Guys, But, the question is "HOW" ?
I mean, we have been talking about sceurity and encryption, etc... but how does all that work. Meaning, what are the code blocks that we need to develop ? Also, what type of network setup should be there between Mainframes and its TCP/IP server ? --- Parin On 11/29/05, Paul Gilmartin <[EMAIL PROTECTED]> wrote: > > In a recent note, Marian Gasparovic said: > > > Date: Tue, 29 Nov 2005 16:09:05 +0100 > > > > Sure, there are situations you can use it. But security is the biggest > > concern. Again think about security. An don't forget security issues. > > > > But I did it once for our developers. They were at customer site, no > access > > to our network. So I created "automated solution". They sent specificaly > > (very strict requirements) formatted email to special user with list of > > names of stored procedures. It submitted a job, which extracted those > > members from libraries, xmited to seq file, zipped and sent to requestor > (of > > course limited list of requestors). Works fine till now although I left > the > > company 18 months ago... :) > > > > Oh, did I mention security ? > > > On rereading carefully, I see you did mention security. But you didn't > mention encryption. Or digital signatures, unless that's implicit > in "specificaly (very strict requirements) formatted". > > -- gil > -- > StorageTek > INFORMATION made POWERFUL > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > -- Parin Gangar ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

