System Utilities

Total Page:16

File Type:pdf, Size:1020Kb

System Utilities IMS Version 13 System Utilities SC19-3662-01 IMS Version 13 System Utilities SC19-3662-01 Note Before using this information and the product that it supports, be sure to read the general information under “Notices” on page 623. This edition applies to IMS Version 13 (program number 5635-A04), IMS Database Value Unit Edition, V13.1 (program number 5655-DSM), IMS Transaction Manager Value Unit Edition, V13.1 (program number 5655-TM2), and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1974, 2014. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this information ........vii Compilation statements .........250 Prerequisite knowledge ..........vii Running the utility in standard mode .....256 IMS function names used in this information . vii Running the utility in batch mode ......260 How new and changed information is identified . vii Running the utility in test mode .......263 How to read syntax diagrams ........viii MFS library backup procedure .......266 Accessibility features for IMS Version 13 .....ix MFS restore procedure ..........268 How to send your comments .........x Chapter 5. Program Specification Part 1. Generation utilities......1 Block (PSB) Generation utility ....271 Utility control statements .........274 Chapter 1. Application Control Blocks Alternate PCB statement.........274 Full-function or Fast Path database PCB Maintenance utility ..........3 statement..............278 Examples of the ACB Maintenance utility ....12 GSAM PCB statement .........291 Managing dynamic option (DOPT) PSBs.....13 SENSEG statement ..........293 SENFLD statement ..........297 Chapter 2. Database Description (DBD) PSBGEN statement ..........298 Generation utility ..........15 END statement ............303 DBD generation for database types ......19 Examples of the PSBGEN utility .......303 DBD generation input record structure (except Running the PSBGEN procedure .......321 for DEDB DBDs) ...........25 DEDB DBD generation input record structure . 27 Part 2. IMS catalog utilities ....323 DBD generation coding conventions .....28 DBDGEN statements ...........28 Chapter 6. ACB Generation and DBD statements ............30 DATASET statements ..........48 Catalog Populate utility (DFS3UACB) . 325 AREA statement ............63 SEGM statements ...........66 Chapter 7. IMS Catalog Alias Names LCHILD statements ..........94 utility (DFS3ALI0)..........337 FIELD statements ...........102 XDFLD statements ..........121 Chapter 8. IMS Catalog Copy utility DFSMARSH statements .........126 DFSMAP statements ..........133 (DFS3CCE0, DFS3CCI0) .......339 DFSCASE statements ..........136 DBDGEN, FINISH, and END statements . 140 Chapter 9. IMS Catalog Partition Examples of the DBDGEN utility .......140 Definition Data Set utility (DFS3UCD0) 353 Examples without secondary indexes or logical relationships.............141 Chapter 10. IMS Catalog Populate Examples with logical relationships .....149 utility (DFS3PU00) .........357 Examples with secondary indexes .....155 Running the DBDGEN procedure ......161 Chapter 11. IMS Catalog Record Purge Chapter 3. MFS Device Characteristics utility (DFS3PU10) .........367 Table utility (DFSUTB00) ......163 Running the DFSUTB00 utility .......166 Part 3. Analysis utilities and reports..............377 Chapter 4. MFS Language utility (DFSUPAA0) ............169 Chapter 12. Fast Path Log Analysis Utility control statements and syntax rules . 175 utility (DBFULTA0) .........379 Summary of control statements ......178 Fast Path report types ..........387 Message definition statements .......180 Format definition statements .......192 Partition set definition statements .....245 Table definition statements ........248 © Copyright IBM Corp. 1974, 2014 iii Chapter 13. File Select and Formatting Chapter 23. Dynamic SVC utility Print utility (DFSERA10) .......401 (DFSUSVC0) ............515 Examples of the DFSERA10 utility ......410 Examples of the DFSUSVC0 utility ......517 DFSERA10 utility modules .........416 Record Format and Print module (DFSERA30) 416 Chapter 24. Global Online Change Program Isolation Trace Record Format and utility (DFSUOLC0) .........519 Print module (DFSERA40) ........424 Examples of the DFSUOLC0 utility ......523 DL/I Call Image Capture module (DFSERA50) 427 IMS Trace Table Record Format and Print module (DFSERA60) ..........428 Chapter 25. MFS Service utility Enhanced Select module (DFSERA70) ....428 (DFSUTSA0) ............525 OM Audit Trail Format and Print module (CSLULALE) ............431 Chapter 26. Multiple Systems Verification utility (DFSUMSV0)....541 Chapter 14. IMS Monitor Report Print utility (DFSUTR20) .........433 Chapter 27. Online Change Copy Examples of the DFSUTR20 utility ......435 utility (DFSUOCU0) .........553 OLCUTL procedure ...........558 Chapter 15. Log Transaction Analysis Initializing the IMS.MODSTAT data set.....560 utility (DFSILTA0)..........437 Chapter 28. Spool SYSOUT Print Chapter 16. Offline Dump Formatter utility (DFSUPRT0) .........563 utility (DFSOFMD0) .........443 Examples of the DFSUPRT0 utility ......566 Running the DFSOFMD0 utility .......445 Chapter 29. Time-Controlled Chapter 17. Statistical Analysis utility Operations Verification utility (DFSISTS0) ............449 (DFSTVER0) ............567 Examples of the DFSISTS0 utility .......457 Examples of the DFSTVER0 utility ......569 Part 4. Log utilities ........465 Part 6. Dynamic resource definition utilities .........573 Chapter 18. Log Archive utility (DFSUARC0)............467 Chapter 30. Repository to RDDS utility Examples of the DFSUARC0 utility ......477 (CSLURP20) ............575 Examples of the CSLURP20 utility ......578 Chapter 19. Log Merge utility (DFSLTMG0) ............479 Chapter 31. RDDS to Repository utility (CSLURP10) ............579 Chapter 20. Log Recovery utility Examples of the CSLURP10 utility ......582 (DFSULTR0) ............483 Examples of the DFSULTR0 utility ......497 Chapter 32. Copy RDDS utility (DFSURCP0) ............585 Part 5. Service utilities ......503 Examples of the DFSURCP0 utility ......587 Chapter 21. Batch SPOC utility Chapter 33. Create RDDS from Log (CSLUSPOC)............505 Records utility (DFSURCL0) .....589 Examples of the Batch SPOC utility ......507 Examples of the DFSURCL0 utility ......593 Chapter 22. Database Recovery Chapter 34. Create RDDS from Control utility (DSPURX00) .....509 MODBLKS utility (DFSURCM0) ....599 Examples of the DSPURX00 utility ......512 Examples of the DFSURCM0 utility ......603 Invoking the utility using entry point DSPURXRT 512 Chapter 35. DRD IMS SYSGEN stage 1 pre-parser utility (DFSURST0) ....607 Examples of the DFSURST0 utility ......611 iv System Utilities Chapter 36. RDDS Extraction utility Trademarks ..............625 (DFSURDD0)............615 || Privacy policy considerations ........626 Examples for the DFSURDD0 utility......618 Bibliography............627 Part 7. Appendixes ........621 Index ...............629 Notices ..............623 Programming interface information ......625 Contents v vi System Utilities About this information These topics provide reference information for the utilities that you can use with the IMS™ system to generate IMS resources, work with the IMS catalog, analyze IMS activity, manage IMS logging, run the IMS Database Recovery Control (DBRC) facility, maintain IMS networking services, and use dynamic resource definition (DRD). This information is available in IBM® Knowledge Center at www.ibm.com/ support/knowledgecenter. Prerequisite knowledge Before using this information, you should understand z/OS®, and with IMS concepts, facilities, and access methods. The prerequisite publications are: v IMS Version 13 Communications and Connections v IMS Version 13 Database Administration v IMS Version 13 System Administration You can learn more about z/OS by visiting the “z/OS basic skills education” topics in IBM Knowledge Center. You can gain an understanding of basic IMS concepts by reading An Introduction to IMS, an IBM Press publication. An excerpt from this publication is available in the IBM Knowledge Center. IBM offers a wide variety of classroom and self-study courses to help you learn IMS. For a complete list of courses available, go to the IMS home page at ibm.com/ims and link to the Training and Certification page. IMS function names used in this information In this information, the term HALDB Online Reorganization refers to the integrated HALDB Online Reorganization function that is part of IMS Version 13, unless otherwise indicated. How new and changed information is identified New and changed information in most IMS library PDF publications is denoted by a character (revision marker) in the left margin. The first edition (-00) of Release Planning, as well as the Program Directory and Licensed Program Specifications,donot include revision markers. Revision markers follow these general conventions: v Only technical changes are marked; style and grammatical changes are not marked. v If part of an element, such as a paragraph, syntax diagram, list item, task step, or figure is changed, the entire element is marked with revision markers, even though only part of the element might have changed. v If a topic is changed by more than 50%, the entire topic is marked with revision markers (so it might seem to be a new topic, even though it is not). © Copyright IBM Corp. 1974, 2014 vii Revision markers do not necessarily indicate all the changes
Recommended publications
  • Z/OS ISPF Services Guide COMMAND NAME
    z/OS 2.4 ISPF Services Guide IBM SC19-3626-40 Note Before using this information and the product it supports, read the information in “Notices” on page 399. This edition applies to Version 2 Release 4 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2021-06-22 © Copyright International Business Machines Corporation 1980, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................ xv Tables................................................................................................................xvii Preface...............................................................................................................xix Who should use this document?............................................................................................................... xix What is in this document?......................................................................................................................... xix How to read the syntax diagrams..............................................................................................................xix z/OS information...............................................................................................xxiii How to send your comments to IBM...................................................................
    [Show full text]
  • P8000H Line Matrix Printers
    Line Matrix P8000H Printers Flexible Design | Adaptable Functionality | Manageable Savings P8000H Cartridge Printers Deliver New Designs, Enhanced Convenience and Lower Operating Cost Printronix introduces design enhancements and improved functionality with the P8000H Cartridge Printer series to achieve the broadest flexibility, greatest compatibility and lowest ownership cost of virtually any other print technology. The series builds upon the workhorse tradition of all Printronix line matrix technology delivering maximum uptime, low cost of ownership, and reliable performance. The P8000H series is the ideal solution for buyers looking to minimize operating expense without sacrificing output reliability, regardless of operating environment. ADAPTABLE MANAGEABLE FLEXIBLE DESIGN FUNCTIONALITY SAVINGS Printronix modified its industry-leading The P8000H Cartridge series adapts to The P8000H Cartridge Printer is a line matrix technology to address almost any supply-chain or back-office smart purchase evolving user requirements. environment. • Lowest cost of ownership of any • Modular enclosures occupy a • USB 2.0 and Serial connectivity print technology. smaller footprint while delivering included as standard features. Parallel location and installation flexibility & Ethernet available as options. • Durable design minimizes downtime related to unfavorable • Sheet metal construction for • High resolution capabilities that environmental conditions. increased durability and better improve user experience with support acoustics of Asian fonts.
    [Show full text]
  • A Study on the Prospect of the Digital Font and the CAP
    A Study on the Prospect of the Digital Font and the CAP Professor Ki Sung Lee Kaywon School of Art and Design Korea CAP Society Preface CAP (Computer Aided Publishing) means the act of publishing by using the computer. CAP is classified into paper book CAP or non-paper book CAP by its output media. Non-paper book CAP is again divided into disk book CAP and network screen book CAP. There are three divisions of publishing: textbook publishing, book publishing, and magazine publishing. Textbook publishing includes reference book publishing as well as primary and secondary school textbook publishing. Since 1990, the three areas of publishing have gone beyond the limitation of the paper. While the Korean secretary of the Ministry of Culture, Eo-ryeong Lee was in office, CD-ROM disks which contained Hangeul Korean textbook were sent to Koreans living in South America and they turned out to be a big hit because they included sound files which played correct Korean pronunciation. In Korea, more and more English and computer textbooks are published in the form of disk book CAP. 1. Research Purpose and Method The study concentrates on two areas. One is the prospect of CAP, the other is the digital font. I tried to give an accurate picture and definition of CAP and how the publishing and printing industry can survive in the times of information and computerization. The development and the future of CAP are also explored in this paper. Among all the computer aided publishing, network screen book terminal boom which started in 1998 has been rapidly spreading in America and Korea by selling "Riding the Bullet"-by American author Steven King-as a network screen book through the internet.
    [Show full text]
  • ISPF User's Guide Volume I
    z/OS Version 2 Release 3 ISPF User's Guide Volume I IBM SC19-3627-30 Note Before using this information and the product it supports, read the information in “Notices” on page 213. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-06-21 © Copyright International Business Machines Corporation 1980, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................. xi Tables..................................................................................................................xv Preface..............................................................................................................xvii About this document................................................................................................................................ xvii Who should use this document................................................................................................................xvii What is in this document?........................................................................................................................ xvii How to read the syntax diagrams............................................................................................................xviii z/OS information...............................................................................................xxiii
    [Show full text]
  • Report on the Use of Computers in 1986
    Report on the use of computers in 1986 Autor(en): Frandsen, Aksel G. Objekttyp: Article Zeitschrift: IABSE surveys = Revue AIPC = IVBH Berichte Band (Jahr): 11 (1987) Heft S-37: Report on the use of computers in 1986 PDF erstellt am: 10.10.2021 Persistenter Link: http://doi.org/10.5169/seals-50712 Nutzungsbedingungen Die ETH-Bibliothek ist Anbieterin der digitalisierten Zeitschriften. Sie besitzt keine Urheberrechte an den Inhalten der Zeitschriften. Die Rechte liegen in der Regel bei den Herausgebern. Die auf der Plattform e-periodica veröffentlichten Dokumente stehen für nicht-kommerzielle Zwecke in Lehre und Forschung sowie für die private Nutzung frei zur Verfügung. Einzelne Dateien oder Ausdrucke aus diesem Angebot können zusammen mit diesen Nutzungsbedingungen und den korrekten Herkunftsbezeichnungen weitergegeben werden. Das Veröffentlichen von Bildern in Print- und Online-Publikationen ist nur mit vorheriger Genehmigung der Rechteinhaber erlaubt. Die systematische Speicherung von Teilen des elektronischen Angebots auf anderen Servern bedarf ebenfalls des schriftlichen Einverständnisses der Rechteinhaber. Haftungsausschluss Alle Angaben erfolgen ohne Gewähr für Vollständigkeit oder Richtigkeit. Es wird keine Haftung übernommen für Schäden durch die Verwendung von Informationen aus diesem Online-Angebot oder durch das Fehlen von Informationen. Dies gilt auch für Inhalte Dritter, die über dieses Angebot zugänglich sind. Ein Dienst der ETH-Bibliothek ETH Zürich, Rämistrasse 101, 8092 Zürich, Schweiz, www.library.ethz.ch http://www.e-periodica.ch IABSE PERIODICA 2/1987 IABSE SURVEYS S-37/87 17 Report on the Use of Computers in 1986 Rapport sur l'utilisation des ordinateurs en 1986 Bericht über Verwendung des Computers im Jahre 1986 prepared by Working Commission VI of IABSE «Informatics in Structural Engineering» coordinated by Aksel G.
    [Show full text]
  • Licensed Program Specifications
    IBM Licensed Program Specifications NetView Access Services Version 2 (MVS/ESA) Release 1.1 Program Number 5695-036 NetView* Access Services Version 2 is an IBM* The system administrator can give any user Multiple Virtual Storage/Enterprise Systems Archi- the authority to broadcast messages to all or tecture* (MVS/ESA*) licensed program. NetView selected users. Access Services protects the SNA network and Fast printing, initiated by pressing a single pre- applications against unauthorized use and enables defined key. users to gain concurrent access to a number of different Virtual Telecommunication Access The ability to define fallback applications for Method (VTAM*) applications on one or more host situations where applications are not available. systems from a single terminal. A Bulletin Board facility to keep users informed about important events and news. NetView Access Services Version 2 (MVS/ESA) provides all the functions available with NetView Full foreground color and highlighting support Access Services Version 1 MVS, and introduces for NetView Access Services Version 2 panels. the following major new features: | Improved External Group handling, allows REXX Application Programming Interface | NetView Access Services Version 2 to use the (NVASAPI) to customize the way in which | application access information stored in RACF* applications interact with NetView Access Ser- | to build the application menu. This reduces vices. REXX procedures can be developed | the NetView Access Services Version 2 admin- that are carried out automatically whenever | istrator workload. users log on to or log off from an application, | Choice of new format for the application menu, or NetView Access Services itself. Many | allowing 42 applications to be displayed on a tedious or repetitive user interactions with | single screen.
    [Show full text]
  • CHM Packaged Software Collection
    http://oac.cdlib.org/findaid/ark:/13030/c8183dmr No online items Guide to the CHM packaged software collection Finding aid prepared by Sara Chabino Lott and Elena Colon-Marrero Processing of this collection was made possible through generous funding from the National Archives’ National Historical Publications & Records Commission: Access to Historical Records grant. Computer History Museum 1401 N. Shoreline Blvd. Mountain View, CA, 94043 (650) 810-1010 [email protected] 3/19/2020 Guide to the CHM packaged 1 software collection Title: CHM packaged software collection Contributing Institution: Computer History Museum Language of Material: English Physical Description: 52.5 Linear feet,42 record cartons Date (inclusive): 1962-2003 Abstract: The CHM packaged software collection contains commercially produced software primarily for the personal computer dated between 1962 and 2003. Access Restrictions The collection is open for research. Publication Rights The Computer History Museum (CHM) can only claim physical ownership of the collection. Users are responsible for satisfying any claims of the copyright holder. Requests for copying and permission to publish, quote, or reproduce any portion of the Computer History Museum’s collection must be obtained jointly from both the copyright holder (if applicable) and the Computer History Museum as owner of the material. Physical Characteristics and Technical Requirements The collection contains media that has not been read by CHM staff. Contact the CHM archives staff for more information. Preferred Citation [Identification of Item], [Date], CHM packaged software collection, Lot [#], Box [#], Folder [#], Catalog [#], Computer History Museum. Scope and Content of the Collection The CHM packaged software collection contains commercially produced software programs produced by a variety of software and computing firms, including Lotus, Apple, Electronic Arts, Borland, Grid, Novell, IBM and others.
    [Show full text]
  • Z/OS Planning for Installation How to Send Your Comments to IBM
    z/OS 2.4 Planning for Installation IBM GA32-0890-40 Note Before using this information and the product it supports, read the information in “Notices” on page 165. This edition applies to Version 2 Release 4 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2021-06-24 © Copyright International Business Machines Corporation 2002, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Tables................................................................................................................. vii About this document.............................................................................................ix Who should read this document................................................................................................................. ix How to use this document.......................................................................................................................... ix z/OS information..........................................................................................................................................ix How to send your comments to IBM.......................................................................xi If you have a technical problem..................................................................................................................xi Summary of changes...........................................................................................xiii
    [Show full text]
  • MA MBC6890 A50823user Guide.Cdr
    Notices PC Worth makes no warranty of any kind with regard to this publication, including, but not limited to, the implied warranty of merchantability and fitness for any particular purpose. PC Worth shall not be liable for errors contained herein or for incidental consequential damages in connection with the furnishing, performance, or use of this publication. This publication contains proprietary information that is protected by copyright. All rights are reserved. No part of this publication may be photocopied, reproduced or translated into any language, in any forms, in an electronic retrieval system or otherwise, without prior written permission of PC Worth. The information contained in this publication may be revised or withdrawn at any time without notice. Trademarks All registered and unregistered trademarks used herein are the exclusive property of their respective owners. Copyright Copyright 1998-2005 PC Worth Int'l Co., Ltd. Copyright 1998-2005 Cino Group Regulatory Information This device complies with Part 15 of the FCC Rules. Operation is subject to the following conditions: This device may not cause harmful interference. This device must accept any interference received, including interference that may cause undesired operation. Note: This equipment has been tested and found to comply with the limits for a class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.
    [Show full text]
  • MS100 Bar Code Pen Reader Adventurejan General Advisory
    MS100 Bar Code Pen Reader AdventureJan General Advisory Improper handling, storage, environmental influences and /or product modification can lead to problems during use. This is particularly true if repairs and maintenance work are not performed by trained personnel. We reserve the right to make technical modifications in accor- dance with technological advancements as they occur. FCC Information This device has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the device is operated in a commercial environment. This device gener- ates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required to correct the interference at his or her own expense. MS100 Manual TABLE OF CONTENTS INTRODUCTION . 1 SCANNER CONFIGURATION MANAGER. 3 Device. 6 Beeps and Delays. 6 Keyboard Wedge. 7 RS232. 9 Scanner Port. 11 Bar Code Symbologies. 14 Data Editing. 22 PROGRAMMING VIA SCANNER INPUT. 25 Quick Setup Bar Codes. 26 Device Selection and Default. 28 Beeps and Delays. 29 Keyboard Wedge. 30 RS232. 31 Scanner Port. 33 Bar Code Symbologies. 35 Data Editing. 40 Function Codes. 45 ASCII Chart. 46 SPECIFICATIONS. 48 TROUBLESHOOTING . 50 WARRANTY. 53 BAR CODE TEST CHART. 54 MS100 Manual INTRODUCTION The MS100 is a family of pen style bar code readers specifically designed to be a simple, unobtrusive method of scanning bar codes.
    [Show full text]
  • Japanese Apl Language System on Ibm Multistation
    JAPANESEAPL LANGUAGESYSTEM ON IBM MULTISTATION 5550 M. Udo, Y.Akimoto, S.Kaneko, T.Sanuki (*) and M.Alfonseca (**) (*) Tokyo Scientific Center, Science Institute, IBM Japan, Ltd. 5-19, Samban-cho, Chiyoda-ku, Tokyo, Japan (**) IBM Madrid Scientific Center P. Castellana, 4. Madrid-l, Spain ABSTRACT date national languages other than occidental lan- guages, such as Arabic, Chinese, Japanese and so on, programming languages should remove the present This paper exemplifies the national language support 256-character limitation that confines legitimate of a programming language by describing the imple- characters to traditional alphanumerics. mentation of APL with a language facility for proc- essing Japanese characters: that is, a character set The Japanese characters consist of several thousands that has "wide" characters that occupy space of more of ideographic characters (Kanji), adapted from Chi- than one byte. By national language support, in nese, as well as two Japanese phonetic alphabets, we mean that users are enabled to use this paper, Ksna (Hira-kana and Kata-kana). Each of the Kana their own national language in the data, as legal character sets consists of 46 different symbols, character strings of the programming language. We each expressing a simple sound of the Japanese syl- describe the implementation of APL that provides labary, with the addition of some diacritical marks Japanese language support in the above sense on a and subscripted symbols. In the Japanese writing personal computer called the IBM Multistation 5550. system we use a mixture of Kanji and Kana, where Kan- We also discuss the design principle adopted to ji is used as the root words and Kana as inflections include a new two-byte character set in APL data for most purposes, as well as Arabic numbers and objects coexisting with a conventional one-byte APL Roman alphabets.
    [Show full text]
  • IBM GDDM General Information GC33-0866-03
    GDDM IBM General Information Version 3 Release 2 GC33-0866-03 GDDM IBM General Information Version 3 Release 2 GC33-0866-03 Note! Before using this information and the product it supports, be sure to read the general information under “Notices” on page vii. | Fourth Edition (December 2001) This edition applies to the following IBM GDDM series of licensed programs: Program number Program name Version Release Modification 5695-167 GDDM/MVS 3 2 0 5684-168 GDDM/VM 3 2 0 5686-057 GDDM/VSE 3 2 0 5668-812 GDDM-PGF 2 1 3 5668-723 GDDM-IVU 1 1 3 5668-802 GDDM-GKS 1 1 3 5668-801 GDDM Interactive Map Definition 2 1 3 GDDM/MVS as a base element of OS/390 (program number 5645-001) GDDM-PGF as an optional feature of OS/390 GDDM-REXX/MVS as an optional feature of OS/390 and to all subsequent versions, releases, and modifications until otherwise indicated in new editions. Consult the latest edition of the applicable IBM system bibliography for current information on this product. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the addresses given below. At the back of this publication is a page titled “Sending your comments to IBM”. If you want to make comments, but the methods described are not available to you, please address them to: IBM United Kingdom Laboratories, Information Development, Mail Point 095, Hursley Park, Winchester, Hampshire, England, SO21 2JN. When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you.
    [Show full text]