On 1/6/2014 12:25 PM, Walt Farrell wrote:
While that's true for unauthorized programs, SDSF needs to runs authorized, and there's actually a fair amount of "special" stuff going on under the covers. Your more typical authorized program cannot interact with the user via ISPF services as SDSF does. It takes a lot of work (design and programming) to allow that while maintaining system integrity.

That "special stuff" is primarily mitigation of exposures in an old Field-Developed-Product (FDP) design that used a so-called "magic" SVC. Programs written today would likely not be designed that way.

--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
http://www.phoenixsoftware.com/

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to