It is worth recalling Mr Perryman's name for this thread, viz., Security exposure of zXXP.
His riposte---It is not responsive---to my last post employs a rhetorical device that was familiar to the Alexandrian Greeks. In answer to my contention that position 1457 and position 1458 in a Kama Sutra of programming tactics have the same orthopedic risks his rebuttal was that position 1457 aggravates scoliosis. My point---I made it in deliberately bald language---was that the security 'exposures' associated with the availability of SRBs are not worse for zIIPs and zAAPs than they are for unspecialized CPs. As Shane Ginnane noted in another context, auditors, however limited their technical grasp, can and do read. I foresee yet another addition to their standard queries: o Does your z/OS or z/VM installation have zIIPs, zAAPs, IFLs, . . . installed? o If so list the uses that are made of them, identifying each application and each ISV involved. John Gilmore, Ashland, MA 01721 - USA ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN