And that was my whole point -- Where are the examples for programmers to see how to do it the right way?
If SHARE has some presentations it is good to know that. Not the easiest place to search for stuff, but at least it is accessible. Yes, of course experience is the best teacher, but without even examples of how to do something it is awfully hard to figure it out on your own. ". . . thoroughly knowledgeable about how the system works" is a whole 'nother can of worms. Back in the day places like universities in some cities offered "adult education" courses on MVS debugging and internals. I took a two-semester course like that back around the time that the MVS lock manager was first introduced, and it was wonderful, complex, interesting material to learn. Of course, all that is ancient history now. No university or education center offers anything like that anymore. Much more profitable to offer certification courses in Windows. Peter -----Original Message----- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Steve Smith Sent: Monday, November 12, 2018 3:33 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Why are sophisticated system-level coding examples not available? [was: RE: Recommended method for accessing secondary access spaces] There are some good SHARE presentations on some of these techniques. Unfortunately for you, I'm too lazy to search for them. However, and this is important, anything and everything you do that uses authorized services entails exposure of system integrity. It behooves any organization to ensure that its personnel writing such code are well-trained and thoroughly knowledgeable about how the system works, is designed, and what those exposures are. It's also perfectly clear many organizations, including many ISVs, do not. This kind of knowledge and experience doesn't come from blindly following two-sentence replies from who knows who on IBM-MAIN (I know who's who on IBM-MAIN, as many of us do, but how would a newbie know?). You could easily read a paper on the latest techniques in brain surgery. I'd be skeptical about your ability to do it, unless you had the prior training and experience it requires. The point is, you need that training and experience, and you also need to be able to train and study on your own, as there's very little in the way of formal education in our field. Neither IBM-MAIN nor StackOverflow are a substitute for the fundamentals. sas On Mon, Nov 12, 2018 at 1:56 PM David W Noon < 0000013a910fd252-dmarc-requ...@listserv.ua.edu> wrote: > On Mon, 12 Nov 2018 18:13:30 +0000, Farley, Peter X23353 > (peter.far...@broadridge.com) wrote about "Why are sophisticated > system-level coding examples not available? [was: RE: Recommended > method for accessing secondary access spaces]" (in > <f6dfa267dd2a448b881a732dbbcc3...@clipswexmaa4.bsg.ad.adp.com>): > > > Not jumping on Ed Jaffe or Peter Relson or any of the other > > thoughtful and helpful responders in this email chain, but it still > > rankles me that there are no good examples anywhere (not at IBM and > > not at CBT) for programmers to review that show exactly how to set > > up and use "SRB to the other address space and PC-ss back to the > > requesting address space" or any similarly sophisticated > > system-level application coding technique. > > > > Why is system-level application coding made an obscure mystery to > > which only IBM and (some) ISV's have access? Good examples that > > show how to "do the right thing" would avoid an awful lot of > > dangerous > experimentation. > > "Security through obscurity" is, I think all here would agree. NOT a > > good thing. -- This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail and delete the message and any attachments from your system. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN