Ed Gould wrote:
I had a job interview about 20 years ago at a place in California that handled top secret (and above data) all the time. I asked how they contacted IBM for support and how they handled dumps problems etc...The answer I got back was that they didn't contact IBM and you were expected to figure out the issue. I was at that time of the interview pretty sure I was not interested in it so I asked but without source how can you expect to figure out where the problem was and even if you could how could you fix it without telling IBM how to fix it. The answer was surprising even to me. They said you don't. I shook my head and walked out and drove back to the airport and took the plane back and was so disgusted with myself for wasting my time on an interview that if I had been given an outline of all the restrictions that would be put on the job I would not have wasted my time.
I have received dumps from top secret government organizations (both domestic and foreign) that have been programmatically redacted. The dumps were pre-formatted by the customer (the output of various IPCS commands against the original dump file). All names of things (userid, system, sysplex, NJE node, JES member, etc.) in the dump were replaced with the characters XXXX in both hex and EBCDIC portions of each line. Amazingly, I have been able to solve problems using such dumps!
-- Edward E Jaffe Phoenix Software International, Inc 5200 W Century Blvd, Suite 800 Los Angeles, CA 90045 310-338-0400 x318 [email protected] http://www.phoenixsoftware.com/ ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

