There are some good SHARE presentations on some of these techniques. Unfortunately for you, I'm too lazy to search for them.
However, and this is important, anything and everything you do that uses authorized services entails exposure of system integrity. It behooves any organization to ensure that its personnel writing such code are well-trained and thoroughly knowledgeable about how the system works, is designed, and what those exposures are. It's also perfectly clear many organizations, including many ISVs, do not. This kind of knowledge and experience doesn't come from blindly following two-sentence replies from who knows who on IBM-MAIN (I know who's who on IBM-MAIN, as many of us do, but how would a newbie know?). You could easily read a paper on the latest techniques in brain surgery. I'd be skeptical about your ability to do it, unless you had the prior training and experience it requires. The point is, you need that training and experience, and you also need to be able to train and study on your own, as there's very little in the way of formal education in our field. Neither IBM-MAIN nor StackOverflow are a substitute for the fundamentals. sas On Mon, Nov 12, 2018 at 1:56 PM David W Noon < 0000013a910fd252-dmarc-requ...@listserv.ua.edu> wrote: > On Mon, 12 Nov 2018 18:13:30 +0000, Farley, Peter X23353 > (peter.far...@broadridge.com) wrote about "Why are sophisticated > system-level coding examples not available? [was: RE: Recommended method > for accessing secondary access spaces]" (in > <f6dfa267dd2a448b881a732dbbcc3...@clipswexmaa4.bsg.ad.adp.com>): > > > Not jumping on Ed Jaffe or Peter Relson or any of the other thoughtful > > and helpful responders in this email chain, but it still rankles me > > that there are no good examples anywhere (not at IBM and not at CBT) > > for programmers to review that show exactly how to set up and use "SRB > > to the other address space and PC-ss back to the requesting address > > space" or any similarly sophisticated system-level application coding > > technique. > > > > Why is system-level application coding made an obscure mystery to which > > only IBM and (some) ISV's have access? Good examples that show how to > > "do the right thing" would avoid an awful lot of dangerous > experimentation. > > "Security through obscurity" is, I think all here would agree. NOT a good > > thing. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN