Dave Cole writes emails as well as he writes software.  But a small 
reinforcement.

> Trust?

A while back I worked for an ISV and was responsible for the "code 
program" for what was then the number one product on both total sales and 
velocity for the company.  A Very Large Computer User (VLCU) has multiple 
datacenters.  It seems that the sysprogs shared install tapes.  Then they 
called in for "temp auth codes".  One of our support people noticed the 
pattern and reported it.  The lawyers had lunch.

The settlement did not require SEC reporting but the number of licences 
VLCU had went way up.  The rumor was they had to licence the product for 
every datacenter (some of which had extremely high security and were 
therefore unauditable).  In troubled waters, build a bridge, pour oil, or 
hire the biggest shark.

As one of my high school teachers (think Yoda in a nun's habit) used to 
say when your homework was missing due to canine misbehavior, "Believe 
everybody, trust nobody."

> User Friendliness:
> Disaster Recovery:

The ISV our group works with at the moment is very small.  Their support 
seems to have the ability to generate authcodes at home.  We have called 
all hours of the day and night.  No problem.  Good people.

I do wish they had something I put into my routine.  You could put every 
authcode statement for every product our company had into one file.  My 
routine sorted through them looking for one which was valid.  If multiple 
were valid, it authorized the greatest functionality it could consistent 
with what the caller requested.  It didn't care if some of the authcodes 
were expired or for other machines or for other products.

It would be very helpful today to have one file for all plexes (we have 
16), not have to remove expired codes, not have to replace new codes with 
the one that will be used next month.  Update one place and broadcast to 
all plexes in daily maintenance.

pup

IBM Mainframe Discussion List <[email protected]> wrote on 02/17/2007 
01:43:23 PM:

> User Friendliness:

> Disaster Recovery:

> Trust?

> Dave Cole

-----------------------------------------
The information contained in this communication (including any
attachments hereto) is confidential and is intended solely for the
personal and confidential use of the individual or entity to whom
it is addressed. The information may also constitute a legally
privileged confidential communication. If the reader of this
message is not the intended recipient or an agent responsible for
delivering it to the intended recipient, you are hereby notified
that you have received this communication in error and that any
review, dissemination, copying, or unauthorized use of this
information, or the taking of any action in reliance on the
contents of this information is strictly prohibited. If you have
received this communication in error, please notify us immediately
by e-mail, and delete the original message. Thank you

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to