Why would a dishonest customer be willing to grant your product the security it needs to validate the seating arrangements (assuming that is your intent)? [Think security exit, etc. that tells your product it is authorized, but suppresses actual access.] If the customer is honest, then he would just abide by the contract as agreed.
> -----Original Message----- > From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On > Behalf Of Steve Austin > Sent: Monday, September 20, 2010 3:41 AM > To: IBM-MAIN@bama.ua.edu > Subject: Identify all MVS images in a CEC > > I am researching seat based licensing for Cloud computing on z/OS and > have the following question. > > From an MVS image is it possible to identify all other active MVS > images > in the CEC even if some of those images are not in a sysplex? > > Thanks > > Steve > > - --------------------------------------------------------------------- > --- > This email has been scanned for all known viruses by the MessageLabs > Email > Security Service and the Macro 4 internal virus protection system. > . --------------------------------------------------------------------- > --- > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html