On Mon, 25 Jun 2007 15:06:57 -0400, Doug Fuerst 
<[EMAIL PROTECTED]> wrote:

>What, pray tell, is the point of this exercise?
>
>At 02:30 PM 6/25/2007, you wrote:
>>On Mon, 25 Jun 2007 03:29:44 -0500, Eric Sun 
<[EMAIL PROTECTED]>
>>wrote:
>>
>> >HI, all
>> >
>> >Our company recently had been given a task by our client to test the
>> >responsiveness and capabilities of their systems programmer in their test
>> >environment. Our tasks assigned include to hack their system to 
>> >cause/simulate system and application outage, of course not to the
>> >extent of hanging/re-IPLing the whole system.
>> >Just want to know whether anyone out there have done any similar test
>> >before and willing to share what they have tested. Btw, we will be
>> >provided
>> >with powerful TSO user IDs but won't be allowed to touch any system
>> >module and probably just to change some control blocks in memory.
>> >Somehow, it seems easy to think what you can do in CICS and DB/2 but
>> >it's
>> >easier said than done in MVS.
>> >
>> >The systems programmers will be given at least 1-1/2 hour limit to resolve
>> >the problem.
>> >
>> >Thanks and regards
>> >
>> >Eric Sun
>>snip>>>>>>>>>>
>
>Doug Fuerst
>Consultant
>BK Associates
>Brooklyn, NY

Just E-X-C-E-R-C-I-S-E maybe?!

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to