On Mon, 25 Jun 2007 15:06:57 -0400, Doug Fuerst <[EMAIL PROTECTED]> wrote:
>What, pray tell, is the point of this exercise? > >At 02:30 PM 6/25/2007, you wrote: >>On Mon, 25 Jun 2007 03:29:44 -0500, Eric Sun <[EMAIL PROTECTED]> >>wrote: >> >> >HI, all >> > >> >Our company recently had been given a task by our client to test the >> >responsiveness and capabilities of their systems programmer in their test >> >environment. Our tasks assigned include to hack their system to >> >cause/simulate system and application outage, of course not to the >> >extent of hanging/re-IPLing the whole system. >> >Just want to know whether anyone out there have done any similar test >> >before and willing to share what they have tested. Btw, we will be >> >provided >> >with powerful TSO user IDs but won't be allowed to touch any system >> >module and probably just to change some control blocks in memory. >> >Somehow, it seems easy to think what you can do in CICS and DB/2 but >> >it's >> >easier said than done in MVS. >> > >> >The systems programmers will be given at least 1-1/2 hour limit to resolve >> >the problem. >> > >> >Thanks and regards >> > >> >Eric Sun >>snip>>>>>>>>>> > >Doug Fuerst >Consultant >BK Associates >Brooklyn, NY Just E-X-C-E-R-C-I-S-E maybe?! ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html