?
Solved

Basic Knowledges of filesystems on zOS

Posted on 2010-08-22
2
Medium Priority
?
473 Views
Last Modified: 2013-01-05
Hello,

can anyone give me an advise to get a good introduction of terms of zOS, ISPF, MVS, TSO and so on. I have some experience on linux, so i try to map my knowledge onto the given terms. But I believe, there are many differences. For example how can I imagine the filesystem of zOS. If I talk about qualifiers in ISPF, does that means pathes? And what about Dsorg ( PO,PS ), Recfm ( FB, VB, VA ), Lrecl and Blksz. I'm searching for a good introduction, perhaps first architecture of zOS ( does there exist a kernel or something else ) and how coherenc the other term ( MVS, TSO ).
0
Comment
Question by:michael_ch
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 57

Accepted Solution

by:
giltjr earned 2000 total points
ID: 33497603
0
 

Author Closing Comment

by:michael_ch
ID: 33518823
Seems a good entrypoint. Thanks a lot.
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Ready to improve network connectivity? Watch this webinar to learn how SD-WANs and a one-click instant connect tool can boost provisions, deployment, and management of your cloud connection.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Summer 2017 Scholarship Winners have been announced!
This month, Experts Exchange’s free Course of the Month is focused on CompTIA IT Fundamentals.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month10 days, 2 hours left to enroll

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question