+1

I would say that sometimes right after a feature comes out there is a 
presentation at SHARE, e.g., "How to use the new PC-ss facility." That is not 
optimal if your first need to use PC-ss comes five or ten years after it first 
is available. Some SHARE presentations are available online; some are not. Some 
stand alone pretty well without the speaker's words; some do not.

ISVs have their plates full just like IBM. We have even less incentive than IBM 
to volunteer manpower to create HOWTO documentation, so I don't see it 
happening that way.

What business justification for IBM? Little now. But good documentation 
examples should have been part of the budget when the facility was originally 
implemented.

Charles


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Farley, Peter x23353
Sent: Monday, November 12, 2018 10:14 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Why are sophisticated system-level coding examples not available? 
[was: RE: Recommended method for accessing secondary access spaces]

Not jumping on Ed Jaffe or Peter Relson or any of the other thoughtful and 
helpful responders in this email chain, but it still rankles me that there are 
no good examples anywhere (not at IBM and not at CBT) for programmers to review 
that show exactly how to set up and use "SRB to the other address space and 
PC-ss back to the requesting address space" or any similarly sophisticated 
system-level application coding technique.

Why is system-level application coding made an obscure mystery to which only 
IBM and (some) ISV's have access?  Good examples that show how to "do the right 
thing" would avoid an awful lot of dangerous experimentation.  "Security 
through obscurity" is, I think all here would agree. NOT a good thing.

If you don't show programmers how to do it right, you can't really yell at them 
for not doing so.

Maybe if the ISV's got together (at SHARE maybe?) they could agree on 
publishing stripped-down HOWTO examples based on the work they have already 
done to "do the right thing".  That way no one ISV is alone in exposing any 
potentially valuable intellectual property.

And of course IBM really ought to be publishing good examples too, but I 
suspect the answer to that is the usual "what business justification can you 
show to make it a profitable exercise to spend valuable and scarce resources 
doing?".

How about helping your customers not to give themselves serious trouble that 
you could help them avoid?

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to