There's hardware-level instruction tracing, particularly advanced in System
z10, that functions outside even the operating systems and which is
extremely non-intrusive. IBM has talked a bit about this functionality
previously.

Maybe we should back up six steps here. What is the original poster trying
to accomplish in terms of business goal(s)? An extremely large number of
companies have built highly successful business models in mainframe
software without extraordinary attempts to prevent binary code inspection,
so, basically, what's different in this case?

- - - - -
Timothy Sipples
IBM Consulting Enterprise Software Architect
Based in Tokyo, Serving IBM Japan / Asia-Pacific
E-Mail: timothy.sipp...@us.ibm.com
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to