On 14 Oct 2010 07:24:01 -0700, in bit.listserv.ibm-main you wrote: >At 10/13/2010 10:26 AM, Greg Shirey wrote: >>I liked this article, and it's fairly recent. (Jan 2010) >> >>http://www.mainframezone.com/it-management/mainframe-hacking-fact-or-fiction/P1 >> >>Greg > >I read that article, and it is a good one. Interestingly (to me at >least), on the article's third web page, there is an excerpt from a >post I made here in 2006. It's nice to know that someone is paying attention. > >My entire post can be found at: >http://bama.ua.edu/cgi-bin/wa?A2=ind0608&L=IBM-MAIN&P=R63457&X=147B1F23465267AA41&Y=dbcole%40colesoft.com > >I think the information in that post are highly relevant to the >current thread.
For example, why do IDCAMS and IEBCOPY have to be authorized? The IEBCOPY replacement doesn't have to be authorized. Would it be worthwhile for both vendors and users to see what they can do to reduce the amount of code that has to be authorized? Clark Morris > >Dave Cole REPLY TO: dbc...@colesoft.com >ColeSoft Marketing WEB PAGE: http://www.colesoft.com >736 Fox Hollow Road VOICE: 540-456-8536 >Afton, VA 22920 FAX: 540-456-6658 > ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html