SlideShare a Scribd company logo
1 of 4
System-Z Dataset Naming Standards

   Business data comes in many forms. It is found in program libraries, databases,
extracts from databases, files created from manipulating database data, unloads, backups,
access logs, stored procedures, and so on. Controlling access to business data seems
daunting, if not impossible. If we remember all business data (except printed reports)
exists as datasets on some form of electronic media, the task becomes manageable, even
relatively easy. The key is a good dataset naming standard.

   A proper dataset naming standard has these features.

    The HLQ is unique, not only to the application but also to the data’s purpose
     within that application.
    It describes the owning application and indicates the usage of the data.
    It indicates whether the data is production or test.
    The second qualifier describes the dataset uniquely.
    The third qualifier describes the type of data on the dataset. In other words, is it a
     database, an unload, a log, or some other dataset?

   There are two exceptions to these rules. The first exception is DB2, which has its own
naming standard. However, DB2’s standard is easily amenable to the general rules. The
second exception is the existence of “working copies” of databases, i.e. a copy of the
database for problem investigation, utility testing, and other purposes.

                   Database versus Non-database Business Data

    In almost all cases, database datasets already have a form of naming standard.
Whether this is a DD-name based standard (IMS) or a table space standard (DB2), there
are certain rules inherent in the DBMS. Non-database datasets, however, have no such
limits and may carry any name the IT person can think of. Non-database datasets come
in two forms: “control” datasets (procedures, parameters, and programs) and “data”
datasets (everything else). Because batch jobs create “data” datasets specific to the job, it
makes sense to use the creating batch job name as the dataset’s unique descriptor (i.e. the
second qualifier). For “control” datasets, the second qualifier may be anything describing
the library’s purpose as long as it is unique within the high-level qualifier.

                  A Note on Other Mainframe Naming Standards

   There are many IBM mainframes, running a variety of operating systems. One
example is the VM LINUX virtual machines. Of course, naming standards and even file
storage are different for each of these operating systems. Because Linux and other
variations of UNIX work on a file system with both directories and files, it is not critical
to name the owner in the file name. The owner can be determined from the directory
and/or disk where the file is located, thus the file name can be more descriptive of its
contents.
An “Ideal” Dataset Naming Standard for zOS

 HLQ:
  o Code a “P” for production, anything else for test.
  o Code the chargeback code for the owning application. This typically ranges
      from two to four characters.
  o Code IMS for IMS databases and related datasets, VSM for VSAM databases
      and related datasets, and DB2 for DB2 databases. Related datasets include
      backups, unloads, and copies. Applications may use any other character set
      for non-database datasets.
 The second qualifier is the DD name of the database dataset.
 The third qualifier is a data type indicator, UNLOAD, or COPYx (where “x”
  describes the use of the copy, e.g. library or vault).
 Working copies of databases must have a “fourth” qualifier to show the date of
  the copy. This qualifier is a “J” followed by the Julian date of the backup.

                                  Examples

The examples here assume a two-character chargeback code.

o Production Amalgamated Assurance claims database (HDAM):
   PAAIMS.DDCLM01D.OSAM                    OSAM dataset, first partition
   PAAIMS.DDCLM01D.J2007153.OSAM working copy of the database
   PAAIMS.DDCLM01D.UNLOAD                  unload dataset
   PAAIMS.DDCLM01D.COPYL                   backup of database, library copy
   PAAIMS.DDCLM01D.COPYV                   backup of database, vaulted tape
o Production Amalgamated Assurance billing code database (HIDAM):
   PAAIMS.DDBILCDD.OSAM          database DSN, data dataset
   PAAIMS.DDBILCDD.KSDS          database DSN, index dataset
   PAAIMS.DDBILCDD.UNLOAD unload dataset for CLAIM first partition
   PAAIMS.DDBILCDD.COPYL backup of database, library copy
   PAAIMS.DDBILCDD.COPYV backup of database, vaulted tape
o Test Amalgamated Assurance claims database (HDAM):
   TAAIMS.DDCLM01D.OSAM          database, OSAM dataset, first partition
   TAAIMS.DDCLM01D.UNLOAD unload dataset for CLAIM first partition
   TAAIMS.DDCLM01D.COPYL backup of database, library copy
   TAAIMS.DDCLM01D.COPYV backup of database, vaulted tape
o Test Amalgamated Assurance futures database (DB2):
       TAADB2.DSNDBC.TS00001A.I0001.A001
o Other Amalgamated Assurance production datasets:
       PAAPARM.BATCH.PARMLIB
       PAAPGM.GENERAL.LOADLIB
       PAACLM.<jobname>.CLMRPT.G0012V00
       PAACLM.<jobname>.CLMBAD.G0001V00
You may note the “other” production dataset names are self-explanatory, or nearly so.
Advantages and Disadvantages

   There are enormous advantages to the naming standard spelled out above.

   A. Clarity. The dataset name instantly identifies who owns it, what is in the dataset,
      and what type of data it is.
   B. Chargeback is easy because the chargeback control information is always in the
      same place.
   C. Security. Whether you have RACF, Top Secret, ACF2, or another security
      package, the HLQ of the dataset is the owner of the protection rules. Placing the
      application’s unique chargeback information in the HLQ leaves no doubt who
      owns the security responsibility for the data. It also drastically reduces the
      overhead and number of RACF objects needed to protect business data.
   D. Automation. Automation tools can construct dataset names using a few simple
      rules. The tools do not need to keep or search for extra data. That reduces CPU
      cycles and reduces the storage required to maintain a list of backups.
   E. Storage. This standard makes it very easy to code ACS routines, both for sending
      datasets to various pools and for excluding datasets from pools. It reduces CPU
      and simplifies ACS routines. Further, dataset allocation is faster with fewer
      dataset screening criteria.

    There is really only one disadvantage to this naming standard: it is an ideal. Starting
out with this ideal, or a similar naming standard, is something to try for. However, while
it is possible to change a legacy system’s dataset names, going from a very simple
naming standard to this standard can be a complicated process.

   A. Many job changes. DSNs must change wherever they occur. Using a global find/
      change utility simplifies the task, but it is still no small undertaking.
   B. In IMS regions, we must change dynamic allocation members. There are
      automated tools to do this.
   C. Many new GDG bases. However, we can easily automate creating the new GDG
      bases. A relatively simple REXX exec would generate the GDGs, RACF profiles,
      and new vaulting lists very rapidly given a list of chargeback codes plus the
      member list of the DBDLIB and a list of the DD names of VSAM databases.
   D. Coordination. It is important to verify, before changing names, what applications
      (OS as well as business applications) are affected. Converting one application at
      a time lessens this disadvantage.

   While there are technical difficulties, none of them is impossible to surmount. By far
the hardest task is convincing the application to make the change. It is easier to do so if
the application already has a good standard; in fact, if their standard follows the general
guidelines set out on the first page, there may be no need to change at all.

More Related Content

What's hot

Vsam interview questions and answers.
Vsam interview questions and answers.Vsam interview questions and answers.
Vsam interview questions and answers.
Sweta Singh
 
11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS
koolkampus
 

What's hot (20)

Ch10
Ch10Ch10
Ch10
 
Mass Storage Structure
Mass Storage StructureMass Storage Structure
Mass Storage Structure
 
Hadoop Distributed File System(HDFS) : Behind the scenes
Hadoop Distributed File System(HDFS) : Behind the scenesHadoop Distributed File System(HDFS) : Behind the scenes
Hadoop Distributed File System(HDFS) : Behind the scenes
 
File organisation
File organisationFile organisation
File organisation
 
Snapshot in Hadoop Distributed File System
Snapshot in Hadoop Distributed File SystemSnapshot in Hadoop Distributed File System
Snapshot in Hadoop Distributed File System
 
Vsam interview questions and answers.
Vsam interview questions and answers.Vsam interview questions and answers.
Vsam interview questions and answers.
 
Hadoop HDFS NameNode HA
Hadoop HDFS NameNode HAHadoop HDFS NameNode HA
Hadoop HDFS NameNode HA
 
11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS
 
Ch 17 disk storage, basic files structure, and hashing
Ch 17 disk storage, basic files structure, and hashingCh 17 disk storage, basic files structure, and hashing
Ch 17 disk storage, basic files structure, and hashing
 
Operation System
Operation SystemOperation System
Operation System
 
Mass storagestructure pre-final-formatting
Mass storagestructure pre-final-formattingMass storagestructure pre-final-formatting
Mass storagestructure pre-final-formatting
 
Hadoop introduction
Hadoop introductionHadoop introduction
Hadoop introduction
 
Os
OsOs
Os
 
Chapter13
Chapter13Chapter13
Chapter13
 
tempdb and Performance Keys
tempdb and Performance Keystempdb and Performance Keys
tempdb and Performance Keys
 
Hadoop and HDFS
Hadoop and HDFSHadoop and HDFS
Hadoop and HDFS
 
Pandi
PandiPandi
Pandi
 
DBMS Unit IV and V Material
DBMS Unit IV and V MaterialDBMS Unit IV and V Material
DBMS Unit IV and V Material
 
HDF5 Life cycle of data
HDF5 Life cycle of dataHDF5 Life cycle of data
HDF5 Life cycle of data
 
Storage Area Networks Unit 2 Notes
Storage Area Networks Unit 2 NotesStorage Area Networks Unit 2 Notes
Storage Area Networks Unit 2 Notes
 

Viewers also liked (7)

Advanced REXX Programming Techniques
Advanced REXX Programming TechniquesAdvanced REXX Programming Techniques
Advanced REXX Programming Techniques
 
TSO Productivity
TSO ProductivityTSO Productivity
TSO Productivity
 
White Paper, The Basics Of Data Security
White Paper, The Basics Of Data SecurityWhite Paper, The Basics Of Data Security
White Paper, The Basics Of Data Security
 
Some ISPF Tricks
Some ISPF TricksSome ISPF Tricks
Some ISPF Tricks
 
Basic IMS For Applications
Basic IMS For ApplicationsBasic IMS For Applications
Basic IMS For Applications
 
IMSDB - DBRC
IMSDB - DBRCIMSDB - DBRC
IMSDB - DBRC
 
UVP, Mine
UVP, MineUVP, Mine
UVP, Mine
 

Similar to White Paper, System Z Dataset Naming Standards

Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storage
Khaja Moiz Uddin
 
Data base management system
Data base management systemData base management system
Data base management system
Suneel Dogra
 

Similar to White Paper, System Z Dataset Naming Standards (20)

27 fcs157al2
27 fcs157al227 fcs157al2
27 fcs157al2
 
Intro to IDMS
Intro to IDMSIntro to IDMS
Intro to IDMS
 
Database systems - Chapter 1
Database systems - Chapter 1Database systems - Chapter 1
Database systems - Chapter 1
 
Database Performance Management in Cloud
Database Performance Management in CloudDatabase Performance Management in Cloud
Database Performance Management in Cloud
 
DBMS.pptx
DBMS.pptxDBMS.pptx
DBMS.pptx
 
Towards secure and dependable storage
Towards secure and dependable storageTowards secure and dependable storage
Towards secure and dependable storage
 
databasesystemsconollyslide1-151102101031-lva1-app6892.pptx
databasesystemsconollyslide1-151102101031-lva1-app6892.pptxdatabasesystemsconollyslide1-151102101031-lva1-app6892.pptx
databasesystemsconollyslide1-151102101031-lva1-app6892.pptx
 
Database-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDatabase-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptx
 
Mca ii-dbms- u-i-introductory concepts of dbms
Mca ii-dbms- u-i-introductory concepts of dbmsMca ii-dbms- u-i-introductory concepts of dbms
Mca ii-dbms- u-i-introductory concepts of dbms
 
DbMs
DbMsDbMs
DbMs
 
RMAN in 12c: The Next Generation (WP)
RMAN in 12c: The Next Generation (WP)RMAN in 12c: The Next Generation (WP)
RMAN in 12c: The Next Generation (WP)
 
Database-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDatabase-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptx
 
csedatabasemanagementsystemppt-170825044344.pdf
csedatabasemanagementsystemppt-170825044344.pdfcsedatabasemanagementsystemppt-170825044344.pdf
csedatabasemanagementsystemppt-170825044344.pdf
 
Database Management System ppt
Database Management System pptDatabase Management System ppt
Database Management System ppt
 
Bsc cs ii-dbms- u-i-database systems
Bsc cs ii-dbms- u-i-database systemsBsc cs ii-dbms- u-i-database systems
Bsc cs ii-dbms- u-i-database systems
 
Migration to Oracle 12c Made Easy Using Replication Technology
Migration to Oracle 12c Made Easy Using Replication TechnologyMigration to Oracle 12c Made Easy Using Replication Technology
Migration to Oracle 12c Made Easy Using Replication Technology
 
Database System Concepts and Architecture
Database System Concepts and ArchitectureDatabase System Concepts and Architecture
Database System Concepts and Architecture
 
Data base management system
Data base management systemData base management system
Data base management system
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
 
Unit01 dbms
Unit01 dbmsUnit01 dbms
Unit01 dbms
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 

White Paper, System Z Dataset Naming Standards

  • 1. System-Z Dataset Naming Standards Business data comes in many forms. It is found in program libraries, databases, extracts from databases, files created from manipulating database data, unloads, backups, access logs, stored procedures, and so on. Controlling access to business data seems daunting, if not impossible. If we remember all business data (except printed reports) exists as datasets on some form of electronic media, the task becomes manageable, even relatively easy. The key is a good dataset naming standard. A proper dataset naming standard has these features.  The HLQ is unique, not only to the application but also to the data’s purpose within that application.  It describes the owning application and indicates the usage of the data.  It indicates whether the data is production or test.  The second qualifier describes the dataset uniquely.  The third qualifier describes the type of data on the dataset. In other words, is it a database, an unload, a log, or some other dataset? There are two exceptions to these rules. The first exception is DB2, which has its own naming standard. However, DB2’s standard is easily amenable to the general rules. The second exception is the existence of “working copies” of databases, i.e. a copy of the database for problem investigation, utility testing, and other purposes. Database versus Non-database Business Data In almost all cases, database datasets already have a form of naming standard. Whether this is a DD-name based standard (IMS) or a table space standard (DB2), there are certain rules inherent in the DBMS. Non-database datasets, however, have no such limits and may carry any name the IT person can think of. Non-database datasets come in two forms: “control” datasets (procedures, parameters, and programs) and “data” datasets (everything else). Because batch jobs create “data” datasets specific to the job, it makes sense to use the creating batch job name as the dataset’s unique descriptor (i.e. the second qualifier). For “control” datasets, the second qualifier may be anything describing the library’s purpose as long as it is unique within the high-level qualifier. A Note on Other Mainframe Naming Standards There are many IBM mainframes, running a variety of operating systems. One example is the VM LINUX virtual machines. Of course, naming standards and even file storage are different for each of these operating systems. Because Linux and other variations of UNIX work on a file system with both directories and files, it is not critical to name the owner in the file name. The owner can be determined from the directory and/or disk where the file is located, thus the file name can be more descriptive of its contents.
  • 2. An “Ideal” Dataset Naming Standard for zOS  HLQ: o Code a “P” for production, anything else for test. o Code the chargeback code for the owning application. This typically ranges from two to four characters. o Code IMS for IMS databases and related datasets, VSM for VSAM databases and related datasets, and DB2 for DB2 databases. Related datasets include backups, unloads, and copies. Applications may use any other character set for non-database datasets.  The second qualifier is the DD name of the database dataset.  The third qualifier is a data type indicator, UNLOAD, or COPYx (where “x” describes the use of the copy, e.g. library or vault).  Working copies of databases must have a “fourth” qualifier to show the date of the copy. This qualifier is a “J” followed by the Julian date of the backup. Examples The examples here assume a two-character chargeback code. o Production Amalgamated Assurance claims database (HDAM):  PAAIMS.DDCLM01D.OSAM OSAM dataset, first partition  PAAIMS.DDCLM01D.J2007153.OSAM working copy of the database  PAAIMS.DDCLM01D.UNLOAD unload dataset  PAAIMS.DDCLM01D.COPYL backup of database, library copy  PAAIMS.DDCLM01D.COPYV backup of database, vaulted tape o Production Amalgamated Assurance billing code database (HIDAM):  PAAIMS.DDBILCDD.OSAM database DSN, data dataset  PAAIMS.DDBILCDD.KSDS database DSN, index dataset  PAAIMS.DDBILCDD.UNLOAD unload dataset for CLAIM first partition  PAAIMS.DDBILCDD.COPYL backup of database, library copy  PAAIMS.DDBILCDD.COPYV backup of database, vaulted tape o Test Amalgamated Assurance claims database (HDAM):  TAAIMS.DDCLM01D.OSAM database, OSAM dataset, first partition  TAAIMS.DDCLM01D.UNLOAD unload dataset for CLAIM first partition  TAAIMS.DDCLM01D.COPYL backup of database, library copy  TAAIMS.DDCLM01D.COPYV backup of database, vaulted tape o Test Amalgamated Assurance futures database (DB2):  TAADB2.DSNDBC.TS00001A.I0001.A001 o Other Amalgamated Assurance production datasets:  PAAPARM.BATCH.PARMLIB  PAAPGM.GENERAL.LOADLIB  PAACLM.<jobname>.CLMRPT.G0012V00  PAACLM.<jobname>.CLMBAD.G0001V00
  • 3. You may note the “other” production dataset names are self-explanatory, or nearly so.
  • 4. Advantages and Disadvantages There are enormous advantages to the naming standard spelled out above. A. Clarity. The dataset name instantly identifies who owns it, what is in the dataset, and what type of data it is. B. Chargeback is easy because the chargeback control information is always in the same place. C. Security. Whether you have RACF, Top Secret, ACF2, or another security package, the HLQ of the dataset is the owner of the protection rules. Placing the application’s unique chargeback information in the HLQ leaves no doubt who owns the security responsibility for the data. It also drastically reduces the overhead and number of RACF objects needed to protect business data. D. Automation. Automation tools can construct dataset names using a few simple rules. The tools do not need to keep or search for extra data. That reduces CPU cycles and reduces the storage required to maintain a list of backups. E. Storage. This standard makes it very easy to code ACS routines, both for sending datasets to various pools and for excluding datasets from pools. It reduces CPU and simplifies ACS routines. Further, dataset allocation is faster with fewer dataset screening criteria. There is really only one disadvantage to this naming standard: it is an ideal. Starting out with this ideal, or a similar naming standard, is something to try for. However, while it is possible to change a legacy system’s dataset names, going from a very simple naming standard to this standard can be a complicated process. A. Many job changes. DSNs must change wherever they occur. Using a global find/ change utility simplifies the task, but it is still no small undertaking. B. In IMS regions, we must change dynamic allocation members. There are automated tools to do this. C. Many new GDG bases. However, we can easily automate creating the new GDG bases. A relatively simple REXX exec would generate the GDGs, RACF profiles, and new vaulting lists very rapidly given a list of chargeback codes plus the member list of the DBDLIB and a list of the DD names of VSAM databases. D. Coordination. It is important to verify, before changing names, what applications (OS as well as business applications) are affected. Converting one application at a time lessens this disadvantage. While there are technical difficulties, none of them is impossible to surmount. By far the hardest task is convincing the application to make the change. It is easier to do so if the application already has a good standard; in fact, if their standard follows the general guidelines set out on the first page, there may be no need to change at all.