Guys,

But, the question is "HOW" ?

I mean, we have been talking about sceurity and encryption, etc... but how
does all that work. Meaning, what are the code blocks that we need to
develop ?

Also, what type of network setup should be there between Mainframes and its
TCP/IP server ?

---
Parin


On 11/29/05, Paul Gilmartin <[EMAIL PROTECTED]> wrote:
>
> In a recent note, Marian Gasparovic said:
>
> > Date:         Tue, 29 Nov 2005 16:09:05 +0100
> >
> > Sure, there are situations you can use it. But security is the biggest
> > concern. Again think about security. An don't forget security issues.
> >
> > But I did it once for our developers. They were at customer site, no
> access
> > to our network. So I created "automated solution". They sent specificaly
> > (very strict requirements) formatted email to special user with list of
> > names of stored procedures. It submitted a job, which extracted those
> > members from libraries, xmited to seq file, zipped and sent to requestor
> (of
> > course limited list of requestors). Works fine till now although I left
> the
> > company 18 months ago... :)
> >
> > Oh, did I mention security ?
> >
> On rereading carefully, I see you did mention security.  But you didn't
> mention encryption.  Or digital signatures, unless that's implicit
> in "specificaly (very strict requirements) formatted".
>
> -- gil
> --
> StorageTek
> INFORMATION made POWERFUL
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>



--
Parin Gangar

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to