This type coding z/os internals must make up about 1% of software development 

I’m quite sure that for Java there isn’t this type of problem 



> On Nov 12, 2018, at 5:54 PM, Binyamin Dissen <bdis...@dissensoftware.com> 
> wrote:
> 
> There are a large number of parts to make sure that things are done the right
> way, and that a fault will not bring the system to a crash.
> 
> While one might be able to show examples of simple techniques, there is a lot
> of infrastructure required to handle problems.
> 
> For example, what happens if you force an SSAR to a swapable address space
> that happens to be swapped in and the address space gets swapped out in the
> middle? If I recall correctly, the next page fault that I had in the target
> address space caused a MEMTERM of the home address space - which meant no
> ESTAEs got control.
> 
> 
> 
> On Mon, 12 Nov 2018 22:11:15 +0000 "Farley, Peter x23353"
> <peter.far...@broadridge.com> wrote:
> 
> :>And that was my whole point -- Where are the examples for programmers to 
> see how to do it the right way?
> :>
> :>If SHARE has some presentations it is good to know that.  Not the easiest 
> place to search for stuff, but at least it is accessible.
> :>
> :>Yes, of course experience is the best teacher, but without even examples of 
> how to do something it is awfully hard to figure it out on your own.
> :>
> :>". . . thoroughly knowledgeable about how the system works" is a whole 
> 'nother can of worms.  Back in the day places like universities in some 
> cities offered "adult education" courses on MVS debugging and internals.  I 
> took a two-semester course like that back around the time that the MVS lock 
> manager was first introduced, and it was wonderful, complex, interesting 
> material to learn.
> :>
> :>Of course, all that is ancient history now.  No university or education 
> center offers anything like that anymore.  Much more profitable to offer 
> certification courses in Windows.
> :>
> :>Peter
> :>
> :>-----Original Message-----
> :>From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
> Behalf Of Steve Smith
> :>Sent: Monday, November 12, 2018 3:33 PM
> :>To: IBM-MAIN@LISTSERV.UA.EDU
> :>Subject: Re: Why are sophisticated system-level coding examples not 
> available? [was: RE: Recommended method for accessing secondary access spaces]
> :>
> :>There are some good SHARE presentations on some of these techniques.
> :>Unfortunately for you, I'm too lazy to search for them.
> :>
> :>However, and this is important, anything and everything you do that uses 
> authorized services entails exposure of system integrity.  It behooves any 
> organization to ensure that its personnel writing such code are well-trained 
> and thoroughly knowledgeable about how the system works, is designed, and 
> what those exposures are.  It's also perfectly clear many organizations, 
> including many ISVs, do not.  This kind of knowledge and experience doesn't 
> come from blindly following two-sentence replies from who knows who on 
> IBM-MAIN (I know who's who on IBM-MAIN, as many of us do, but how would a 
> newbie know?).
> :>
> :>You could easily read a paper on the latest techniques in brain surgery.
> :>I'd be skeptical about your ability to do it, unless you had the prior 
> training and experience it requires.
> :>
> :>The point is, you need that training and experience, and you also need to 
> be able to train and study on your own, as there's very little in the way of 
> formal education in our field.  Neither IBM-MAIN nor StackOverflow are a 
> substitute for the fundamentals.
> :>
> :>sas
> :>
> :>On Mon, Nov 12, 2018 at 1:56 PM David W Noon < 
> 0000013a910fd252-dmarc-requ...@listserv.ua.edu> wrote:
> :>
> :>> On Mon, 12 Nov 2018 18:13:30 +0000, Farley, Peter X23353
> :>> (peter.far...@broadridge.com) wrote about "Why are sophisticated 
> :>> system-level coding examples not available? [was: RE: Recommended 
> :>> method for accessing secondary access spaces]" (in
> :>> <f6dfa267dd2a448b881a732dbbcc3...@clipswexmaa4.bsg.ad.adp.com>):
> :>>
> :>> > Not jumping on Ed Jaffe or Peter Relson or any of the other 
> :>> > thoughtful and helpful responders in this email chain, but it still 
> :>> > rankles me that there are no good examples anywhere (not at IBM and 
> :>> > not at CBT) for programmers to review that show exactly how to set 
> :>> > up and use "SRB to the other address space and PC-ss back to the 
> :>> > requesting address space" or any similarly sophisticated 
> :>> > system-level application coding technique.
> :>> >
> :>> > Why is system-level application coding made an obscure mystery to 
> :>> > which only IBM and (some) ISV's have access?  Good examples that 
> :>> > show how to "do the right thing" would avoid an awful lot of 
> :>> > dangerous
> :>> experimentation.
> :>> > "Security through obscurity" is, I think all here would agree. NOT a 
> :>> > good thing.
> 
> --
> Binyamin Dissen <bdis...@dissensoftware.com>
> http://www.dissensoftware.com
> 
> Director, Dissen Software, Bar & Grill - Israel
> 
> 
> Should you use the mailblocks package and expect a response from me,
> you should preauthorize the dissensoftware.com domain.
> 
> I very rarely bother responding to challenge/response systems,
> especially those from irresponsible companies.
> 
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to