Should be 8 years. IRS can go back 7 year years, plus the filing year. On Mon, Feb 5, 2024 at 12:09 PM Colin Paice <[email protected]> wrote:
> One customer told me that some of their applications are run once a year - > such as end of year accounts and tax. Some applications (a few) were kept > around for 4 years before they were finaly killed off. > Colin > > On Mon, 5 Feb 2024 at 17:28, Farley, Peter < > [email protected]> wrote: > > > I am constantly amazed at how much this whole “zero trust” meme is > > violating the concept of sharing everything among application developers. > > I for one have no qualms about any other application programmer at my > shop > > seeing any coding I am doing (though I might be occasionally embarrassed > by > > my own dumb mistakes). > > > > It is not “innocent” to share access to application programming > > information and styles and pitfalls, it is crucial to application > > programmer development and advancement. We learn from each other, > > especially from sharing our mistakes as well as our best practices and > > clever innovations. > > > > Add to that stupid security rules like “if you didn’t access this > resource > > for the last 180 days we revoke your access to that resource”, which > causes > > all kinds of headaches when you have to suddenly deal with issues in a > > yearly weekend production process and you don’t have read rights to the > > data files you need to view to resolve the issue and the security team > only > > works 9 to 5 weekdays and the on-call is out shopping somewhere. > > > > Shakespeare was almost right – first get rid of all the auditors, the > > lawyers are easy to deal with compared to them. > > > > Peter > > From: IBM Mainframe Discussion List <[email protected]> On Behalf > > Of Paul Gilmartin > > Sent: Monday, February 5, 2024 11:02 AM > > To: [email protected] > > Subject: Re: SDSF PS Command column > > > > > > On Mon, 5 Feb 2024 11:02:07 +0000, Rob Scott wrote: > > > > > ... > > > > >As to "why don't you just fix it ?"tstyle questions, we have to consider > > quite a few compatibility issues across n-2 releases especially when the > > "fix" requires changes to configuration and security ... > > > > > > > > > Such as users' embedding cryptographic keys in commands? Ugh! > > > > > > > > UNIX arose in a more innocent age when no one worried much about such as: > > > > ls -lt /u > > > > > > > > -- > > > > This message and any attachments are intended only for the use of the > > addressee and may contain information that is privileged and > confidential. > > If the reader of the message is not the intended recipient or an > authorized > > representative of the intended recipient, you are hereby notified that > any > > dissemination of this communication is strictly prohibited. If you have > > received this communication in error, please notify us immediately by > > e-mail and delete the message and any attachments from your system. > > > > > > ---------------------------------------------------------------------- > > For IBM-MAIN subscribe / signoff / archive access instructions, > > send email to [email protected] with the message: INFO IBM-MAIN > > > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [email protected] with the message: INFO IBM-MAIN > -- Mike A Schwab, Springfield IL USA Where do Forest Rangers go to get away from it all? ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
