Why would a dishonest customer be willing to grant your product the security
it needs to validate the seating arrangements (assuming that is your
intent)? [Think security exit, etc. that tells your product it is
authorized, but suppresses actual access.]
If the customer is honest, then he would just abide by the contract as
agreed.

> -----Original Message-----
> From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On
> Behalf Of Steve Austin
> Sent: Monday, September 20, 2010 3:41 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Identify all MVS images in a CEC
> 
> I am researching seat based licensing for Cloud computing on z/OS and
> have the following question.
> 
> From an MVS image is it possible to identify all other active MVS
> images
> in the CEC even if some of those images are not in a sysplex?
> 
> Thanks
> 
> Steve
> 
> - ---------------------------------------------------------------------
> ---
> This email has been scanned for all known viruses by the MessageLabs
> Email
> Security Service and the Macro 4 internal virus protection system.
> . ---------------------------------------------------------------------
> ---
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to