESA) Release 1.1 Program Number 5695-036 NetView* Access Services Version 2 is an IBM* The system administrator can give any user Multiple Virtual Storage/Enterprise Systems Archi- the authority to broadcast messages to all or tecture* (MVS/ESA*) licensed program. NetView selected users. Access Services protects the SNA network and Fast printing, initiated by pressing a single pre- applications against unauthorized use and enables defined key. users to gain concurrent access to a number of different Virtual Telecommunication Access The ability to define fallback applications for Method (VTAM*) applications on one or more host situations where applications are not available. systems from a single terminal. A Bulletin Board facility to keep users informed about important events and news. NetView Access Services Version 2 (MVS/ESA) provides all the functions available with NetView Full foreground color and highlighting support Access Services Version 1 MVS, and introduces for NetView Access Services Version 2 panels. the following major new features: | Improved External Group handling, allows REXX Application Programming Interface | NetView Access Services Version 2 to use the (NVASAPI) to customize the way in which | application access information stored in RACF* applications interact with NetView Access Ser- | to build the application menu. This reduces vices. REXX procedures can be developed | the NetView Access Services Version 2 admin- that are carried out automatically whenever | istrator workload. users log on to or log off from an application, | Choice of new format for the application menu, or NetView Access Services itself. Many | allowing 42 applications to be displayed on a tedious or repetitive user interactions with | single screen. There is no longer a maximum applications can be fully automated, including | limit of 99 applications. the interchange of data between applications. | The ability to define terminals that are to be Greatly improved data compression tech- | logged on to NetView Access Services without niques, allowing significantly reduced network | the logon panel being displayed. This feature, charges. | together with NetView Access Services Public Virtual Terminal concept for applications, which | Groups, allows the NetView Access Services provides the following advantages: | Application menu to be displayed directly when | terminals are powered on. – Improved line performance for functions such as Jump, Escape, and Broadcast. Documentation supplied on CD-ROM. This is important for installations using rela- NetView Access Services Version 2 provides tively slow remote lines. support for languages other than English in the – Sessions running in the background con- form of: tinue to accept outbound data from an SBCS (single-byte character set) languages. application. This is an advantage for moni- toring applications or operator consoles. DBCS (double-byte character set) languages. The Virtual Terminal function only supports – Improved handling of the Application ID SBCS languages. The Virtual Terminal func- display function ensuring that no data is tion is a prerequisite for the NVASAPI. There- overwritten or colors are changed. * Trademark of the IBM Corporation in the United States or other countries or both. fore, the NVASAPI does not support DBCS – NetView Access Services Version 2 languages. requires approximately 1.3MB (where MB equals 1 048 576 bytes) of virtual storage Dynamic multilingual support. for executable code plus approximately | German, French, and Japanese Kanji trans- 244KB (where KB equals 1024 bytes) for | lation. the panels, and approximately 54KB for the Uppercase English support for Japanese message table, for each language installed. Katakana. NetView Access Services Version 2 runs in private virtual storage only. Specified Operating Environment – NetView Access Services Version 2 does not require storage in the common service Machine Requirements area and system queue areas of the MVS/ESA operating system. Processors – The virtual storage for the working set, that NetView Access Services Version 2 runs on all is, the control blocks and buffers, requires processors supported by the products listed in approximately 3.8KB per active session. “Programming Requirements.” – A minimum of 28.3KB are required for each Display Terminals running REXX exec, plus a minimum of NetView Access Services Version 2 supports 16KB for each nested REXX exec. 3270-type terminals with different screen sizes – In MVS/ESA operating systems, all storage with the exception of 3290 (160 columns and required for the working set and buffers is 62 rows). The terminals must be supported by located above the 16M-byte boundary. the VTAM applications connected through NetView Access Services Version 2 auxiliary NetView Access Services Version 2. storage requirements: Both SNA and non-SNA display devices are – 1.5KB disk storage for the profiles created supported. The NetView Access Services for each registered user. Version 2 panels use 24 rows and 80 columns. – Approximately 2KB disk storage for each In addition, NetView Access Services Version recorded automatic logon sequence. 2 supports the IBM 5550 family (as 3270) and the IBM PS/55* family (as 3270) for double- – Approximately 0.3KB disk storage for each byte character set languages (for example, data stream that goes with a BIND request. Kanji). – An average of 2KB disk storage for the Direct Access Storage Devices (DASD) parameter input file, whereby the minimum is approximately 0.6KB and the maximum NetView Access Services Version 2 supports depends on the number of terminal defi- all DASDs compatible with the operating nitions and how these definitions are speci- system products listed under “Programming fied (generic definitions are possible). Requirements.” – Approximately 300KB disk storage for the Printers panels and 30KB for the messages of each NetView Access Services Version 2 supports language supported. LU1- and LU3-type printers for printing a panel of an application. Programming Requirements NetView Access Services Version 2 primary Operating Systems storage requirements: NetView Access Services Version 2 is – The amount of storage required by NetView | designed for MVS/ESA and OS/390*, and is Access Services Version 2 (MVS/ESA) available for operation under any of the fol- depends on specifications entered through lowing operating systems: the input parameters (INPARM) file. | – OS/390 Version 1 (Program No. 5645-001), | OS/390 Version 2 (Program No. 5647-A01), 2 | or any subsequent, upwardly compatible | — NetView Version 3 for MVS/ESA | program | (Program No. 5655-007) | – MVS/ESA SP* Version 5 (Program Nos. | — NetView for OS/390 (Program No. | 5655-068, 5655-069) | 5697-B82). | – MVS/ESA SP Version 4 (Program Nos. – For accounting and performance moni- | 5695-047, 5695-048) toring, one of the following: NetView Access Services Version 2 runs in — NetView Performance Monitor for MVS 31-bit addressing mode. (Program No. 5665-333), Release 6, or subsequent releases Telecommunications Access Method — NetView Performance Monitor Version 2 | NetView Access Services Version 2 requires for MVS (Program No. 5655-043), | one of the following data-communication Release 1, or subsequent releases. | systems: | – ACF/VTAM* Version 3 for MVS/ESA Compatibility | (Program No. 5685-085) Release 4.1, or | subsequent releases. NetView Access Services Version 2 is upward- compatible with NetView Access Services | – ACF/VTAM Version 4 for MVS/ESA Version 1 Releases 3.0, 3.1, and 3.2. All func- | (Program No. 5695-117). tions, with the exception of the SAMON INFO REXX Application Programming Interface command, are supported by NetView Access Ser- vices Version 2. This command was removed, The following are required for the REXX Appli- because the Bulletin Board and Selective Broad- cation Programming Interface: cast features provide a richer set of functions. – TSO Extensions (TSO/E) Version 2 (Program No. 5685-025) The NetView Access Services Version 2 user pro- files are migrated automatically when NetView – Compiler for SAA* REXX/370 Release 2 Access Services Version 2 is started for the first (Program No. 5695-013) if compiled REXX time. Afterwards, the new profiles can still be execs are to be used. used with NetView Access Services Release 3 Security Management (Optional) Modification Level 2, but cannot be used with pre- NetView Access Services Version 2 can vious releases of NetView Access Services optionally be used with one of the following to Version 1. provide security management: The new panel data set is mandatory for Release – Resource Access Control Facility (RACF*) 1 of NetView Access Services Version 2. Utilities Version 2 Release 1 (Program No. are provided to convert customer-modified panels 5695-039), or subsequent releases to the new panel structure. – Resource Access Control Facility (RACF) Licensed Program Materials Availability (Program No. 5740-XXH) Release 1.9, or subsequent releases Restricted materials - No. This licensed program – Any equivalent security program. is available without source licensed program mate- rials. It is available in object code. Network Management (Optional) For Network Management, NetView Access Supplemental Terms Services Version 2 requires the following: – For support of NetView alerts and NetView Designated Machine Identification | CLISTs, one of the following: Designated Machine Identification
Recommended publications
  • Z/OS ISPF Services Guide COMMAND NAME
    z/OS 2.4 ISPF Services Guide IBM SC19-3626-40 Note Before using this information and the product it supports, read the information in “Notices” on page 399. This edition applies to Version 2 Release 4 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2021-06-22 © Copyright International Business Machines Corporation 1980, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................ xv Tables................................................................................................................xvii Preface...............................................................................................................xix Who should use this document?............................................................................................................... xix What is in this document?......................................................................................................................... xix How to read the syntax diagrams..............................................................................................................xix z/OS information...............................................................................................xxiii How to send your comments to IBM...................................................................
    [Show full text]
  • P8000H Line Matrix Printers
    Line Matrix P8000H Printers Flexible Design | Adaptable Functionality | Manageable Savings P8000H Cartridge Printers Deliver New Designs, Enhanced Convenience and Lower Operating Cost Printronix introduces design enhancements and improved functionality with the P8000H Cartridge Printer series to achieve the broadest flexibility, greatest compatibility and lowest ownership cost of virtually any other print technology. The series builds upon the workhorse tradition of all Printronix line matrix technology delivering maximum uptime, low cost of ownership, and reliable performance. The P8000H series is the ideal solution for buyers looking to minimize operating expense without sacrificing output reliability, regardless of operating environment. ADAPTABLE MANAGEABLE FLEXIBLE DESIGN FUNCTIONALITY SAVINGS Printronix modified its industry-leading The P8000H Cartridge series adapts to The P8000H Cartridge Printer is a line matrix technology to address almost any supply-chain or back-office smart purchase evolving user requirements. environment. • Lowest cost of ownership of any • Modular enclosures occupy a • USB 2.0 and Serial connectivity print technology. smaller footprint while delivering included as standard features. Parallel location and installation flexibility & Ethernet available as options. • Durable design minimizes downtime related to unfavorable • Sheet metal construction for • High resolution capabilities that environmental conditions. increased durability and better improve user experience with support acoustics of Asian fonts.
    [Show full text]
  • A Study on the Prospect of the Digital Font and the CAP
    A Study on the Prospect of the Digital Font and the CAP Professor Ki Sung Lee Kaywon School of Art and Design Korea CAP Society Preface CAP (Computer Aided Publishing) means the act of publishing by using the computer. CAP is classified into paper book CAP or non-paper book CAP by its output media. Non-paper book CAP is again divided into disk book CAP and network screen book CAP. There are three divisions of publishing: textbook publishing, book publishing, and magazine publishing. Textbook publishing includes reference book publishing as well as primary and secondary school textbook publishing. Since 1990, the three areas of publishing have gone beyond the limitation of the paper. While the Korean secretary of the Ministry of Culture, Eo-ryeong Lee was in office, CD-ROM disks which contained Hangeul Korean textbook were sent to Koreans living in South America and they turned out to be a big hit because they included sound files which played correct Korean pronunciation. In Korea, more and more English and computer textbooks are published in the form of disk book CAP. 1. Research Purpose and Method The study concentrates on two areas. One is the prospect of CAP, the other is the digital font. I tried to give an accurate picture and definition of CAP and how the publishing and printing industry can survive in the times of information and computerization. The development and the future of CAP are also explored in this paper. Among all the computer aided publishing, network screen book terminal boom which started in 1998 has been rapidly spreading in America and Korea by selling "Riding the Bullet"-by American author Steven King-as a network screen book through the internet.
    [Show full text]
  • ISPF User's Guide Volume I
    z/OS Version 2 Release 3 ISPF User's Guide Volume I IBM SC19-3627-30 Note Before using this information and the product it supports, read the information in “Notices” on page 213. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-06-21 © Copyright International Business Machines Corporation 1980, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................. xi Tables..................................................................................................................xv Preface..............................................................................................................xvii About this document................................................................................................................................ xvii Who should use this document................................................................................................................xvii What is in this document?........................................................................................................................ xvii How to read the syntax diagrams............................................................................................................xviii z/OS information...............................................................................................xxiii
    [Show full text]
  • Report on the Use of Computers in 1986
    Report on the use of computers in 1986 Autor(en): Frandsen, Aksel G. Objekttyp: Article Zeitschrift: IABSE surveys = Revue AIPC = IVBH Berichte Band (Jahr): 11 (1987) Heft S-37: Report on the use of computers in 1986 PDF erstellt am: 10.10.2021 Persistenter Link: http://doi.org/10.5169/seals-50712 Nutzungsbedingungen Die ETH-Bibliothek ist Anbieterin der digitalisierten Zeitschriften. Sie besitzt keine Urheberrechte an den Inhalten der Zeitschriften. Die Rechte liegen in der Regel bei den Herausgebern. Die auf der Plattform e-periodica veröffentlichten Dokumente stehen für nicht-kommerzielle Zwecke in Lehre und Forschung sowie für die private Nutzung frei zur Verfügung. Einzelne Dateien oder Ausdrucke aus diesem Angebot können zusammen mit diesen Nutzungsbedingungen und den korrekten Herkunftsbezeichnungen weitergegeben werden. Das Veröffentlichen von Bildern in Print- und Online-Publikationen ist nur mit vorheriger Genehmigung der Rechteinhaber erlaubt. Die systematische Speicherung von Teilen des elektronischen Angebots auf anderen Servern bedarf ebenfalls des schriftlichen Einverständnisses der Rechteinhaber. Haftungsausschluss Alle Angaben erfolgen ohne Gewähr für Vollständigkeit oder Richtigkeit. Es wird keine Haftung übernommen für Schäden durch die Verwendung von Informationen aus diesem Online-Angebot oder durch das Fehlen von Informationen. Dies gilt auch für Inhalte Dritter, die über dieses Angebot zugänglich sind. Ein Dienst der ETH-Bibliothek ETH Zürich, Rämistrasse 101, 8092 Zürich, Schweiz, www.library.ethz.ch http://www.e-periodica.ch IABSE PERIODICA 2/1987 IABSE SURVEYS S-37/87 17 Report on the Use of Computers in 1986 Rapport sur l'utilisation des ordinateurs en 1986 Bericht über Verwendung des Computers im Jahre 1986 prepared by Working Commission VI of IABSE «Informatics in Structural Engineering» coordinated by Aksel G.
    [Show full text]
  • CHM Packaged Software Collection
    http://oac.cdlib.org/findaid/ark:/13030/c8183dmr No online items Guide to the CHM packaged software collection Finding aid prepared by Sara Chabino Lott and Elena Colon-Marrero Processing of this collection was made possible through generous funding from the National Archives’ National Historical Publications & Records Commission: Access to Historical Records grant. Computer History Museum 1401 N. Shoreline Blvd. Mountain View, CA, 94043 (650) 810-1010 [email protected] 3/19/2020 Guide to the CHM packaged 1 software collection Title: CHM packaged software collection Contributing Institution: Computer History Museum Language of Material: English Physical Description: 52.5 Linear feet,42 record cartons Date (inclusive): 1962-2003 Abstract: The CHM packaged software collection contains commercially produced software primarily for the personal computer dated between 1962 and 2003. Access Restrictions The collection is open for research. Publication Rights The Computer History Museum (CHM) can only claim physical ownership of the collection. Users are responsible for satisfying any claims of the copyright holder. Requests for copying and permission to publish, quote, or reproduce any portion of the Computer History Museum’s collection must be obtained jointly from both the copyright holder (if applicable) and the Computer History Museum as owner of the material. Physical Characteristics and Technical Requirements The collection contains media that has not been read by CHM staff. Contact the CHM archives staff for more information. Preferred Citation [Identification of Item], [Date], CHM packaged software collection, Lot [#], Box [#], Folder [#], Catalog [#], Computer History Museum. Scope and Content of the Collection The CHM packaged software collection contains commercially produced software programs produced by a variety of software and computing firms, including Lotus, Apple, Electronic Arts, Borland, Grid, Novell, IBM and others.
    [Show full text]
  • Z/OS Planning for Installation How to Send Your Comments to IBM
    z/OS 2.4 Planning for Installation IBM GA32-0890-40 Note Before using this information and the product it supports, read the information in “Notices” on page 165. This edition applies to Version 2 Release 4 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2021-06-24 © Copyright International Business Machines Corporation 2002, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Tables................................................................................................................. vii About this document.............................................................................................ix Who should read this document................................................................................................................. ix How to use this document.......................................................................................................................... ix z/OS information..........................................................................................................................................ix How to send your comments to IBM.......................................................................xi If you have a technical problem..................................................................................................................xi Summary of changes...........................................................................................xiii
    [Show full text]
  • MA MBC6890 A50823user Guide.Cdr
    Notices PC Worth makes no warranty of any kind with regard to this publication, including, but not limited to, the implied warranty of merchantability and fitness for any particular purpose. PC Worth shall not be liable for errors contained herein or for incidental consequential damages in connection with the furnishing, performance, or use of this publication. This publication contains proprietary information that is protected by copyright. All rights are reserved. No part of this publication may be photocopied, reproduced or translated into any language, in any forms, in an electronic retrieval system or otherwise, without prior written permission of PC Worth. The information contained in this publication may be revised or withdrawn at any time without notice. Trademarks All registered and unregistered trademarks used herein are the exclusive property of their respective owners. Copyright Copyright 1998-2005 PC Worth Int'l Co., Ltd. Copyright 1998-2005 Cino Group Regulatory Information This device complies with Part 15 of the FCC Rules. Operation is subject to the following conditions: This device may not cause harmful interference. This device must accept any interference received, including interference that may cause undesired operation. Note: This equipment has been tested and found to comply with the limits for a class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.
    [Show full text]
  • MS100 Bar Code Pen Reader Adventurejan General Advisory
    MS100 Bar Code Pen Reader AdventureJan General Advisory Improper handling, storage, environmental influences and /or product modification can lead to problems during use. This is particularly true if repairs and maintenance work are not performed by trained personnel. We reserve the right to make technical modifications in accor- dance with technological advancements as they occur. FCC Information This device has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the device is operated in a commercial environment. This device gener- ates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required to correct the interference at his or her own expense. MS100 Manual TABLE OF CONTENTS INTRODUCTION . 1 SCANNER CONFIGURATION MANAGER. 3 Device. 6 Beeps and Delays. 6 Keyboard Wedge. 7 RS232. 9 Scanner Port. 11 Bar Code Symbologies. 14 Data Editing. 22 PROGRAMMING VIA SCANNER INPUT. 25 Quick Setup Bar Codes. 26 Device Selection and Default. 28 Beeps and Delays. 29 Keyboard Wedge. 30 RS232. 31 Scanner Port. 33 Bar Code Symbologies. 35 Data Editing. 40 Function Codes. 45 ASCII Chart. 46 SPECIFICATIONS. 48 TROUBLESHOOTING . 50 WARRANTY. 53 BAR CODE TEST CHART. 54 MS100 Manual INTRODUCTION The MS100 is a family of pen style bar code readers specifically designed to be a simple, unobtrusive method of scanning bar codes.
    [Show full text]
  • Japanese Apl Language System on Ibm Multistation
    JAPANESEAPL LANGUAGESYSTEM ON IBM MULTISTATION 5550 M. Udo, Y.Akimoto, S.Kaneko, T.Sanuki (*) and M.Alfonseca (**) (*) Tokyo Scientific Center, Science Institute, IBM Japan, Ltd. 5-19, Samban-cho, Chiyoda-ku, Tokyo, Japan (**) IBM Madrid Scientific Center P. Castellana, 4. Madrid-l, Spain ABSTRACT date national languages other than occidental lan- guages, such as Arabic, Chinese, Japanese and so on, programming languages should remove the present This paper exemplifies the national language support 256-character limitation that confines legitimate of a programming language by describing the imple- characters to traditional alphanumerics. mentation of APL with a language facility for proc- essing Japanese characters: that is, a character set The Japanese characters consist of several thousands that has "wide" characters that occupy space of more of ideographic characters (Kanji), adapted from Chi- than one byte. By national language support, in nese, as well as two Japanese phonetic alphabets, we mean that users are enabled to use this paper, Ksna (Hira-kana and Kata-kana). Each of the Kana their own national language in the data, as legal character sets consists of 46 different symbols, character strings of the programming language. We each expressing a simple sound of the Japanese syl- describe the implementation of APL that provides labary, with the addition of some diacritical marks Japanese language support in the above sense on a and subscripted symbols. In the Japanese writing personal computer called the IBM Multistation 5550. system we use a mixture of Kanji and Kana, where Kan- We also discuss the design principle adopted to ji is used as the root words and Kana as inflections include a new two-byte character set in APL data for most purposes, as well as Arabic numbers and objects coexisting with a conventional one-byte APL Roman alphabets.
    [Show full text]
  • IBM GDDM General Information GC33-0866-03
    GDDM IBM General Information Version 3 Release 2 GC33-0866-03 GDDM IBM General Information Version 3 Release 2 GC33-0866-03 Note! Before using this information and the product it supports, be sure to read the general information under “Notices” on page vii. | Fourth Edition (December 2001) This edition applies to the following IBM GDDM series of licensed programs: Program number Program name Version Release Modification 5695-167 GDDM/MVS 3 2 0 5684-168 GDDM/VM 3 2 0 5686-057 GDDM/VSE 3 2 0 5668-812 GDDM-PGF 2 1 3 5668-723 GDDM-IVU 1 1 3 5668-802 GDDM-GKS 1 1 3 5668-801 GDDM Interactive Map Definition 2 1 3 GDDM/MVS as a base element of OS/390 (program number 5645-001) GDDM-PGF as an optional feature of OS/390 GDDM-REXX/MVS as an optional feature of OS/390 and to all subsequent versions, releases, and modifications until otherwise indicated in new editions. Consult the latest edition of the applicable IBM system bibliography for current information on this product. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the addresses given below. At the back of this publication is a page titled “Sending your comments to IBM”. If you want to make comments, but the methods described are not available to you, please address them to: IBM United Kingdom Laboratories, Information Development, Mail Point 095, Hursley Park, Winchester, Hampshire, England, SO21 2JN. When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you.
    [Show full text]
  • СКАНЕРЫ ШТРИХ-КОДА CCS-21Xx CCS-4100 ICS-1100 ICS-7100
    СКАНЕРЫ ШТРИХ-КОДА CCS-21xx CCS-4100 ICS-1100 ICS-7100 РУКОВОДСТВО ПОЛЬЗОВАТЕЛЯ Содержание Глава 1. Приступаем к работе................................................................................................. 4 Общая информация.............................................................................................................. 4 CCS-21xx – сканеры штрихового кода начального уровня ............................................. 4 Модель CCS-2100 с универсальным интерфейсом....................................................... 4 Модели CCS-2120, 2130, 2140 с моно интерфейсом .................................................... 5 CCS-4100 – имидж-сканеры штрихового кода начального уровня................................. 5 ICS-1100 – универсальные сканеры штрихового кода ..................................................... 6 ICS-7100 – универсальные сканеры штрихового кода ..................................................... 6 IMS-3100 - беспроводные универсальные сканеры.......................................................... 7 Подключение сканера.......................................................................................................... 7 Подключение и отключение интерфейсного кабеля. Модель ICS-1100..................... 7 Подключение и отключение интерфейсного кабеля. Модель CCS-2100. .................. 8 Подключение питания ..................................................................................................... 8 Глава 2. Настройка сканера....................................................................................................
    [Show full text]