On 14 Oct 2010 07:24:01 -0700, in bit.listserv.ibm-main you wrote:

>At 10/13/2010 10:26 AM, Greg Shirey wrote:
>>I liked this article, and it's fairly recent.  (Jan 2010)
>>
>>http://www.mainframezone.com/it-management/mainframe-hacking-fact-or-fiction/P1
>>
>>Greg
>
>I read that article, and it is a good one. Interestingly (to me at 
>least), on the article's third web page, there is an excerpt from a 
>post I made here in 2006. It's nice to know that someone is paying attention.
>
>My entire post can be found at: 
>http://bama.ua.edu/cgi-bin/wa?A2=ind0608&L=IBM-MAIN&P=R63457&X=147B1F23465267AA41&Y=dbcole%40colesoft.com
>
>I think the information in that post are highly relevant to the 
>current thread.

For example, why do IDCAMS and IEBCOPY have to be authorized?  The
IEBCOPY replacement doesn't have to be authorized.  Would it be
worthwhile for both vendors and users to see what they can do to
reduce the amount of code that has to be authorized?

Clark Morris
>
>Dave Cole              REPLY TO: dbc...@colesoft.com
>ColeSoft Marketing     WEB PAGE: http://www.colesoft.com
>736 Fox Hollow Road    VOICE:    540-456-8536
>Afton, VA 22920        FAX:      540-456-6658
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to