Stanf~Rdlinearacceleratorcenter Stanf~Rduniversi~,Stanford,California94309

Total Page:16

File Type:pdf, Size:1020Kb

Stanf~Rdlinearacceleratorcenter Stanf~Rduniversi~,Stanford,California94309 SLAC-R-447 SLAG447 CONF-9405161-- UC-405 PO _ - PROCEEDINGS OF THE REXX SYMPOSIUM FOR DEVELOPERS AND USERS May l-3,1994 Boston, Massachusetts Convened by STANF~RDLINEARACCELERATORCENTER STANF~RDUNIVERSI~,STANFORD,CALIFORNIA94309 Program Committee Cathie Dager of SLAC, Convener Forrest Garnett of IBM Pat Ryall Prepared for the Department of Energy under Contract number DE-AC03-76SF00515 Printed in the United States of America. Available from the National Technical Information Service, U.S. Department of Commerce, 5285 Port Royal Road, Springfield, Virginia 22161. PROCEEDINGS OF THE REXX SYMPOSIUM FOR DEVELOPERS AND USERS TABLE OF CONTENTS - - A. Summary ii B. Presentations Tom Brawn IBM AIX REXX/6000 and IBM REXX for NetWare 1 Tom Brawn Object REXX-What’s New? 13 Anders Christensen Techniques for Performance Tuning REXX Interpreters-A Case Study of Regina 24 Ian Collier REXX/imc: A REXX Interpreter for UNIX 33 Mike Cowlishaw Interesting Corners of REXX 41 James Crosskey IBM Views on REXX 64 Hal German Choosing a Command Language- An Application-Centric Approach 74 Klaus Hansjakob News From the REXX Compiler 78 Mark Hessling Using REXX as a Database Tool 95 Lee Krystek Using REXX in a UNIX Environment to Manage Network Operations 109 Luc Lafrance REXX at Simware 125 Linda Littleton REXX Resources on the Internet 138 Alan P. Matthews Using REXX and Notrix for Lotus Notes Data Manipulation 142 Patrick J. Mueller Adventures in Object-Oriented Programming in REXX 166 Patrick Mueller ROX-REXX Object extensions 188 Simon Nash The Object REXX Class Hierarchy 211 Edmond Pruul Portable REXX Applications and Reusable Design 223 David Shriver REXX for CICS/ESA 231 Timothy Sipples Working (and Playing!) with REXX and OS/2 Multimedia 246 Hobart Spitz Converting MVS/JCL to REXX/TSO 250 C. Attendees 265 Summary --- The fifth annual REXX Symposium for Developers and Users convened in Boston, Massachusetts, May 2-4. The. fifty-seven attendees -came from Australia, Austria, England, Norway, Canada and many US states. This conference has become the premier event for exchanging REXX technical information, and people were impressed with how much REXX has spread since the last Symposium. This year we welcomed implementations for new platforms and continued growth in numbers of users and in importance of uses. One of the most popular sessions was “Object-Oriented Extensions,” given by Simon Nash of IBM. Also IBM gave the first public demonstration of their Object REXX for Windows. And the attendees continued the Symposium tradition of contributing software and making diskettes available for all. The Symposium served as a springboard for the REXX Language Association (RexxLA) which will help promote the use of the language. RexxLA held its first public meeting in conjunction with this year’s REXX Symposium. Next year the Symposium will be held at the Stanford Linear Accelerator Center. 1994 Steering Committee: Cathie Burke Dager Forrest Gamett Pat Ryall ii I IBM AIX REXX/6000 and IBM REXX for NetWare Tom Brawn IBM IBM AIX REXX/6000 & IBM REXX for NetWare Thomas J. Brawn Object REXX Development / IBM Endicott, NY 1 Internet id: [email protected] IBM AIX REXX16000 n Available 12/93 n Program number 5764-057 - REXX/6000 Reference guide SC24-5708 - comments on reference guide can be sent to pubrcf@gdlvme. vnet. ibm. corn .,<..jg$$k.!.~.<~~.&~,~~~$$~x:!:....% ‘.‘-.. ‘~>:.yww~ ” n Supports AIX release 3.2 and up ..;.::g:>:..,.:s$::.:...:.:::q$w “’ ,,:..;<y::._:buysQy.:. ’ n “AS-IS” release ..p;y,,&+ ‘” - In use internally at over 100 IBM locations fb:~ve~ 2 ,.::$y ,.$.,&...y::.’ ’ ’ years ,.::;:;z..::::...:::::>..::::!’ .::::::..::::. .:: p ..::: ? ,::)i” ,,>i’ ::;y I .::::::’ .:::::. .:::::. ..:p .$$y .::::. ..v PZ~ ,.; /,,: REXX16000 Additiotial details... n Port of IBM’s OS/2 REXX kernel to the AIX platform - SAA Level 2 w I/O functions (charin, charout, stream, etc) b System exits - Default command environment .*.r:cli~~~~~.,.........,.. ,...:.>:<&$$g*”~ w address ksh ‘Is -Fc’ +,:.:p;::.:...,,,,:#+.,,,.:g$#y.x. ‘ .’ ‘.’“ . ..,<,<<v,.,,::$p,++...’ ’ - Access to AIX environment variables ,.$(y,::gv...<.::y ..::::y..;<:::.*,.:x::. b value(‘PA TH ‘,; ‘ENVIRONlENT’) ..::::y.&X‘$$.” ,&.,<gg::...:’ 1:;:;:r:..:...::::;..::::..’ ’ ..:::P,::.:p..::::v,:::::: .:g.::::;::.<:p.i:::Y ’ .:::::..::p,,y:::...:.:c I [ REXX,6000 !,: ’ /*: ;;;’ v I I. Additional Functions n Directory - Works just like OS/2 cmd n RexxRegisterFunctiotVRexxRegisterFunctionPkg ~~~~~~~~!.A..g:..s&gy&$<.+>2: .A.........A.... <.:<<.:.. ., ..A.,...) . ~:~~:$$g$g$$$~~:;&;>9.+:.x::<:,.<.*,,,&. r - For registering functions from an application or functions ~~:~~~~“.A..::::.f+,.<,q::.)&:$.y~<$&a,........<..<,.$. :wx.:::::::~:::::.:;:~:::$~:.:~.$<::.:.:.::::#z::::::::::::::::.....!.~i..:) Y m:~.~from a function package Ln ::::::::::::::::::::::::::+:::.:$,~~~~~~iiiai:i:i~~~~~aa:::::i::ii:‘:.::i:::::::::::~: ~::i:~.~~~~iiiiii~~~~~~~:~::::~:~:~:~:~:~.~::::::~:::::::::.:.:.:.:.:.:.:.:::::::“‘,.A.,0:..,.,.......,.,:.:.:+:.,:.::::.:,: I:,::::; ,....<<.~$$#p.ysA :::::;::.:.:x:.:.:.:.:.l:‘i..........>>:::::::::+:.:.:.:::::x::.‘.‘.““:.:.:.:.:,:,‘:.:.:.:.:.:.:.:.:.:,....,.....,:.:‘:‘.“‘-t,~:.:.:.:,~ S imilar‘.:.:,: API’s for Subcom handlers and Exit handle~~~~~~~~. :::::;.:.:,:.::..iiQ...>..:.:,:.:....:. ..._. .,... .j,:::::::j::::::::j . :.:.:.:.:.:.;.:.,.:...’. 1Sli:::):::i:i:i:~~:::.::::::.:. .i.. - SysAddFuncPkg, SysAddCmdPkg, etc. functi~~~~~~~ilow {$;::;:.;;:$I,.:,,::..).: :...:.;.’ .:::.:::::::::::.:.::i$:ii3 :::,:::::j: ’ ’.:.i:~:~:~:~:~:~:~:~ ,.$$:...::::i. ::::::.:.y--.::::::::.;:i.::.:::::.,: :.:,j:::y:.. ,,p;:;:;:::;:;:...,..........:,:,.:.y.:.::....I . ’ ,&.....:::::s,.;,y$...” .:..:,.,,...‘ ,., easy access to API functions &$..,::::$.,.:$gp’ ’ .. .:,. .,.:.:..&y,<:$y .:. n SysCreatePipe ,.:.p;::::p,...:a - Creates an “unnamed pipe” for comm~ff&tion between .:#..::p.::g.::::;.a:;: two processes j/r RExx,6000 ;! ;;,: More functions... n SysFork() - Interface to fork command n SysGetpid() - Returns process ID I SysWait() - Waits on child process to end REXXl6000 x IBM REXX for NetWare n Available 3/94 n Program number 5764-075 - IBM REXX for NetWare Reference Guide SH24-5286 - comments on reference guide can be sent to pubrcf@gdlvme. vnet. ibm. corn n Supports NetWare release 3.11, 3.12, or 4.0 n “AS-IS” release REXX for NetWare x - v ----------I-.-----------I Additional details n Port of IBM’s OS/2 REXX kernel to Novell’s NetWare platform - SAA Level 2 b I,,0 functions (charin, charout, stream, etc) b System exits - Default command environment ,,~~::~~~~~~~~:!..~~...,....y.:., .” w#$$q ’ ,&.<<::::r:,.~,,:,:#p+,.<>~>:$$y+~~’ ’ b Address netware ‘load monitor’ ,...*:p...::,,,~$pF @P .,:$!:.::.:::.,.::y.+.:.:::..’ ” ....,,::::.\: . /:!p ..:::y,.::::::...::::p..::::::.. ::::::.,.:::..::yy,++ ’ .<::y::::,J$..,.p,.:::::c ,,:gy,<:;:y::g3: ” :::::::::>y,.:::;. I ;:::::,.:jp..::;::... Pt,:.:.,.g REXX ::;: ;!j,; ’ for NetWare ! I 2. I I n RexxRegisterSubcomNLM - registers a subcommand handler from a NetWare loadable module n RexxRegisterSubcomAdr - registers a subcdmmand handler from within an application routine ~.:.:~~~~~~~~~~.:.:.:.(.cA.. ...A.. ” I Similar AP,‘s for registering external functions a~~d~~~~’ ,.,.::::+,.:.:Zp handlers ..::,.:::::...q.::>,..:: y yx ..::j:,,.$$$..,::::::...: @’ ..::pJ::,.;:py” ,,..::$,*..,.:px:::. .:g.:<y..:::;:: ..<:y.::::...:$? I .:::.::I::.::j:..’ ’ ;! j for NetWare x 1 I j NetWare specific utilities n RxConsolePrint - Display a line of text on the system console n RxDosCopy - Copies a file from the DOS partition to the NetWare partition m RxDospresent .*.+$,...<.:q:#+:+*,.,*:.&$.yqy~>$gs!v: .. @ ::::.:.” .L...................,..~............. ..~......1............ ..A.a.. ,&gz+.~..,.$$y:: ,.,.:2<+:.,yh. ‘: “. E:.:l:aa:;~ilii,:~~~:~~~~~~~~:::;~.::::::..,.,..........‘ . ‘.‘...‘. ‘.‘‘::..:::i:I:::I::::~:.‘...:.:.:. ,,:*$y*,,.p.v,~>~:;:~:.:.. .,.,.,.,.,.:y,:.:::::....::::::.:.:.:.:.:.:.:.:..;:~:+.:.:.:;:~:~:]:::::::::... ..::.:.: .:.._.,...‘..,..,::)::.:(: .::.>:,.....(.....;,,.>;, >;. - ‘ Queries:. ‘::::~:~:$;:~ whether DOS is in memory ,.:,$?’ pi:.:.:.:.:.::...:.;.:.j:.:.:.:.,.,.,.,.,.,.,.,. .,.; :.>:...:,.,. I RxGetNumberOfVolumes .,::p.::::y,::$Y.....e ,.,..‘/. .<:::y - Queries the number of volumes on the 1~~~1server .<:p;:::i’ .;:g:j:;::,;p n RxGetVoIumeName .::;$y.::>t I - Given a volume number, get the volu;hej$ namhExx ..!:“.r n RxQueryNLM .!,,c - Return NLM handle if the NLM is loaded for NetWare x i .-.._-.-...._.____ -----...___---... .._.___ ‘i R - 2 .-L l- I Trademarks IBM, 092, AIX, REXX/6000, IBM REXX for NetWare,are registered trademarks of International Business Machines Corporation. NetWare is a trademark of Novell, Inc. Tritus SPF is a trademark of Tritus Corporation. NLMAuto Professional and NLMerlin are trademarks of Knozall Systems, Inc. Object REXX-What’s New? Tom Brawn IBM ::r- Tom Brawn :: Object REXX Development i IBM Endicott, NY / Internet id: [email protected].&om - $ ______..................................... :’ . .................................................................................... + Background Work began in 1988 Prototyped since 1989 Complete rewrite of interpreter Language architecture “in progress” and subject to change Significant enhancements over the past 18 months Limited beta on OS/2 and Windows 4/94 ‘ &+ *@@@ g@* &&-+j I $$$ /.& :: :i :i !r -.--.. -- .... -.... --.-- ..... -.--...-- ..... --.-.- ....... --- ......... -.-...- . .. --..- . --- .. ..___...................................~...........~~~~~~~~.~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~..~~~~~~~~~~~~~.~~~.~.~~~~~~~~~~~~
Recommended publications
  • SMART: Making DB2 (More) Autonomic
    SMART: Making DB2 (More) Autonomic Guy M. Lohman Sam S. Lightstone IBM Almaden Research Center IBM Toronto Software Lab K55/B1, 650 Harry Rd. 8200 Warden Ave. San Jose, CA 95120-6099 Markham, L6G 1C7 Ontario U.S.A. Canada [email protected] [email protected] Abstract The database community has already made many significant contributions toward autonomic systems. IBM’s SMART (Self-Managing And Resource Separating the logical schema from the physical schema, Tuning) project aims to make DB2 self- permitting different views of the same data by different managing, i.e. autonomic, to decrease the total applications, and the entire relational model of data, all cost of ownership and penetrate new markets. simplified the task of building new database applications. Over several releases, increasingly sophisticated Declarative query languages such as SQL, and the query SMART features will ease administrative tasks optimizers that made them possible, further aided such as initial deployment, database design, developers. But with the exception of early research in system maintenance, problem determination, and the late 1970s and early 1980s on database design ensuring system availability and recovery. algorithms, little has been done to help the beleaguered database administrator (DBA) until quite recently, with 1. Motivation for Autonomic Databases the founding of the AutoAdmin project at Microsoft [http://www.research.microsoft.com/dmx/autoadmin/] and While Moore’s Law and competition decrease the per-unit the SMART project at IBM, described herein. cost of hardware and software, the shortage of skilled professionals that can comprehend the growing complexity of information technology (IT) systems 2.
    [Show full text]
  • Minutes of the January 25, 2010, Meeting of the Board of Regents
    MINUTES OF THE JANUARY 25, 2010, MEETING OF THE BOARD OF REGENTS ATTENDANCE This scheduled meeting of the Board of Regents was held on Monday, January 25, 2010, in the Regents’ Room of the Smithsonian Institution Castle. The meeting included morning, afternoon, and executive sessions. Board Chair Patricia Q. Stonesifer called the meeting to order at 8:31 a.m. Also present were: The Chief Justice 1 Sam Johnson 4 John W. McCarter Jr. Christopher J. Dodd Shirley Ann Jackson David M. Rubenstein France Córdova 2 Robert P. Kogod Roger W. Sant Phillip Frost 3 Doris Matsui Alan G. Spoon 1 Paul Neely, Smithsonian National Board Chair David Silfen, Regents’ Investment Committee Chair 2 Vice President Joseph R. Biden, Senators Thad Cochran and Patrick J. Leahy, and Representative Xavier Becerra were unable to attend the meeting. Also present were: G. Wayne Clough, Secretary John Yahner, Speechwriter to the Secretary Patricia L. Bartlett, Chief of Staff to the Jeffrey P. Minear, Counselor to the Chief Justice Secretary T.A. Hawks, Assistant to Senator Cochran Amy Chen, Chief Investment Officer Colin McGinnis, Assistant to Senator Dodd Virginia B. Clark, Director of External Affairs Kevin McDonald, Assistant to Senator Leahy Barbara Feininger, Senior Writer‐Editor for the Melody Gonzales, Assistant to Congressman Office of the Regents Becerra Grace L. Jaeger, Program Officer for the Office David Heil, Assistant to Congressman Johnson of the Regents Julie Eddy, Assistant to Congresswoman Matsui Richard Kurin, Under Secretary for History, Francisco Dallmeier, Head of the National Art, and Culture Zoological Park’s Center for Conservation John K.
    [Show full text]
  • Decimal Layouts for IEEE 754 Strawman3
    IEEE 754-2008 ECMA TC39/TG1 – 25 September 2008 Mike Cowlishaw IBM Fellow Overview • Summary of the new standard • Binary and decimal specifics • Support in hardware, standards, etc. • Questions? 2 Copyright © IBM Corporation 2008. All rights reserved. IEEE 754 revision • Started in December 2000 – 7.7 years – 5.8 years in committee (92 participants + e-mail) – 1.9 years in ballot (101 voters, 8 ballots, 1200+ comments) • Removes many ambiguities from 754-1985 • Incorporates IEEE 854 (radix-independent) • Recommends or requires more operations (functions) and more language support 3 Formats • Separates sets of floating-point numbers (and the arithmetic on them) from their encodings (‘interchange formats’) • Includes the 754-1985 basic formats: – binary32, 24 bits (‘single’) – binary64, 53 bits (‘double’) • Adds three new basic formats: – binary128, 113 bits (‘quad’) – decimal64, 16-digit (‘double’) – decimal128, 34-digit (‘quad’) 4 Why decimal? A web page… • Parking at Manchester airport… • £4.20 per day … … for 10 days … … calculated on-page using ECMAScript Answer shown: 5 Why decimal? A web page… • Parking at Manchester airport… • £4.20 per day … … for 10 days … … calculated on-page using ECMAScript Answer shown: £41.99 (Programmer must have truncated to two places.) 6 Where it costs real money… • Add 5% sales tax to a $ 0.70 telephone call, rounded to the nearest cent • 1.05 x 0.70 using binary double is exactly 0.734999999999999986677323704 49812151491641998291015625 (should have been 0.735) • rounds to $ 0.73, instead of $ 0.74
    [Show full text]
  • Onsite Program
    2015 ASAP Global Alliance Summit Collaboration at the Core: Forging the Future of Partnering Onsite Program March 2 – 5, 2015 Orlando, Florida Hyatt Regency Orlando www.strategic-alliances.org/summit +1-774-256-1401 Platinum Sponsor Gold Sponsor Silver Sponsors Table of Contents Welcome to the 2015 ASAP Global Alliance Summit . .3 ASAP Executive Committee & Management Board & ASAP Program Committee . .4 Social Media Outlets & ASAP Global Staff . .5 Conference Agenda . .6 ASAP Global Members & Corporate Members . .11 Summit Sponsor Recognition . .12 ASAP Executive, Management & Advisory Board of Directors . .13 Overview of Sessions . .14 Alliance Excellence Awards Finalists . .16 Pre-Conference Professional Development Workshops . .18 Monday Session Descriptions . .21 Tuesday Session Descriptions . .22 Wednesday Session Descriptions . .27 Alliance Management Resource Center . .34 Conference Speakers . .36 2015 ASAP BioPharma Conference Call For Topics . .51 Floor Plan . .53 2 Stay up to date at www.strategic-alliances.org I March 2 – 5, 2015 I Orlando, Florida USA Welcome to the 2015 ASAP Global Alliance Summit On behalf of the Board of Directors and staff of the Association of Strategic Alliance Professionals, welcome to our 2015 Global Alliance Summit. We invite you to take the next three days to learn, engage, and experience the best the profession has to offer! We invite you to fully participate in this highly interactive experience where the learning comes as much from those assembled as from the many top-flight speakers and discussion leaders. Connect with your peers, partners, and industry executives to learn how others are confronting the challenges of our ever-changing business environment and forging the future of partnering.
    [Show full text]
  • HILLGANG Executive IT Specialist, IBM the University of Warwick
    . An introduction to the z10 – Harv Emery, Professor in the Department of Computer Science at HILLGANG Executive IT Specialist, IBM the University of Warwick. Update on OpenSolaris on System z ABSTRACTS System Cloning – The DC VM & Linux Users’ Group Principles and Practice Changing the way computers compute There is plenty of information available for cloning Linux guests and even z/OS guests but what about Most numeric data in commercial and human-centric cloning entire VM systems? For instance - you have a applications are decimal, and floating-point decimal need for two VM environments (one for virtual increasingly important as these applications become servers and another for z/OS D/R including XRC ever more complex. Benchmarking has indicated that DASD mirroring) in two different data centers, for a some applications spend a considerable amount of total of 4 VM systems. How can you save time and time in decimal processing, and IBM has now effort? Build one and clone it! Come and hear how a implemented decimal floating-point in z9 microcode, customer adopted the philosophy that he has been z10 hardware, Power6 hardware, and in many employing for z/OS for a long time and now has software products. developed for his VM systems. The talk will include how to maintain one VM system and 'roll' the updates In this talk, Mike will cover: out to other VM systems with including large systems • Why decimal arithmetic is increasingly important into their curriculum. • Why IBM has added hardware support • The decimal floating-point formats and IBM System z10 arithmetic, derived from Rexx, which is in the Enterprise Class Announcing the 12th Meeting of the new Hillgang IEEE 754 draft, z/VM, z/OS, DB2, C and other products Overview • How to exploit the new hardware and software in In this session the speaker, will present an .
    [Show full text]
  • The Design of the REXX Language
    The design of the REXX language by M. F. Cowlishaw One way of classifying computer languagesis by two (consciously or otherwise) to be easy to compile or classes: languages needing skilled programmers, and easy to interpret, it is designed (with the help of personal languages usedby an expanding population of general users. REstructured extended executor feedback from hundreds of users) to be easy to use. (REXX) isa flexible personal language designed with particular attention to feedback from its users. It has Three major factors affect the usability of a language. proved to be effective and easyto use, yet it is suffi- First, the basic concepts of a language affect its ciently general and powerfulto fulfil theneeds of many demanding professional applications.REXX is system syntax, grammar, and consistency. Second, the his- and hardware independent,so that it has been possi- tory and development of a language determine its ble to integrate it experimentally into several operating function, usability, and completeness. Third, but systems. Here REXX isused for such purposes as com- quite independently, the implementation of a lan- mand and macro programming, prototyping, educa- guage affects its acceptability, portability, and distri- tion, and personal programming. This paper introduces REXX and describes the basic design principles that bution. This paper introduces REXX and then dis- were followed in developingit. cusses basic concepts and developmental history as applied to the design of the REXX language. There are several experimental implementations of the REXX language within IBM for both large and small machines. One of these, by the author, has omputer languages may be classified in many become a part of the Virtual Machine/System Prod- ways.
    [Show full text]
  • Proceedings of the Rexx Symposium for Developers and Users
    SLAC-R-95-464 CONF-9505198-- PROCEEDINGS OF THE REXX SYMPOSIUM FOR DEVELOPERS AND USERS May 1-3,1995 Stanford, California Convened by STANFORD LINEAR ACCELERATOR CENTER STANFORD UNIVERSITY, STANFORD, CALIFORNIA 94309 Program Committee Cathie Dager of SLAC, Convener Forrest Garnett of IBM Pam Taylor of The Workstation Group James Weissman Prepared for the Department of Energy under Contract number DE-AC03-76SF00515 Printed in the United States of America. Available from the National Technical Information Service, U.S. Department of Commerce, 5285 Port Royal Road, Springfield, Virginia 22161. DISTRIBUTION OF THIS DOCUMENT IS UNLIMITED ;--. i*-„r> ->&• DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, make any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof. DISCLAIMER Portions
    [Show full text]
  • The X-Internet Invigorates Supply Chain Collaboration
    AnalystAnalyst OutlookOutlook COLLABORATION5 http://radjou.ASCET.com Navi Radjou The X-Internet Invigorates Forrester Research Supply Chain Collaboration The X-Internet – an executable and extended Internet built from Rapid responses to unforeseen events. Web- post-Web technologies – will transform online collaboration based B2B apps like e-procurement rely on a between supply chain partners. rule-based workflow engine to automate rou- tine transactions between partners. But they’re not designed to let firms actively find Global firms pin big hopes on the Internet’s the world has changed: Empowered customers unplanned events like delayed parts or a capabilities to connect them with customers are more fickle and competitors challenge suc- looming equipment failure in a contractor’s and suppliers. For example, 84 percent of busi- cessful new products more quickly. Firms have plant, let alone resolve them in real time. To nesses surveyed by NAPM/Forrester in come to rely more on partners to improve their provide preemptive customer support and October 2001 view the Internet as a critical ele- supply net performance and customer service. continually optimize asset usage, firms need ment of their purchasing strategy. Many firms To meet the new realities of B2B collaboration, to sense and respond to unforeseen events are stepping up investments in business appli- business apps need to support: without human intervention. cations (apps) that promise to move their Rich, real-time collaboration. Web- offline supply chain transactions to the Web. anchored supply chain apps like those from The X-Internet Reshapes But so far, these Web-centric B2B apps have Manugistics Group can’t rapidly reflect Supply Chain Collaboration failed to deliver the promised benefits because changes in partners’ production schedules Since its birth 30 years ago, the Internet has they are undependable and sluggish.
    [Show full text]
  • 25 Years of Rexx ― a Personal View
    25 years of Rexx ― a personal view Böblingen 4 May 2004 Mike Cowlishaw IBM Fellow (Google: cowlishaw) Rexx25 Overview Questions, questions … Copyright © IBM Corporation 2004. All rights reserved. 2 All the … President’s questions … 3 Who was I? My IBM job? • Pre-University student with IBM (1970) – PL/I compiler, etc. • BSc Electronic Engineering – Birmingham • Day job: Test Tools Team – designing and building hardware for testing terminals such as the 3279 … 4 Microlink • Used existing coax terminal link (ANR) to attach bipolar microcomputers (based on the Signetics 8X300) to mainframe 5 Own-time projects? • Mostly PL/I and S/360 Assembler – Archaeological mapping (1974) – Cave surveying programs (1976) • STET, a STructured Editing Tool (1977) – and lots of other VM/CMS tools •Rex (1979) – a biggie: 4,000 hours to 1982 6 How old was I? well, 25 years is 25 years … 7 Why Rex? • CMS had EXEC … a bit like DOS BAT &CONTROL OFF &IF &INDEX EQ 0 &GOTO -GO EXEC DCOPT DROP &IF &RETCODE GE 12 &EXIT -GO &STACK RT … • EXEC 2: clean design, but just as ugly – language committee (Stephenson et al.) – hooks for vanilla CMS by Michel Hack 8 What were the first Rex programs? • ADDR EXEC … searches nickname file for nickname, displays name and address • SEND EXEC … send file to a local user • CONC XEDIT … concatenate and flow • … and lots of testcases 9 Who used it? • First distributable code was in May 1979; until then, only the one user • The first real users (pioneers, guinea pigs, trend-setters, …) were – Ray Mansell (Hursley, UK) – Les Koehler (Raleigh, NC) lots of useful feedback 10 How did it catch on? • Internal IBM network, VNET, rapidly growing • VM Newsletter (Peter Capek) • Word of mouth, Xmas card … • Add-ons (Steve Davies’ functions and others) 11 Was there a Rex motto? • Sort of.
    [Show full text]
  • ALGORITHMIC INFORMATION THEORY Third Printing
    ALGORITHMIC INFORMATION THEORY Third Printing GJChaitin IBM, P O Box 218 Yorktown Heights, NY 10598 [email protected] April 2, 2003 This book was published in 1987 by Cambridge Uni- versity Press as the first volume in the series Cam- bridge Tracts in Theoretical Computer Science. In 1988 and 1990 it was reprinted with revisions. This is the text of the third printing. However the APL character set is no longer used, since it is not gen- erally available. Acknowledgments The author is pleased to acknowledge permission to make free use of previous publications: Chapter 6 is based on his 1975 paper “A theory of program size formally identical to information theory” published in volume 22 of the Journal of the ACM, copyright c 1975, Association for Computing Machinery, Inc., reprinted by permission. Chapters 7, 8, and 9 are based on his 1987 paper “Incompleteness theorems for random reals” published in volume 8 of Advances in Ap- plied Mathematics, copyright c 1987 by Academic Press, Inc. The author wishes to thank Ralph Gomory, Gordon Lasher, and the Physics Department of the Watson Research Center. 1 2 Foreword Turing’s deep 1937 paper made it clear that G¨odel’s astonishing earlier results on arithmetic undecidability related in a very natural way to a class of computing automata, nonexistent at the time of Turing’s paper, but destined to appear only a few years later, subsequently to proliferate as the ubiquitous stored-program computer of today. The appearance of computers, and the involvement of a large scientific community in elucidation of their properties and limitations, greatly enriched the line of thought opened by Turing.
    [Show full text]
  • VM/ESA Network Computing with Java and Netrexx
    IBML VM/ESA Network Computing with Java and NetRexx Kris Buelens ** Bengt Heijnesson ** Dave Jones ** Salvador Torres International Technical Support Organization http://www.redbooks.ibm.com This book was printed at 240 dpi (dots per inch). The final production redbook with the RED cover will be printed at 1200 dpi and will provide superior graphics resolution. Please see “How to Get ITSO Redbooks” at the back of this book for ordering instructions. SG24-5148-00 IBML International Technical Support Organization SG24-5148-00 VM/ESA Network Computing with Java and NetRexx November 1998 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix C, “Special Notices” on page 161. First Edition (November 1998) This edition applies to Virtual Machine/Enterprise Systems Architecture (VM/ESA), Version 2 Release 3.0, Program Number 5654-030, and subsequent releases. Note This book is based on a pre-GA version of a product and may not apply when the product becomes generally available. We recommend that you consult the product documentation or follow-on versions of this redbook for more current information. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. HYJ Mail Station P099 522 South Road Poughkeepsie, New York 12601-5400 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1998. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
    [Show full text]
  • Security Server RACF System Programmer's Guide
    z/OS Version 2 Release 3 Security Server RACF System Programmer's Guide IBM SA23-2287-30 Note Before using this information and the product it supports, read the information in “Notices” on page 365. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1994, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... xi List of Tables.......................................................................................................xiii About this document............................................................................................xv Intended audience..................................................................................................................................... xv Where to find more information................................................................................................................. xv RACF courses........................................................................................................................................ xv Other sources of information.................................................................................................................... xvi Internet sources...................................................................................................................................xvi
    [Show full text]