----------------------------------------<snip>-----------------------------------
IMHO: exits as a subspecies are evil critters. They become an ongoing maintenance challenge and tend to attract unwelcome attention from auditors. Exits are hard to write, hard to stress test, and introduce a level of risk. You need extraordinary measures in place to protect the code.
-------------------------------------<unsnip>-------------------------------------

I disagree, Hal. Exits CAN be overused and poorly coded; no argument there. But they often provide the only mechanism of tayloring function to fit business or technical needs, or sometimes arbitrary mandates from senior management. Testing a new installation or upgraded level of the OS need not be excessively delayed by the presence of exits; you just need to have good, solid code and a good testing methodology in place. But you need that anyway, don't you? As far as auditors are concerned, if they know what they're actually auditing, then they will understand reasoned arguments in favor of the appropriate exit. And of course you're going to protect ANY exit as carefully, or more carefully, than any other piece of APF-authorized code. Right?

--
Rick
--
Remember that if you’re not the lead dog, the view never changes.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to