Dave Cole writes emails as well as he writes software. But a small reinforcement.
> Trust? A while back I worked for an ISV and was responsible for the "code program" for what was then the number one product on both total sales and velocity for the company. A Very Large Computer User (VLCU) has multiple datacenters. It seems that the sysprogs shared install tapes. Then they called in for "temp auth codes". One of our support people noticed the pattern and reported it. The lawyers had lunch. The settlement did not require SEC reporting but the number of licences VLCU had went way up. The rumor was they had to licence the product for every datacenter (some of which had extremely high security and were therefore unauditable). In troubled waters, build a bridge, pour oil, or hire the biggest shark. As one of my high school teachers (think Yoda in a nun's habit) used to say when your homework was missing due to canine misbehavior, "Believe everybody, trust nobody." > User Friendliness: > Disaster Recovery: The ISV our group works with at the moment is very small. Their support seems to have the ability to generate authcodes at home. We have called all hours of the day and night. No problem. Good people. I do wish they had something I put into my routine. You could put every authcode statement for every product our company had into one file. My routine sorted through them looking for one which was valid. If multiple were valid, it authorized the greatest functionality it could consistent with what the caller requested. It didn't care if some of the authcodes were expired or for other machines or for other products. It would be very helpful today to have one file for all plexes (we have 16), not have to remove expired codes, not have to replace new codes with the one that will be used next month. Update one place and broadcast to all plexes in daily maintenance. pup IBM Mainframe Discussion List <[email protected]> wrote on 02/17/2007 01:43:23 PM: > User Friendliness: > Disaster Recovery: > Trust? > Dave Cole ----------------------------------------- The information contained in this communication (including any attachments hereto) is confidential and is intended solely for the personal and confidential use of the individual or entity to whom it is addressed. The information may also constitute a legally privileged confidential communication. If the reader of this message is not the intended recipient or an agent responsible for delivering it to the intended recipient, you are hereby notified that you have received this communication in error and that any review, dissemination, copying, or unauthorized use of this information, or the taking of any action in reliance on the contents of this information is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail, and delete the original message. Thank you ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

