IP User's Guide and Commands

Total Page:16

File Type:pdf, Size:1020Kb

IP User's Guide and Commands z/OS Communications Server IP User’s Guide and Commands Version 1 Release 4 SC31-8780-02 z/OS Communications Server IP User’s Guide and Commands Version 1 Release 4 SC31-8780-02 Note: Before using this information and the product it supports, be sure to read the general information under “Notices” on page 425. Third Edition (September 2002) This edition applies to Version 1 Release 4 of z/OS (5694-A01) and Version 1 Release 4 of z/OS.e (5655-G52) and to all subsequent releases and modifications until otherwise indicated in new editions. Publications are not stocked at the address given below. If you want more IBM® publications, ask your IBM representative or write to the IBM branch office serving your locality. A form for your comments is provided at the back of this document. If the form has been removed, you may address comments to: IBM Corporation Software Reengineering Department G7IA/ Bldg 503 Research Triangle Park, NC 27709-9990 U.S.A. If you prefer to send comments electronically, use one of the following methods: Fax (USA and Canada): 1-800-254-0206 Internet e-mail: [email protected] World Wide Web: http://www.ibm.com/servers/eserver/zseries/zos/webqs.html IBMLink™: CIBMORCF at RALVM17 IBM Mail Exchange: [email protected] When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1990, 2002. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures............................xi Tables............................xiii About this document ......................xv Who should use this document ...................xv Where to find more information ...................xv Where to find related information on the Internet ...........xv Accessing z/OS licensed documents on the Internet ..........xvi Using LookAt to look up message explanations............xvii How to contact IBM service ...................xvii z/OS Communications Server information ..............xvii Summary of changes .....................xxv Chapter 1. Getting started.....................1 Understanding TCP/IP ......................1 Physical network........................1 Protocols ..........................2 Network devices ........................2 Addresses ..........................2 How TCP/IP uses networks.....................2 Local and remote nodes .....................2 Client and server .......................2 TCP/IP addresses .......................3 Network names ........................3 Ports and port numbers .....................3 Understanding what you can do ...................4 Logging on to other hosts ....................4 Transferring data sets between hosts ................4 Sending and receiving mail ....................4 Remote command execution ...................5 Printing to or from other hosts ...................5 What you need to get started ....................6 Testing commands with loopback ..................6 Obtaining command help .....................7 Chapter 2. Logging on to a host using TELNET ............9 Using the TSO TELNET command ..................9 TELNET command ......................10 Using the TELNET subcommands ..................13 AO—Terminate output display ..................14 AYT—Query the connection ...................15 BRK—Send a Break or Attention keystroke to a host ..........16 HELP or ?—Display help information ................17 IP—Interrupt the process ....................18 PA1—Send the PA1 keystroke to a host ..............19 QUIT—End the TELNET session .................20 SYNCH—Clear the data path ..................21 ¢ and `—Send ASCII control characters to a host in line mode ......22 Using the TELNET function keys ..................23 Transparent mode function keys .................23 Line mode function keys ....................23 © Copyright IBM Corp. 1990, 2002 iii Suppressing carriage return and line feed ...............23 Using TELNET 3270 DBCS transform mode ..............24 Terminal and conversion type ..................26 Chapter 3. File Transfer Protocol (FTP) ...............29 Using the FTP command .....................29 FTP command—Enter the FTP environment .............30 Logging in to FTP .......................35 Allocating FTP input and output data sets ..............35 UTF-8 enabled control connection .................36 NETRC data set .......................37 Getting help ..........................37 Establishing and exiting a connection ................38 Example of establishing and exiting a connection ...........38 Initial Working Directory Considerations at the z/OS FTP Server......39 Obtaining status and system information ...............40 Working with directories on the remote host ..............41 Examples of the CD subcommand.................41 Examples showing the differences between DIR and LS output for HFS directories .........................42 Examples showing the differences between DIR and LS output with DIRECTORYMode and DATASetmode for MVS ...........43 Working with directories on the local host ...............45 Security considerations ......................46 Using security mechanisms ...................46 Using a SOCKS server .....................47 Chapter 4. Transferring data using the File Transfer Protocol (FTP) ....49 Preparing the environment ....................49 Transferring data ........................50 How to transfer data ......................50 Examples of GET and MGET subcommands .............51 Examples of PUT and MPUT subcommands .............56 DD name support .......................58 Load Module Transfer (LMTR) ..................60 Changing local site defaults using FTP.DATA ..............63 Statistics for PDS members ...................75 Setting user-level options using FTPS.RC ..............75 Configuring the FTP client for SOCKS server.............76 Sample FTP.DATA data set (FTCDATA) ................77 Using different SBCS translation tables for the control and data connections 85 || Using different MBCS translation tables for the data connection .......85 Specifying values for new data sets .................86 Dynamic allocation ......................86 Storage Management Subsystem (SMS) ..............87 Steps for using a DCBDSN model to create a new data set .......87 Generation data group support ...................88 GDG examples ........................89 Submitting FTP requests in batch ..................91 Submitting requests without input and output data sets .........94 Using the EXEC interface .....................94 Issuing FTP subcommands from a file ...............95 Issuing FTP subcommands directly from the EXEC interface .......96 FTP EXIT return codes ......................97 FTP subcommand codes ....................98 FTP reply codes .......................100 iv z/OS V1R4.0 CS: IP User’s Guide and Commands FTP client error codes.....................100 Restarting a failed data transfer ..................101 Interfacing with JES ......................101 Steps for submitting a job ...................102 Displaying the status of a job ..................103 Receiving spool output ....................104 Deleting a job ........................106 Steps for submitting a job and automatically receiving output ......106 Terminating access to JES ...................107 JESINTERFACELEVEL differences ................107 JES security ........................109 JES examples ........................111 Performing DB2 SQL queries with FTP ...............117 SQL data types supported by FTP ................117 Creating the input data set ...................118 Setting the characteristics for the SQL query ............118 Submitting the query .....................121 Examples of SQL query output .................122 FTP with DBCS support .....................123 Selecting a DBCS translation table ................123 Selecting an SBCS translation table................123 DBCS subcommands .....................124 Server commands and client subcommands.............124 Mapping DBCS aliases to CCSIDs ................125 Chapter 5. FTP subcommands ..................127 ! subcommand—Invoke a z/OS UNIX System Services function ......130 ACcount subcommand—Supply account information ..........131 APpend subcommand—Append a local data set ............132 AScii subcommand—Change the data transfer type to ASCII .......134 BIG5 subcommand—Change the data transfer type to BIG5........135 BINary subcommand—Change the data transfer type to Image ......137 BLock subcommand—Set the block data transfer mode .........138 CCc subcommand—Turn off integrity protection ............139 CD subcommand—Change the directory on the remote host .......140 CDUp subcommand—Change to the parent of the working directory.....143 CLEar subcommand—Set the protection level for data transfers to CLEAR 145 CLose subcommand—Disconnect from a remote host ..........146 COMpress subcommand—Set the compressed data transfer mode .....147 CProtect subcommand— Set the protection level on commands ......148 DEBug subcommand—Set general trace options ............149 DELEte subcommand—Delete files .................153 DELImit subcommand—Display the file name delimiter..........154 DIr subcommand—Obtain a list of directory entries ...........155 DUMP subcommand—Set extended trace options ...........159 EBcdic subcommand—Change the data transfer type to EBCDIC ......161 EUckanji subcommand—Change
Recommended publications
  • Ecaccess User Guide
    ECaccess User Guide User Support Operations Department Version 3.3.0 May 2009 c Copyright 2009 European Centre for Medium-Range Weather Forecasts Shinfield Park, Reading, RG2 9AX, United Kingdom Literary and scientific copyrights belong to ECMWF and are reserved in all countries. The information within this publication is given in good faith and considered to be true, but ECMWF accepts no liability for error, omission and for loss or damage arising from its use. CONTENTS Contents 1 Introduction 3 2 Ecaccess concepts 4 2.1 ECaccess gateway ......................................... 4 2.2 Using an ECaccess gateway ................................... 5 2.3 Plugins ............................................... 5 3 Security authentication 7 3.1 ECaccess certificate ........................................ 7 3.2 ECcert command ......................................... 7 4 Unattended file transfers initiated from ECMWF 10 4.1 Target location ........................................... 10 4.2 ECtrans command ......................................... 11 4.2.1 Transfer to a Member State host via gateway ....................... 12 4.2.2 Transfer from a Member State host via gateway ...................... 12 5 Shell commands 14 5.1 Environment ............................................ 14 5.2 Access to Shell commands .................................... 15 5.3 General information ........................................ 15 5.4 File management ......................................... 15 5.5 Batch job management .....................................
    [Show full text]
  • Unicode and Code Page Support
    Natural for Mainframes Unicode and Code Page Support Version 4.2.6 for Mainframes October 2009 This document applies to Natural Version 4.2.6 for Mainframes and to all subsequent releases. Specifications contained herein are subject to change and these changes will be reported in subsequent release notes or new editions. Copyright © Software AG 1979-2009. All rights reserved. The name Software AG, webMethods and all Software AG product names are either trademarks or registered trademarks of Software AG and/or Software AG USA, Inc. Other company and product names mentioned herein may be trademarks of their respective owners. Table of Contents 1 Unicode and Code Page Support .................................................................................... 1 2 Introduction ..................................................................................................................... 3 About Code Pages and Unicode ................................................................................ 4 About Unicode and Code Page Support in Natural .................................................. 5 ICU on Mainframe Platforms ..................................................................................... 6 3 Unicode and Code Page Support in the Natural Programming Language .................... 7 Natural Data Format U for Unicode-Based Data ....................................................... 8 Statements .................................................................................................................. 9 Logical
    [Show full text]
  • United States Patent (19) 11 Patent Number: 5,689,723 Lim Et Al
    US005689723A United States Patent (19) 11 Patent Number: 5,689,723 Lim et al. 45) Date of Patent: Nov. 18, 1997 (54) METHOD FOR ALLOWINGSINGLE-BYTE 5,091,878 2/1992 Nagasawa et al. ..................... 364/419 CHARACTER SET AND DOUBLE-BYTE 5,257,351 10/1993 Leonard et al. ... ... 395/150 CHARACTER SET FONTS IN ADOUBLE 5,287,094 2/1994 Yi....................... ... 345/143 BYTE CHARACTER SET CODE PAGE 5,309,358 5/1994 Andrews et al. ... 364/419.01 5,317,509 5/1994 Caldwell ............................ 364/419.08 75 Inventors: Chan S. Lim, Potomac; Gregg A. OTHER PUBLICATIONS Salsi, Germantown, both of Md.; Isao Nozaki, Yamato, Japan Japanese PUPA number 1-261774, Oct. 18, 1989, pp. 1-2. Inside Macintosh, vol. VI, Apple Computer, Inc., Cupertino, (73) Assignee: International Business Machines CA, Second printing, Jun. 1991, pp. 15-4 through 15-39. Corp, Armonk, N.Y. Karew Acerson, WordPerfect: The Complete Reference, Eds., p. 177-179, 1988. 21) Appl. No.: 13,271 IBM Manual, "DOSBunsho (Language) Program II Opera 22 Filed: Feb. 3, 1993 tion Guide” (N:SH 18-2131-2) (Partial Translation of p. 79). 51 Int. Cl. ... G09G 1/00 Primary Examiner-Phu K. Nguyen 52) U.S. Cl. .................. 395/805; 395/798 Assistant Examiner-Cliff N. Vo (58) Field of Search ..................................... 395/144-151, Attorney, Agent, or Firm-Edward H. Duffield 395/792, 793, 798, 805, 774; 34.5/171, 127-130, 23-26, 143, 116, 192-195: 364/419 57 ABSTRACT The method of the invention allows both single-byte char 56) References Cited acter set (SBCS) and double-byte character set (DBCS) U.S.
    [Show full text]
  • Argus Research (July 2020)
    EQUITY RESEARCH REPORT July 13, 2020 MOLECULAR DATA INC. (NCM: MKD) Founded in 2013, China-based Molecular Data operates an e-commerce platform that KEY STATISTICS connects and serves participants of the Chinese chemicals industry across the value chain. Key Stock Statistics COMPANY HIGHLIGHTS Recent price (7/7/20) $2.40 * MKD: Connecting China’s Chemical Industry Value Chain 52 week high/low $11.80/$0.57 ADS Outstanding (M) 115 * In our view, Molecular Data has assembled a comprehensive network that can capture value across multiple previous pain points in China’s fragmented chemicals industry. Market cap (M) $276.0 Dividend Nil * After several years of organically building platform capabilities to include financial services, warehousing, logistics and software as a service (SaaS) offerings, Molecular Yield Nil Data should now be able to diversify its revenue stream beyond its core chemical direct e-commerce sales. This should lead to enhanced profit margins and, ultimately, sustainable Sector Overview profitability. Sector Materials * At the end of 2019, Molecular Data completed an initial public offering that yielded net Sector % of S&P 500 2.5% proceeds of approximately $55 million. As a result, we view the company as well posi- tioned to invest in its integrated e-commerce platform with new higher-margin services, and to pursue the acquisition of new capabilities and services globally. Financials ($M) * Although we expect near-term financial results to be impacted by the COVID-19 outbreak, Cash & Mkt Securities 8.3 which forced many customers and suppliers to halt operations throughout the first half of Debt 2.0 2020, we are encouraged by continued robust traffic on the Molbase platform.
    [Show full text]
  • Openvms: an Introduction
    The Operating System Handbook or, Fake Your Way Through Minis and Mainframes by Bob DuCharme VMS Table of Contents Chapter 7 OpenVMS: An Introduction.............................................................................. 7.1 History..........................................................................................................................2 7.1.1 Today........................................................................................................................3 7.1.1.1 Popular VMS Software..........................................................................................4 7.1.2 VMS, DCL................................................................................................................4 Chapter 8 Getting Started with OpenVMS........................................................................ 8.1 Starting Up...................................................................................................................7 8.1.1 Finishing Your VMS Session...................................................................................7 8.1.1.1 Reconnecting..........................................................................................................7 8.1.2 Entering Commands..................................................................................................8 8.1.2.1 Retrieving Previous Commands............................................................................9 8.1.2.2 Aborting Screen Output.........................................................................................9
    [Show full text]
  • Operating System User's Mannal ~Zilog 03-0072-01 Revision a September 1978
    t_ .' Operating System User's Mannal ~Zilog 03-0072-01 Revision A September 1978 Copyright © 1978 by Zilog, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of Zilog. Zilog assumes no responsibility for the use of any circuitry other than circuitry embodied in a Zilog product. No other circuit patent licenses are implied. zaO-RIO Operating System User's Manual September 1978 TABLE OF CONTENTS CHAPTER 1 - INTRODUCTION AND OVERVIEW • 1 1.1 INTRODUCTION •• 1 1.2 SYSTEM OVERVIEW 3 1.2.1 Hardware Configuration • • • • • • 3 1.2.2 File Systems • • • • • • • . • • 3 1.2.3 System Initialization •••.••• 6 1.2.4 Commands • • .• .•..••• 7 1.2.5 I/O • • • . • • • • • . • • • • • . 7 CHAPTER 2 - RIO EXECUTIVE 9 2.1 SYSTEM INITIALIZATION 9 2.2 FILE NAME CONVENTIONS · 10 2.3 MEMORY MANAGEMENT . • • . 12 2.3.1 MEMMGR • . 13 2.4 COMMAND STRING INTERPRETATION · 13 2.5 ERROR HANDLING • • . 15 2.6 PROGRAM EXECUTION OF COMMANDS · 15 CHAPTER 3 - 1/0 STRUCTURE • · 16 3.1 OVERVIEW . • · 16 3.2 I/O REQUESTS - SYSTEM CALLS · 17 3.3 THE 'ASSIGN' I/O REQUEST ••• • 19 - i - 3.4 STANDARD RIO I/O DEVICES • • • 21 3.4.1 ZDOS . • • • . 21 3.4.2 DFS . 21 3.4.3 NULL . • • • . 21 3.4.4 CON . • • • . • • • • • 22 3.4.5 PCON • 27 3.4.6 FLOPPY • • • • • • • • • • 27 3.4.7 DISK • • • • • • 27 CHAPTER 4 - PROGRAM INTERFACE • • 28 4.1 PROGRAM LOCATION • • • • • 28 4.2 PARAMETER STRING ADDRESS · 29 4.3 PROGRAM STACK SPACE • • • 29 4.4 PROGRAM TERMINATION - ERROR HANDLING ••.
    [Show full text]
  • Supplementary Material for Traditional Agricultural Practices and the Sex Ratio Today Alberto Alesina1,2, Paola Giuliano3,2,*, Nathan Nunn1,2
    Supplementary Material for Traditional agricultural practices and the sex ratio today Alberto Alesina1,2, Paola Giuliano3,2,*, Nathan Nunn1,2 1 Harvard University. 2 NBER. 3 UCLA. *Correspondence to: [email protected] The Supplementary Material provides details on the data sources and the robustness of the analysis for the results derived in the paper. Additional details on the Ethnographic Atlas The Ethnographic Atlas was constructed by George Peter Murdock. It contains ethnographic information for 1,265 ethnic groups worldwide. The period in which the information was collected varies by ethnicity, with the earliest observation dates coming from ethnicities in the Old World (where early written evidence is available) and the most recent information dating around the 20th century, for those parts of the world without a written history and directly observed by anthropologists. All societies are observed prior to industrialization. In total, 23 ethnicities are observed during the 17th century or earlier, 16 during the 18th century, 310 during the 19th century, 876 between 1900 and 1950, and 31 after 1950. For nine ethnicities, an exact year is not provided. The variable v39 classifies each ethnic group as being in one of the following three categories: (1) the plough was absent, (2) the plough existed at the time the group was observed, but it was not aboriginal, and (3) the plough was aboriginal, having existed prior to contact. Using this information, we construct an indicator variable that equals one if the plough was ever adopted during the pre-industrial period (whether aboriginal or not) and zero otherwise. Of the 1,156 ethnicities for which information exists, for 997 the plough was absent, for 141 the plough was adopted (and aboriginal), and for 18 it was adopted, but after European contact.
    [Show full text]
  • Resource Management: Linux Kernel Namespaces and Cgroups
    Resource management: Linux kernel Namespaces and cgroups Rami Rosen [email protected] Haifux, May 2013 www.haifux.org 1/121 http://ramirose.wix.com/ramirosen TOC Network Namespace PID namespaces UTS namespace Mount namespace user namespaces cgroups Mounting cgroups links Note: All code examples are from for_3_10 branch of cgroup git tree (3.9.0-rc1, April 2013) 2/121 http://ramirose.wix.com/ramirosen General The presentation deals with two Linux process resource management solutions: namespaces and cgroups. We will look at: ● Kernel Implementation details. ●what was added/changed in brief. ● User space interface. ● Some working examples. ● Usage of namespaces and cgroups in other projects. ● Is process virtualization indeed lightweight comparing to Os virtualization ? ●Comparing to VMWare/qemu/scaleMP or even to Xen/KVM. 3/121 http://ramirose.wix.com/ramirosen Namespaces ● Namespaces - lightweight process virtualization. – Isolation: Enable a process (or several processes) to have different views of the system than other processes. – 1992: “The Use of Name Spaces in Plan 9” – http://www.cs.bell-labs.com/sys/doc/names.html ● Rob Pike et al, ACM SIGOPS European Workshop 1992. – Much like Zones in Solaris. – No hypervisor layer (as in OS virtualization like KVM, Xen) – Only one system call was added (setns()) – Used in Checkpoint/Restart ● Developers: Eric W. biederman, Pavel Emelyanov, Al Viro, Cyrill Gorcunov, more. – 4/121 http://ramirose.wix.com/ramirosen Namespaces - contd There are currently 6 namespaces: ● mnt (mount points, filesystems) ● pid (processes) ● net (network stack) ● ipc (System V IPC) ● uts (hostname) ● user (UIDs) 5/121 http://ramirose.wix.com/ramirosen Namespaces - contd It was intended that there will be 10 namespaces: the following 4 namespaces are not implemented (yet): ● security namespace ● security keys namespace ● device namespace ● time namespace.
    [Show full text]
  • IODF Explorer
    The Input/Output Definition File (IODF) is a critical Control Point in the management of the IBM z/Series Platform. IODF Explorer Release 4.0 USER GUIDE Contact us for additional information: NewEra Software Technical Support 800-421-5035 [email protected] www.newera.com Rev: 2009-04-24 IODF Explorer 4.0 ¾ Copyright, Trademark and Legal Notices Copyrights This Getting Started Guide and the related Software Product(s) are protected under a Copyright dated 2009 by NewEra Software, Inc. All rights are reserved. License Agreement This Getting Started Guide describes the installation and operation of Image FOCUS, its environment and applications. It is made available only under the terms of a license agreement between the licensee and NewEra Software Inc. No part of this Guide or the related Software Product(s) may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose, without the express written permission of NewEra Software, Inc. Trademarks and Copyrights of Others The following products and/or registered trademarks of International Business Machines Corporation are referenced in this document: MVS, VM, RACF, z/OS, SYSPLEX, JES, VTAM, TSO, ISPF, ICKDSF, DFSMSdss, DF/DSS, and others. 2 NewEra Software, Inc. ‐ Image Control Environment (ICE) Applications IODF Explorer 4.0 ¾ Technical Support Information NewEra Software is dedicated to providing the highest level of technical Around-the-clock- support support to meet our customers’ growing needs. In order to meet these needs, NewEra provides around‐the‐clock technical support, 7 days a week, 24 hours a day.
    [Show full text]
  • Hardware Configuration Definition User's Guide
    z/OS Version 2 Release 3 Hardware Configuration Definition User's Guide IBM SC34-2669-30 Note Before using this information and the product it supports, read the information in “Notices” on page 443. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1994, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures..................................................................................................... xiii List of Tables.....................................................................................................xxiii About this document.......................................................................................... xxv Who this document is for..........................................................................................................................xxv Related information.................................................................................................................................. xxv How to use this document.......................................................................................................................xxvi How this document is organized............................................................................................................. xxvi How to read syntax diagrams................................................................................................................
    [Show full text]
  • AIX Globalization
    AIX Version 7.1 AIX globalization IBM Note Before using this information and the product it supports, read the information in “Notices” on page 233 . This edition applies to AIX Version 7.1 and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2010, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this document............................................................................................vii Highlighting.................................................................................................................................................vii Case-sensitivity in AIX................................................................................................................................vii ISO 9000.....................................................................................................................................................vii AIX globalization...................................................................................................1 What's new...................................................................................................................................................1 Separation of messages from programs..................................................................................................... 1 Conversion between code sets.............................................................................................................
    [Show full text]
  • Data Encoding: All Characters for All Countries
    PhUSE 2015 Paper DH03 Data Encoding: All Characters for All Countries Donna Dutton, SAS Institute Inc., Cary, NC, USA ABSTRACT The internal representation of data, formats, indexes, programs and catalogs collected for clinical studies is typically defined by the country(ies) in which the study is conducted. When data from multiple languages must be combined, the internal encoding must support all characters present, to prevent truncation and misinterpretation of characters. Migration to different operating systems with or without an encoding change make it impossible to use catalogs and existing data features such as indexes and constraints, unless the new operating system’s internal representation is adopted. UTF-8 encoding on the Linux OS is used by SAS® Drug Development and SAS® Clinical Trial Data Transparency Solutions to support these requirements. UTF-8 encoding correctly represents all characters found in all languages by using multiple bytes to represent some characters. This paper explains transcoding data into UTF-8 without data loss, writing programs which work correctly with MBCS data, and handling format catalogs and programs. INTRODUCTION The internal representation of data, formats, indexes, programs and catalogs collected for clinical studies is typically defined by the country or countries in which the study is conducted. The operating system on which the data was entered defines the internal data representation, such as Windows_64, HP_UX_64, Solaris_64, and Linux_X86_64.1 Although SAS Software can read SAS data sets copied from one operating system to another, it impossible to use existing data features such as indexes and constraints, or SAS catalogs without converting them to the new operating system’s data representation.
    [Show full text]