Ed Gould wrote:
I had a job interview about 20 years ago at a place in California that handled 
top secret (and above data) all the time. I asked how they contacted IBM for 
support and how they handled dumps problems etc...The answer I got back was 
that they didn't contact IBM and you were expected to figure out the issue. I 
was at that time of the interview pretty sure I was not interested in it so I 
asked but without source how can you expect to figure out where the problem was 
and even if you could how could you fix it without telling IBM how to fix it. 
The answer was surprising  even to me. They said you don't.
I shook my head and walked out and drove back to the airport and took the plane 
back and was so disgusted with myself for wasting my time on an interview that 
if I had been given an outline of all the restrictions that would be put on the 
job I would not have wasted my time.

I have received dumps from top secret government organizations (both domestic and foreign) that have been programmatically redacted. The dumps were pre-formatted by the customer (the output of various IPCS commands against the original dump file). All names of things (userid, system, sysplex, NJE node, JES member, etc.) in the dump were replaced with the characters XXXX in both hex and EBCDIC portions of each line. Amazingly, I have been able to solve problems using such dumps!

--
Edward E Jaffe
Phoenix Software International, Inc
5200 W Century Blvd, Suite 800
Los Angeles, CA 90045
310-338-0400 x318
[email protected]
http://www.phoenixsoftware.com/

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to