Systems OS/VS2 Access Method Services

Total Page:16

File Type:pdf, Size:1020Kb

Systems OS/VS2 Access Method Services GC26-3841-0 File No. S370-30 Systems OS/VS2 Access Method Services Release 3 I !. ' First Edition (February 1975) This is the first edition of a new publication that applies to Release 3 of OS/VS2 and to all subsequent releases of that system unless otherwise indicated in new editions or technical newsletters. Another new publication, OS/VSJ Access Method Services, GC26-3840, contains corresponding OS/VS 1 information. OS/VS2 and OS/VS 1 information was previously intermingled in OS/VS Access Method Services, GC26-3836; this previous publication is now out of date for both OS/VS2 and OS/VS 1. (Information on the Mass Storage System is only for planning purposes until the availability of that product.) Significant system changes are summarized under "Summary of Amendments" following the list of figures. In additioll, miscellaneous editorial and technical changes have been made throughout the publication. Each technical change is marked by a vertical line to the left of the change. Information in this publication is subject to significant change. Any such changes will be published in new editions or technical newsletters. Before using the pUblication, consult the latest Virtual Storage Supplement (to IBM System/360 and System/370 Bibliography), GC20-0001, and the technical newsletters that amend the bibliography, to learn which editions and technical newsletters are applicable and current. Requests for copies of IBM publications should be made to the IBM branch office that serves you. Forms for readers' comments are provided at the back of the publication. If the forms have been removed, comments may be addressed to IBM Corporation, System Development Division, LDF Publishing-Department J04, 1501 California Avenue, Palo Alto, California 94304. All comments and suggestions become the property of IBM. © Copyright International Business Machines Corporation 1975 ABOIJT TIllS BOOK This book describes the use of Access Method Services commands for the Virtual Storage Access Method (VSAM). This publication provides all the VSAM information required to use Access Method Services to establish and maintain data sets. For information on the use of VSAM macro instructions, see OS/VS Virtual Storage Access Method (VSAM) Programmer's Guide. Readers of this book are presumed to have a background in programming. This book has the following major divisions: • "Guide to Access Method Services," which lists functions and the Access Method Services commands used to perform them. • "Introduction," which provides an overview of Access Method Services, including general language considerations, the structure of VSAM data sets, and the use of the 3850 Mass Storage System and the Time Sharing Option (TSO) with VSAM and Access Method Services. Everyone should read this chapter. • "Optimizing VSAM's Performance," which describes the factors that affect VSAM's performance that can be specified or influenced by values specified in Access Method Services commands. • "Data Security and Integrity," which describes the security and integrity features of VSAM that are specified as options in Access Method Services commands. • "Defining Entries," which describes the use of the DEFINE command to define catalogs, data spaces, VSAM data sets, and cataloging nonVSAM data sets. • "Altering Entries," which describes the use of the ALTER command to modify attributes in catalog entries. • "Listing Catalog Entries," which describes the use of the LISTCAT command to list catalog entries. • "Deleting Catalog Entries," which describes the use of the DELETE command to delete catalog entries. • "Moving Entries," which describes the use of the IMPORT and EXPORT commands to create a backup copy of a data set or to move a data set or user catalog between systems. • "Converting Catalog Entries," which describes the use of the CNVTCAT command to convert entries in an OS catalog to entries in a VSAM catalog. • "Verifying End-of-File," which describes the use of the VERIFY command to verify that the true end-of-file is reflected in the catalog. • "Copying and Printing ," which describes the use of the REPRO and PRINT commands to copy and print data, to reorganize data, to convert data from indexed-sequential or sequential organization to VSAM organization and from VSAM organization to sequential organization, and to copy catalogs. • "Listing Tape Volumes Mounted at Checkpoint," which describes the use of the CHKLIST command to list tape data sets that were open during a checkpoint. About This Book 3 • "Controlling Command Execution," which describes the use of the IF-DO-END command sequence, the SET command, and the P ARM command to control command execution and to specify diagnostic aids and printed-output options. • "Records Written to the SMF Data Set," which describes the contents of record types 63 and 67; these records conform to the SMF header format and are written to the SMF data set to provide for VSAM catalog recovery, but they are not to be treated as SMF records. • "Appendix A: Sample Output from Print," which shows output in each of the various formats provided by the PRINT command. • "Appendix B: Interpreting LISTCAT Output Listings," which provides information on the structure of LISTCAT output and shows sample output. "Appendix C: Sample Output from CHKLIST," which shows a CHKLIST I listing and explains its contents. • "Appendix D: JDL DD Parameters to Take Care With," which describes JCL parameters that have either no effect in a VSAM environment or that have a negative effect. • "Glossary," which defines terms relevant to Access Method Services and VSAM. • "Index," which is a subject index to the book. Required Publications The reader should be familiar with information presented in the following publications: • Operator's Library: OS/VS2 Reference (JES2), GC38-0210, which describes the initial program load (IPL) procedure; an alternate master catalog can be selected at IPL time in a VS2 system. • OS/VS Data Management Services Guide, GC26-3783, which presents basic concepts such as access method, direct-access storage, and the distinction between data-set organization and data-set processing. • OS/VS Message Library: VS2 System Messages, GC38-1002, which provides a complete listing of the messages issued by Access Method Services in a VS2 system. • OS/VS Utilities, GC35-0005, which describes the utility programs available for use with nonVSAM data sets in OS/VS2. • OS/VS Virtual Storage Access Method (VSAM) Programmer's Guide, GC26-3838, which describes the macro instructions used to process VSAM data sets and describes how to use an ISAM processing program to process a VSAM data set or an indexed-sequential data set that has been converted to VSAM format. • OS/VS2 JeL, GC28-0692, which describes the JCL parameters for VS2 described in this publication. • OS/VS2 Planning Guide for Release 3, GC28-0667, which describes the special features added to OS/VS2 with Release 3. 4 OS/VS2 Access Method Services • OS/VS2 System Programming Library: System Generation Reference, GC26-3792, which describes the use of the DATASET macro to create a master catalog in a VS2 system. Related Publications The following publications contain information that is related to this publication: • Introduction to the IBM 3850 Mass Storage System (MSS), GA32-0028, which introduces the storage devices and programming of the Mass Storage System. • OS/VS Checkpoint/Restart, GC26-3784, which explains how to take checkpoints and to restart processing. • OS /VS Mass Storage System (MSS) Planning Guide, GC35-0011, which gives a general description of the programming of the Mass Storage System. • OS/VS Mass Storage System (MSS) Services for Space Management, GC35-0012, which describes the Mass Storage System Access Method Services commands for space management in the Mass Storage System. This publication also describes the responsibilities of a person assigned to manage the space in the Mass Storage System. • OS/VS System Management Facilities (SMF), GC35-0004, which provides a complete description of the SMF records that describe VSAM. • OS/ VS Virtual Storage Access Method (VSAM) Options for Advanced Applications, GC26-3819, which provides information about advanced applications of VSAM, which the reader doesn't need to know about to make normal use of VSAM. The topics covered include: gaining access to control intervals; I/O buffering; constructing parameter lists for the macros that generate, modify, and examine control blocks at execution; processing an index as data; and processing a VSAM catalog as a key-sequenced data set. • OS/VS2 Access Method Services Logic, SY35-0010, which describes the functional operation of Access Method Services programs in an OS/VS2 system. • OS/VS2 Catalog Management Logic, SY26-3826, which describes the functional operation of VSAM Catalog Management in an OS/VS2 system. • OS/VS2 System Programming Library: Data Management, GC26-3830, which describes using the PROTECT macro. • OS/VS2 System Programming Library: Supervisor, GC28-0628, which describes the authorized program facility. • OS/VS2 TSO Command Language Reference, GC28-0646, which describes TSO commands. • OS/VS2 TSO Terminal User's Guide, GC28-0645, which describes commands available to the TSO terminal user. • OS/VS2 Using OS Catalog Management with the Master Catalog: CVOL Processor, GC35-0010, which describes the use of control volumes in a VS2 system. About This Book 5 • OS/VS2 Virtual Storage Access Method (VSAM) Logic, SY26-3825, which describes the functional operation of VSAM (Record Management, Open, Close, End-of-Volume, and Control Block Manipulation commands) in an OS/VS2 system. Notational Conventions A uniform system of notation describes the format of Access Method Services commands. This notation is not part of the language; it simply provides a basis for describing the structure of the commands. The command-format illustrations in this book use the following conventions: • Brackets [] indicate an optional field or parameter. • Braces { } indicate a choice of entry; unless a default is iindicated, you must choose one of the entries. • Items separated by a vertical bar ( I ) represent alternative items.
Recommended publications
  • IBM Mainframe Utility Programs ­ Wikipedia, the Free Encyclopedia IBM Mainframe Utility Programs from Wikipedia, the Free Encyclopedia
    9/11/2015 IBM mainframe utility programs ­ Wikipedia, the free encyclopedia IBM mainframe utility programs From Wikipedia, the free encyclopedia IBM mainframe utility programs are Utility software supplied with IBM mainframe operating systems such as MVS to carry out various tasks associated with datasets, etc. The following list describes utilities distributed with OS/360 and successors. No VSE or VM utilities are included. Contents 1 History/Common JCL 2 Dataset utilities 2.1 IDCAMS 2.2 IEBCOMPR 2.3 IEBCOPY 2.4 IEBDG 2.5 IEBEDIT 2.6 IEBGENER 2.7 IEBIMAGE 2.8 IEBISAM 2.9 IEBPTPCH 2.10 IEBUPDTE 3 Scheduler utilities 3.1 IEFBR14 4 System utilities 4.1 ICKDSF 4.2 IEHDASDR 4.3 IEHINITT 4.4 IEHLIST 4.5 IEHMOVE 4.6 IEHPROGM 5 Supporting programs 5.1 SORT 5.2 Compilers/Linker 5.3 DFSMS 6 References 7 See also 8 External links History/Common JCL Many of these utilities were designed by IBM users, through the group SHARE, and then modified or extended by IBM from versions originally written by a user. https://en.wikipedia.org/wiki/IBM_mainframe_utility_programs 1/14 9/11/2015 IBM mainframe utility programs ­ Wikipedia, the free encyclopedia These utilities are usually invoked via Job Control Language (JCL). They tend to use common JCL DD identifiers for their data sets: DDNAME Usual function input file for the 'commands' for the utility. Often set to DUMMY if the default action is SYSIN desired SYSUT1 input file SYSUT2 output file SYSUT3 work (spill) file for input (SYSUT1) (often not used) SYSUT4 work (spill) file for output (SYSUT2) (often not used) SYSPRINT output file for printed output from the utility SYSOUT output file for messages from the utility SYSUDUMP output file for a system 'dump' if the program fails Dataset utilities IDCAMS IDCAMS ("Access Method Services") generates and modifies Virtual Storage Access Method (VSAM) and Non­VSAM datasets.
    [Show full text]
  • Computer Labs for the Introduction to the New Mainframe: Z/OS Basics
    Computer Labs for the Introduction to the New Mainframe: z/OS Basics course Instructor Version The following labs are from the Introduction to the New Mainframe: z/OS Basics course/Redbook. These labs have been run and tested using the computer hub at Marist College in Poughkeepise, NY. You may need to adjust these labs to run on a computer system other than the one at Marist College. Chapter 2 Exercises (Section 2.16) ........................................................................................ 4 To display the CPU configuration ...................................................................................... 4 To display the page data set usage ..................................................................................... 4 To display information about the current Initial Program Load (IPL) ............................... 4 Instructor Notes .................................................................................................................. 4 Chapter 4 Exercises (Section 4.7) .......................................................................................... 5 4.7.1 Logging on to z/OS and entering TSO commands ................................................... 5 4.7.2 Navigating through the ISPF menu options .............................................................. 5 4.7.3 Using the ISPF editor ................................................................................................ 6 4.7.4 Using SDSF ..............................................................................................................
    [Show full text]
  • Systems OS/VS Virtual Storage Access Method (VSAM) Planning Guide
    GC26-3799-0 OS/VS Virtual Storage Access Method (VSAM) Systems Planning Guide First Edition (July 1972) This edition applies to release 2 of OS/VS1, to release 1 of OS/VS2, and to all subsequent releases until otherwise indicated in new editions or technical newsletters. Changes may be made to the information in this publication at any time; before using this publication in connection with the operation of IBM systems, consult the System/360 and System/370 Bibliography~ GA22-6822, and the latest System/360 and System/3 70 SRL Newsletter~ GN20-0360, for the editions that are applicable and current. Requests for copies of IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. Forms for readers' comments are provided at the back of this publication. If the forms have been removed, comments may be addressed to IBM Corporation, Programming Publications, Department D78, Monterey and Cottle Roads, San Jose, California 95114. Comments become the property of IBM. © Copyright International Business Machines Corporation 1972 USING THIS PUBLICATION This publication is intended to enable prospective users of VSAM (virtual storage access method), an access method of OS/VS (operating system/virtual storage), to prepare for using VSAM. The intended audience is data-processing managers whose decisions will influence the use of VSAM, system and application programmers who will make detailed preparations, and others seeking an introduction to VSAM. This planning guide has six chapters: "Introducing VSAM" outlines how VSAM meets the requirements of an access method in today's data-processing environment.
    [Show full text]
  • DFSMS Basics: Data Set Fundamentals Get to Know Your Data Sets!
    DFSMS Basics: Data Set Fundamentals Get to Know Your Data Sets! Neal Bohling and Tom Reed DFSMS Defect Support @ IBM August 7, 2014 Session Number 16119 What'sWhat's youryour experienceexperience level?level? IBM 7094 1965 ~500KHz Background To fully understand z/OS Data Sets, let's look at how data is stored Tape Disk (Sequential) (Direct) DASD Structure ModernModern Devices Devices are are Modeled Modeled after after this this architecture: architecture: 1 1 Track Track = = 56664 56664 Bytes Bytes 1 1 Cylinder Cylinder = = 15 15 Tracks Tracks Data Sets • Volumes provide a stream of data. 1100100111000010110101001100100111100010111000111100100011000101110000101100010111100010111000111100001111010110110101001 1010111111001001110001111001001110101011100011111000011110101101101010011010111110000011101010111101000110010011100001011 0101001100100111100010111000111100100011000101110000101100010111100010111000111100001111010110110101001101011111100100111 0001111001001110101011100011111000011110101101101010011010111110000011101010111101000110010011100001011010100110010011110 0010111000111100100011000101110000101100010111100010111000111100001111010110110101001101011111100100111000111100100111010 1011100011111000011110101101101010011010111110000011101010111101000110010011100001011010100110010011110001011100011110010 0011000101110000101100010111100010111000111100001111010110110101001101011111100100111000111100100111010101110001111100001 1110101101101010011010111110000011101010111101000110010011100001011010100110010011110001011100011110010001100010111000010
    [Show full text]
  • Introduction to the New Mainframe: Z/OS Basics
    Front cover Introduction to the New Mainframe z/OS Basics Basic mainframe concepts, including usage and architecture z/OS fundamentals for students and beginners Mainframe hardware and peripheral devices Mike Ebbers John Kettner Wayne O’Brien Bill Ogden ibm.com/redbooks International Technical Support Organization Introduction to the New Mainframe: z/OS Basics March 2011 SG24-6366-02 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. Third Edition (March 2011) © Copyright International Business Machines Corporation 2006, 2009, 2011. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Preface . xiii How this text is organized . xiv How each chapter is organized . xiv The team who wrote this book . xv Acknowledgements . xvi Now you can become a published author, too! . xix Comments welcome. xix Stay connected to IBM Redbooks . xix Summary of changes . xxi March 2011, Third Edition . xxi August 2009, Second Edition . xxi Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 3 1.1 The new mainframe. 4 1.2 The System/360: A turning point in mainframe history . 4 1.3 An evolving architecture . 5 1.4 Mainframes in our midst . 8 1.5 What is a mainframe . 9 1.6 Who uses mainframe computers. 12 1.7 Factors contributing to mainframe use . 15 1.8 Typical mainframe workloads . 22 1.9 Roles in the mainframe world . 29 1.10 z/OS and other mainframe operating systems .
    [Show full text]
  • Partitioned Data Set Extended Usage Guide
    Front cover Partitioned Data Set Extended Usage Guide Learn the latest PDSE functions Use PDSEs for storing programs Compare PDS and PDSE capabilities Mary Lovelace Anthony Fletcher Dirk Gutschke Massimo Mastrorilli ibm.com/redbooks International Technical Support Organization Partitioned Data Set Extended Usage Guide May 2005 SG24-6106-01 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. Second Edition (May 2005) This edition applies to Version1 Release 6 of z/OS (product number 5694-A01). © Copyright International Business Machines Corporation 2001, 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Preface . xiii Become a published author . xiv Comments welcome. .xv Chapter 1. Release summary . 1 1.1 z/OS V1R3 DFSMS changes . 2 1.1.1 PDSE enhancements delivered with base code . 2 1.1.2 PDSE enhancement delivered with APAR OW53245. 2 1.2 z/OS V1R5 DFSMS changes . 4 1.2.1 PDSE enhancements delivered with base code . 4 1.3 z/OS V1R6 DFSMS changes . 5 1.3.1 PDSE RAS restartable address space enhancement. 5 Chapter 2. PDSE overview and concepts . 7 2.1 History of PDSEs . 8 2.1.1 Extended sharing . 8 2.1.2 Storing executable code in PDSEs . 8 2.1.3 Non-SMS PDSEs . 9 2.2 Partitioned data set review . 9 2.2.1 Partitioned data set organization . 9 2.2.2 Where to use partitioned organization . 10 2.2.3 Advantages of partitioned organization.
    [Show full text]
  • Paper SAS1715-2015 More Data, Less Chatter: Improving Performance on Z/OS Via IBM Zhpf Lewis King and Fred Forst, SAS Institute Inc., Cary, NC
    Paper SAS1715-2015 More Data, Less Chatter: Improving Performance on z/OS via IBM zHPF Lewis King and Fred Forst, SAS Institute Inc., Cary, NC ABSTRACT This paper describes how we reduced elapsed time for the third maintenance release for SAS® 9.4 by as much as 22% by using the High Performance FICON for IBM System z (zHPF) facility to perform I/O for SAS® files on IBM mainframe systems. The paper details the performance improvements, internal testing to quantify improvements, and the customer actions needed to enable zHPF on their system. The benefits of zHPF are discussed within the larger context of other techniques that a customer can use to accelerate processing of SAS files. INTRODUCTION To achieve optimum input/output (I/O) performance, the SAS product on the IBM mainframe operating system z/OS dynamically generates low-level I/O instructions (in the form of channel programs) to process SAS direct access bound libraries. For the types of I/O operations required by SAS processing, the channel programs generated by SAS provide a higher rate of throughput (amount of data per unit of elapsed time) than what is possible with standard IBM DFSMS access methods. In October 2008, IBM introduced High Performance FICON for System z (zHPF), which is a set of I/O architecture improvements that enable higher rates of I/O throughput (IBM 2015a). Over the next several years, zHPF capabilities were extended (IBM 2015a), and in October 2012, IBM announced functionality that enables programs like SAS to execute channel programs that take advantage of the zHPF feature (IBM 2015b).
    [Show full text]
  • MVS JCL User's Guide
    z/OS Version 2 Release 3 MVS JCL User's Guide IBM SA23-1386-30 Note Before using this information and the product it supports, read the information in “Notices” on page 261. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1988, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... xi List of Tables.......................................................................................................xiii About this document............................................................................................xv Who should use this document..................................................................................................................xv Where to find more information................................................................................................................. xv How to send your comments to IBM.................................................................... xvii If you have a technical problem............................................................................................................... xvii Summary of changes........................................................................................
    [Show full text]
  • Fake Your Way Through MVS
    Fake Your Way through MVS (Chapters 22 – 26 of "The Operating Sys- tem Handbook: or, Fake Your Way Through Minis and Mainframes") Fake Your Way through MVS: (Chapters 22 – 26 of "The Op- erating System Handbook: or, Fake Your Way Through Minis and Mainframes") Table of Contents This Section, the Rest of the Book ..........................................................................ix I. MVS ...................................................................................................................1 Chapter 22 MVS: An Introduction ...................................................................3 22.1 Batch Jobs ......................................................................................4 22.2 Interacting with MVS ......................................................................5 22.2.1 TSO .....................................................................................5 22.2.2 ISPF ....................................................................................5 22.2.3 CICS ...................................................................................6 22.2.4 Other MVS Components .......................................................6 22.3 History ...........................................................................................6 Chapter 23 Getting Started with MVS ..............................................................9 23.1 Starting Up .....................................................................................9 23.1.1 VTAM .................................................................................9
    [Show full text]
  • Introduction to the New Mainframe Chapter 5: Working with Data Sets
    Introduction to the new mainframe Chapter 5: Working with data sets © Copyrig ht IBM Corp ., 2006. All rig hts reserved. Introduction to the new mainframe Chapter 5 objectives BbltBe able to: • Explain what a data set is • Describe data set naming conventions and record formats • List some access methods for managing data and programs • Explain what catalogs and VTOCs are used for • Create, delete, and modify data sets • Explain the differences between UNIX file systems and z/OS data sets • Describe the z/OS UNIX file systems’ use of data sets. © Copyright IBM Corp., 2006. All rights reserved. 2 Introduction to the new mainframe Key terms in this chapter • block s ize • member • catalog • PDS and PDSE • data set • record format or RECFM • high level qualifier or HLQ • system managed storage or • library SMS • logical record length or LRECL • virtual storage access method or VSAM • volume table of contents or VTOC © Copyright IBM Corp., 2006. All rights reserved. 3 Introduction to the new mainframe What is a data set? A data set is a collection of logically related data records stored on one disk storage volume or a set of volumes. AdA da ta se t can be: • a source program • a library of macros • a file of data records used by a processing program. You ca n p rint a data set or di spl ay i t on a termin al. Th e logical record is the basic unit of information used by a program running on z/OS. © Copyright IBM Corp., 2006. All rights reserved. 4 Introduction to the new mainframe How data is stored in a z/OS system • Data is store d on a direct access storage dev ice (DASD), magnetic tape volume, or optical media.
    [Show full text]
  • Using Data Sets
    Introducción al Sistemas Operativo z/OS Introducción a los Data Sets USING DATA SETS José Luis Calva Martínez Email: [email protected] [email protected] INTRODUCTION In working with the z/OS operating system, you must understand data sets, the files that contain programs and data. The characteristics of traditional z/OS data sets differ considerably from the file systems used in UNIX and PC systems. To make matters even more interesting, you can also create UNIX file systems on z/OS, with the common characteristics of UNIX systems. A data set is a collection of logically related data; it can be a source program, a library of programs, or a file of data records used by a processing program. DtDataset recordsarethe bibasicunit of ifinforma tion used bby a processing program. José Luis Calva 1 Introducción al Sistemas Operativo z/OS Introducción a los Data Sets WHAT IS A DATA SET? Nearly all work in the system involves data input or data output. In a mainframe system, the channel subsystem manages the use of I/O devices, such as disks, tapes, and printers, while z/OS associates the data for a given task with a device. z/OS manages data by means of data sets. The term data set refers to a file that contains one or more records. Any named group of records is called a data set. Data sets can hold information such as medical records or insurance records, to be used by a program running on the system. Data sets are also used to store information needed by applications or the operating system itself, such as source programs, macro libraries, or system variables or parameters.
    [Show full text]
  • Z/OS Basic Skills Information Center: Reusable JCL Collection
    z/OS Basic Skills Information Center Reusable JCL collection z/OS Basic Skills Information Center Reusable JCL collection Note Before using this information and the product it supports, read the information in “Notices” on page 59. This edition applies to z/OS (product number 5694-A01). We appreciate your comments about this publication. Comment on specific errors or omissions, accuracy, organization, subject matter, or completeness of this book. The comments you send should pertain to only the information in this manual or product and the way in which the information is presented. For technical questions and information about products and prices, contact your IBM branch office, your IBM business partner, or your authorized remarketer. When you send comments to IBM, you grant IBM a nonexclusive right to use or distribute your comments in any way it believes appropriate without incurring any obligation to you. IBM or any other organizations will only use the personal information that you supply to contact you about the issues that you state on this form. Send your comments through this Web site: http://publib.boulder.ibm.com/infocenter/zoslnctr/v1r7/ index.jsp?topic=/com.ibm.zcontact.doc/webqs.html © Copyright International Business Machines Corporation 2007, 2008. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Introducing the reusable JCL collection v JCL EXEC statements: How z/OS finds the program or procedure . .38 JCL statements: What does the DD statement do? .40 Chapter 1. Preparing to use JCL JCL DD statements: Advantages of using samples in this collection .
    [Show full text]